1
|
Design of load-aware resource allocation for heterogeneous fog computing systems. PeerJ Comput Sci 2024; 10:e1986. [PMID: 38660156 PMCID: PMC11041998 DOI: 10.7717/peerj-cs.1986] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/08/2023] [Accepted: 03/21/2024] [Indexed: 04/26/2024]
Abstract
The execution of delay-aware applications can be effectively handled by various computing paradigms, including the fog computing, edge computing, and cloudlets. Cloud computing offers services in a centralized way through a cloud server. On the contrary, the fog computing paradigm offers services in a dispersed manner providing services and computational facilities near the end devices. Due to the distributed provision of resources by the fog paradigm, this architecture is suitable for large-scale implementation of applications. Furthermore, fog computing offers a reduction in delay and network load as compared to cloud architecture. Resource distribution and load balancing are always important tasks in deploying efficient systems. In this research, we have proposed heuristic-based approach that achieves a reduction in network consumption and delays by efficiently utilizing fog resources according to the load generated by the clusters of edge nodes. The proposed algorithm considers the magnitude of data produced at the edge clusters while allocating the fog resources. The results of the evaluations performed on different scales confirm the efficacy of the proposed approach in achieving optimal performance.
Collapse
|
2
|
Blockchain-enabled infrastructural security solution for serverless consortium fog and edge computing. PeerJ Comput Sci 2024; 10:e1933. [PMID: 38660154 PMCID: PMC11041953 DOI: 10.7717/peerj-cs.1933] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/20/2023] [Accepted: 02/18/2024] [Indexed: 04/26/2024]
Abstract
The robust development of the blockchain distributed ledger, the Internet of Things (IoT), and fog computing-enabled connected devices and nodes has changed our lifestyle nowadays. Due to this, the increased rate of device sales and utilization increases the demand for edge computing technology with collaborative procedures. However, there is a well-established paradigm designed to optimize various distinct quality-of-service requirements, including bandwidth, latency, transmission power, delay, duty cycle, throughput, response, and edge sense, and bring computation and data storage closer to the devices and edges, along with ledger security and privacy during transmission. In this article, we present a systematic review of blockchain Hyperledger enabling fog and edge computing, which integrates as an outsourcing computation over the serverless consortium network environment. The main objective of this article is to classify recently published articles and survey reports on the current status in the domain of edge distributed computing and outsourcing computation, such as fog and edge. In addition, we proposed a blockchain-Hyperledger Sawtooth-enabled serverless edge-based distributed outsourcing computation architecture. This theoretical architecture-based solution delivers robust data security in terms of integrity, transparency, provenance, and privacy-protected preservation in the immutable storage to store the outsourcing computational ledgers. This article also highlights the changes between the proposed taxonomy and the current system based on distinct parameters, such as system security and privacy. Finally, a few open research issues and limitations with promising future directions are listed for future research work.
Collapse
|
3
|
Intelligent decision making for energy efficient fog nodes selection and smart switching in the IOT: a machine learning approach. PeerJ Comput Sci 2024; 10:e1833. [PMID: 38660213 PMCID: PMC11041942 DOI: 10.7717/peerj-cs.1833] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/11/2023] [Accepted: 01/02/2024] [Indexed: 04/26/2024]
Abstract
With the emergence of Internet of Things (IoT) technology, a huge amount of data is generated, which is costly to transfer to the cloud data centers in terms of security, bandwidth, and latency. Fog computing is an efficient paradigm for locally processing and manipulating IoT-generated data. It is difficult to configure the fog nodes to provide all of the services required by the end devices because of the static configuration, poor processing, and storage capacities. To enhance fog nodes' capabilities, it is essential to reconfigure them to accommodate a broader range and variety of hosted services. In this study, we focus on the placement of fog services and their dynamic reconfiguration in response to the end-device requests. Due to its growing successes and popularity in the IoT era, the Decision Tree (DT) machine learning model is implemented to predict the occurrence of requests and events in advance. The DT model enables the fog nodes to predict requests for a specific service in advance and reconfigure the fog node accordingly. The performance of the proposed model is evaluated in terms of high throughput, minimized energy consumption, and dynamic fog node smart switching. The simulation results demonstrate a notable increase in the fog node hit ratios, scaling up to 99% for the majority of services concurrently with a substantial reduction in miss ratios. Furthermore, the energy consumption is greatly reduced by over 50% as compared to a static node.
Collapse
|
4
|
FedHealthFog: A federated learning-enabled approach towards healthcare analytics over fog computing platform. Heliyon 2024; 10:e26416. [PMID: 38468957 PMCID: PMC10925998 DOI: 10.1016/j.heliyon.2024.e26416] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/01/2023] [Revised: 01/13/2024] [Accepted: 02/13/2024] [Indexed: 03/13/2024] Open
Abstract
The emergence of federated learning (FL) technique in fog-enabled healthcare system has leveraged enhanced privacy towards safeguarding sensitive patient information over heterogeneous computing platforms. In this paper, we introduce the FedHealthFog framework, which was meticulously developed to overcome the difficulties of distributed learning in resource-constrained IoT-enabled healthcare systems, particularly those sensitive to delays and energy efficiency. Conventional federated learning approaches face challenges stemming from substantial compute requirements and significant communication costs. This is primarily due to their reliance on a singular server for the aggregation of global data, which results in inefficient training models. We present a transformational approach to address these problems by elevating strategically placed fog nodes to the position of local aggregators within the federated learning architecture. A sophisticated greedy heuristic technique is used to optimize the choice of a fog node as the global aggregator in each communication cycle between edge devices and the cloud. The FedHealthFog system notably accounts for drop in communication latency of 87.01%, 26.90%, and 71.74%, and energy consumption of 57.98%, 34.36%, and 35.37% respectively, for three benchmark algorithms analyzed in this study. The effectiveness of FedHealthFog is strongly supported by outcomes of our experiments compared to cutting-edge alternatives while simultaneously reducing number of global aggregation cycles. These findings highlight FedHealthFog's potential to transform federated learning in resource-constrained IoT environments for delay-sensitive applications.
Collapse
|
5
|
Edge, Fog, and Cloud Against Disease: The Potential of High-Performance Cloud Computing for Pharma Drug Discovery. Methods Mol Biol 2024; 2716:181-202. [PMID: 37702940 DOI: 10.1007/978-1-0716-3449-3_8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 09/14/2023]
Abstract
The high-performance computing (HPC) platform for large-scale drug discovery simulation demands significant investment in speciality hardware, maintenance, resource management, and running costs. The rapid growth in computing hardware has made it possible to provide cost-effective, robust, secure, and scalable alternatives to the on-premise (on-prem) HPC via Cloud, Fog, and Edge computing. It has enabled recent state-of-the-art machine learning (ML) and artificial intelligence (AI)-based tools for drug discovery, such as BERT, BARD, AlphaFold2, and GPT. This chapter attempts to overview types of software architectures for developing scientific software or application with deployment agnostic (on-prem to cloud and hybrid) use cases. Furthermore, the chapter aims to outline how the innovation is disrupting the orthodox mindset of monolithic software running on on-prem HPC and provide the paradigm shift landscape to microservices driven application programming (API) and message parsing interface (MPI)-based scientific computing across the distributed, high-available infrastructure. This is coupled with agile DevOps, and good coding practices, low code and no-code application development frameworks for cost-efficient, secure, automated, and robust scientific application life cycle management.
Collapse
|
6
|
The Internet of Things in assisted reproduction. Reprod Biomed Online 2023; 47:103338. [PMID: 37757612 DOI: 10.1016/j.rbmo.2023.103338] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/30/2023] [Revised: 08/06/2023] [Accepted: 08/07/2023] [Indexed: 09/29/2023]
Abstract
The Internet of Things (IoT) is a network connecting physical objects with sensors, software and internet connectivity for data exchange. Integrating the IoT with medical devices shows promise in healthcare, particularly in IVF laboratories. By leveraging telecommunications, cybersecurity, data management and intelligent systems, the IoT can enable a data-driven laboratory with automation, improved conditions, personalized treatment and efficient workflows. The integration of 5G technology ensures fast and reliable connectivity for real-time data transmission, while blockchain technology secures patient data. Fog computing reduces latency and enables real-time analytics. Microelectromechanical systems enable wearable IoT and miniaturized monitoring devices for tracking IVF processes. However, challenges such as security risks and network issues must be addressed through cybersecurity measures and networking advancements. Clinical embryologists should maintain their expertise and knowledge for safety and oversight, even with IoT in the IVF laboratory.
Collapse
|
7
|
Breast Cancer Diagnosis Based on IoT and Deep Transfer Learning Enabled by Fog Computing. Diagnostics (Basel) 2023; 13:2191. [PMID: 37443585 DOI: 10.3390/diagnostics13132191] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/08/2023] [Revised: 06/18/2023] [Accepted: 06/19/2023] [Indexed: 07/15/2023] Open
Abstract
Across all countries, both developing and developed, women face the greatest risk of breast cancer. Patients who have their breast cancer diagnosed and staged early have a better chance of receiving treatment before the disease spreads. The automatic analysis and classification of medical images are made possible by today's technology, allowing for quicker and more accurate data processing. The Internet of Things (IoT) is now crucial for the early and remote diagnosis of chronic diseases. In this study, mammography images from the publicly available online repository The Cancer Imaging Archive (TCIA) were used to train a deep transfer learning (DTL) model for an autonomous breast cancer diagnostic system. The data were pre-processed before being fed into the model. A popular deep learning (DL) technique, i.e., convolutional neural networks (CNNs), was combined with transfer learning (TL) techniques such as ResNet50, InceptionV3, AlexNet, VGG16, and VGG19 to boost prediction accuracy along with a support vector machine (SVM) classifier. Extensive simulations were analyzed by employing a variety of performances and network metrics to demonstrate the viability of the proposed paradigm. Outperforming some current works based on mammogram images, the experimental accuracy, precision, sensitivity, specificity, and f1-scores reached 97.99%, 99.51%, 98.43%, 80.08%, and 98.97%, respectively, on the huge dataset of mammography images categorized as benign and malignant, respectively. Incorporating Fog computing technologies, this model safeguards the privacy and security of patient data, reduces the load on centralized servers, and increases the output.
Collapse
|
8
|
Computer-aided methods for combating Covid-19 in prevention, detection, and service provision approaches. Neural Comput Appl 2023; 35:14739-14778. [PMID: 37274420 PMCID: PMC10162652 DOI: 10.1007/s00521-023-08612-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/27/2022] [Accepted: 04/11/2023] [Indexed: 06/06/2023]
Abstract
The infectious disease Covid-19 has been causing severe social, economic, and human suffering across the globe since 2019. The countries have utilized different strategies in the last few years to combat Covid-19 based on their capabilities, technological infrastructure, and investments. A massive epidemic like this cannot be controlled without an intelligent and automatic health care system. The first reaction to the disease outbreak was lockdown, and researchers focused more on developing methods to diagnose the disease and recognize its behavior. However, as the new lifestyle becomes more normalized, research has shifted to utilizing computer-aided methods to monitor, track, detect, and treat individuals and provide services to citizens. Thus, the Internet of things, based on fog-cloud computing, using artificial intelligence approaches such as machine learning, and deep learning are practical concepts. This article aims to survey computer-based approaches to combat Covid-19 based on prevention, detection, and service provision. Technically and statistically, this article analyzes current methods, categorizes them, presents a technical taxonomy, and explores future and open issues.
Collapse
|
9
|
Digital health in smart cities: Rethinking the remote health monitoring architecture on combining edge, fog, and cloud. HEALTH AND TECHNOLOGY 2023; 13:449-472. [PMID: 37303980 PMCID: PMC10139834 DOI: 10.1007/s12553-023-00753-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/22/2023] [Accepted: 04/06/2023] [Indexed: 06/13/2023]
Abstract
Purpose Smart cities that support the execution of health services are more and more in evidence today. Here, it is mainstream to use IoT-based vital sign data to serve a multi-tier architecture. The state-of-the-art proposes the combination of edge, fog, and cloud computing to support critical health applications efficiently. However, to the best of our knowledge, initiatives typically present the architectures, not bringing adaptation and execution optimizations to address health demands fully. Methods This article introduces the VitalSense model, which provides a hierarchical multi-tier remote health monitoring architecture in smart cities by combining edge, fog, and cloud computing. Results Although using a traditional composition, our contributions appear in handling each infrastructure level. We explore adaptive data compression and homomorphic encryption at the edge, a multi-tier notification mechanism, low latency health traceability with data sharding, a Serverless execution engine to support multiple fog layers, and an offloading mechanism based on service and person computing priorities. Conclusions This article details the rationale behind these topics, describing VitalSense use cases for disruptive healthcare services and preliminary insights regarding prototype evaluation.
Collapse
|
10
|
Prediction Framework on Early Urine Infection in IoT-Fog Environment Using XGBoost Ensemble Model. WIRELESS PERSONAL COMMUNICATIONS 2023; 131:1-19. [PMID: 37360131 PMCID: PMC10123571 DOI: 10.1007/s11277-023-10466-5] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 04/07/2023] [Indexed: 06/28/2023]
Abstract
Urine infections are one of the most prevalent concerns for the healthcare industry that may impair the functioning of the kidney and other renal organs. As a result, early diagnosis and treatment of such infections are essential to avert any future complications. Conspicuously, in the current work, an intelligent system for the early prediction of urine infections has been presented. The proposed framework uses IoT-based sensors for data collection, followed by data encoding and infectious risk factor computation using the XGBoost algorithm over the fog computing platform. Finally, the analysis results along with the health-related information of users are stored in the cloud repository for future analysis. For performance validation, extensive experiments have been carried out, and results are calculated based on real-time patient data. The statistical findings of accuracy (91.45%), specificity (95.96%), sensitivity (84.79%), precision (95.49%), and f-score(90.12%) reveal the significantly improved performance of the proposed strategy over other baseline techniques.
Collapse
|
11
|
Fog-cloud architecture-driven Internet of Medical Things framework for healthcare monitoring. Med Biol Eng Comput 2023; 61:1133-1147. [PMID: 36670240 PMCID: PMC9859747 DOI: 10.1007/s11517-023-02776-4] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/24/2022] [Accepted: 01/06/2023] [Indexed: 01/22/2023]
Abstract
The new coronavirus disease (COVID-19) has increased the need for new technologies such as the Internet of Medical Things (IoMT), Wireless Body Area Networks (WBANs), and cloud computing in the health sector as well as in many areas. These technologies have also made it possible for billions of devices to connect to the internet and communicate with each other. In this study, an Internet of Medical Things (IoMT) framework consisting of Wireless Body Area Networks (WBANs) has been designed and the health big data from WBANs have been analyzed using fog and cloud computing technologies. Fog computing is used for fast and easy analysis, and cloud computing is used for time-consuming and complex analysis. The proposed IoMT framework is presented with a diabetes prediction scenario. The diabetes prediction process is carried out on fog with fuzzy logic decision-making and is achieved on cloud with support vector machine (SVM), random forest (RF), and artificial neural network (ANN) as machine learning algorithms. The dataset produced in WBANs is used for big data analysis in the scenario for both fuzzy logic and machine learning algorithm. The fuzzy logic gives 64% accuracy performance in fog and SVM, RF, and ANN have 89.5%, 88.4%, and 87.2% accuracy performance respectively in the cloud for diabetes prediction. In addition, the throughput and delay results of heterogeneous nodes with different priorities in the WBAN scenario created using the IEEE 802.15.6 standard and AODV routing protocol have been also analyzed. Fog-Cloud architecture-driven for IoMT networks • An IoMT framework is designed with important components and functions such as fog and cloud node capabilities. •Real-time data has been obtained from WBANs in Riverbed Modeler for a more realistic performance analysis of IoMT. •Fuzzy logic and machine learning algorithms (RF, SVM, and ANN) are used for diabetes predictions. •Intra and Inter-WBAN communications (IEEE 802.15.6 standard) are modeled as essential components of the IoMT framework with all functions.
Collapse
|
12
|
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. JOURNAL OF CLOUD COMPUTING (HEIDELBERG, GERMANY) 2023; 12:38. [PMID: 36937654 PMCID: PMC10017665 DOI: 10.1186/s13677-023-00412-y] [Citation(s) in RCA: 8] [Impact Index Per Article: 8.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Figures] [Subscribe] [Scholar Register] [Received: 12/06/2022] [Accepted: 02/25/2023] [Indexed: 03/21/2023]
Abstract
The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making systems for improved market performance. However, traditional IIoT architectures are highly susceptible to many security vulnerabilities and network intrusions, which bring challenges such as lack of privacy, integrity, trust, and centralization. This research aims to implement an Artificial Intelligence-based Lightweight Blockchain Security Model (AILBSM) to ensure privacy and security of IIoT systems. This novel model is meant to address issues that can occur with security and privacy when dealing with Cloud-based IIoT systems that handle data in the Cloud or on the Edge of Networks (on-device). The novel contribution of this paper is that it combines the advantages of both lightweight blockchain and Convivial Optimized Sprinter Neural Network (COSNN) based AI mechanisms with simplified and improved security operations. Here, the significant impact of attacks is reduced by transforming features into encoded data using an Authentic Intrinsic Analysis (AIA) model. Extensive experiments are conducted to validate this system using various attack datasets. In addition, the results of privacy protection and AI mechanisms are evaluated separately and compared using various indicators. By using the proposed AILBSM framework, the execution time is minimized to 0.6 seconds, the overall classification accuracy is improved to 99.8%, and detection performance is increased to 99.7%. Due to the inclusion of auto-encoder based transformation and blockchain authentication, the anomaly detection performance of the proposed model is highly improved, when compared to other techniques.
Collapse
|
13
|
DeepClassRooms: a deep learning based digital twin framework for on-campus class rooms. Neural Comput Appl 2023; 35:8017-8026. [PMID: 35017794 PMCID: PMC8736310 DOI: 10.1007/s00521-021-06754-5] [Citation(s) in RCA: 3] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 06/08/2021] [Accepted: 11/10/2021] [Indexed: 11/24/2022]
Abstract
A lot of different methods are being opted for improving the educational standards through monitoring of the classrooms. The developed world uses Smart classrooms to enhance faculty efficiency based on accumulated learning outcomes and interests. Smart classroom boards, audio-visual aids, and multimedia are directly related to the Smart classroom environment. Along with these facilities, more effort is required to monitor and analyze students' outcomes, teachers' performance, attendance records, and contents delivery in on-campus classrooms. One can achieve more improvement in quality teaching and learning outcomes by developing digital twins in on-campus classrooms. In this article, we have proposed DeepClass-Rooms, a digital twin framework for attendance and course contents monitoring for the public sector schools of Punjab, Pakistan. DeepClassRooms is cost-effective and requires RFID readers and high-edge computing devices at the Fog layer for attendance monitoring and content matching, using convolution neural network for on-campus and online classes.
Collapse
|
14
|
Adopting effective hierarchal IoMTs computing with K-efficient clustering to control and forecast COVID-19 cases. COMPUTERS & ELECTRICAL ENGINEERING : AN INTERNATIONAL JOURNAL 2022; 104:108472. [PMID: 36408485 PMCID: PMC9647042 DOI: 10.1016/j.compeleceng.2022.108472] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 01/29/2022] [Revised: 11/07/2022] [Accepted: 11/08/2022] [Indexed: 06/16/2023]
Abstract
The Internet of Medical Things (IoMTs) based on fog/cloud computing has been effectively proven to improve the controlling, monitoring, and care quality of Coronavirus disease 2019 (COVID-19) patients. One of the convenient approaches to assess symptomatic patients is to group patients with comparable symptoms and provide an overview of the required level of care to patients with similar conditions. Therefore, this study adopts an effective hierarchal IoMTs computing with K-Efficient clustering to control and forecast COVID-19 cases. The proposed system integrates the K-Means and K-Medoids clusterings to monitor the health status of patients, early detection of COVID-19 cases, and process data in real-time with ultra-low latency. In addition, the data analysis takes into account the primary requirements of the network to assist in understanding the nature of COVID-19. Based on the findings, the K-Efficient clustering with fog computing is a more effective approach to analyse the status of patients compared to that of K-Means and K-Medoids in terms of intra-class, inter-class, running time, the latency of network, and RAM consumption. In summary, the outcome of this study provides a novel approach for remote monitoring and handling of infected COVID-19 patients through real-time personalised treatment services.
Collapse
|
15
|
A Deep Learning-Based Privacy-Preserving Model for Smart Healthcare in Internet of Medical Things Using Fog Computing. WIRELESS PERSONAL COMMUNICATIONS 2022; 126:2379-2401. [PMID: 36059591 PMCID: PMC9426374 DOI: 10.1007/s11277-021-09323-0] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 11/04/2021] [Indexed: 06/15/2023]
Abstract
With the emergence of COVID-19, smart healthcare, the Internet of Medical Things, and big data-driven medical applications have become even more important. The biomedical data produced is highly confidential and private. Unfortunately, conventional health systems cannot support such a colossal amount of biomedical data. Hence, data is typically stored and shared through the cloud. The shared data is then used for different purposes, such as research and discovery of unprecedented facts. Typically, biomedical data appear in textual form (e.g., test reports, prescriptions, and diagnosis). Unfortunately, such data is prone to several security threats and attacks, for example, privacy and confidentiality breach. Although significant progress has been made on securing biomedical data, most existing approaches yield long delays and cannot accommodate real-time responses. This paper proposes a novel fog-enabled privacy-preserving model called δ r sanitizer, which uses deep learning to improve the healthcare system. The proposed model is based on a Convolutional Neural Network with Bidirectional-LSTM and effectively performs Medical Entity Recognition. The experimental results show that δ r sanitizer outperforms the state-of-the-art models with 91.14% recall, 92.63% in precision, and 92% F1-score. The sanitization model shows 28.77% improved utility preservation as compared to the state-of-the-art.
Collapse
|
16
|
Ephemeral data handling in microservices with Tquery. PeerJ Comput Sci 2022; 8:e1037. [PMID: 36091995 PMCID: PMC9454887 DOI: 10.7717/peerj-cs.1037] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/03/2022] [Accepted: 06/22/2022] [Indexed: 06/15/2023]
Abstract
The adoption of edge and fog systems, along with the introduction of privacy-preserving regulations, compel the usage of tools for expressing complex data queries in an ephemeral way. That is, queried data should not persist. Database engines partially address this need, as they provide domain-specific languages for querying data. Unfortunately, using a database in an ephemeral setting has inessential issues related to throughput bottlenecks, scalability, dependency management, and security (e.g., query injection). Moreover, databases can impose specific data structures and data formats, which can hinder the development of microservice architectures that integrate heterogeneous systems and handle semi-structured data. In this article, we present Jolie/Tquery, the first query framework designed for ephemeral data handling in microservices. Jolie/Tquery joins the benefits of a technology-agnostic, microservice-oriented programming language, Jolie, and of one of the most widely-used query languages for semi-structured data in microservices, the MongoDB aggregation framework. To make Jolie/Tquery reliable for the users, we follow a cleanroom software engineering process. First, we define Tquery, a theory for querying semi-structured data compatible with Jolie and inspired by a consistent variant of the key operators of the MongoDB aggregation framework. Then, we describe how we implemented Jolie/Tquery following Tquery and how the Jolie type system naturally captures the syntax of Tquery and helps to preserve its invariants. To both illustrate Tquery and Jolie/Tquery, we present the use case of a medical algorithm and build our way to a microservice that implements it using Jolie/Tquery. Finally, we report microbenchmarks that validate the expectation that, in the ephemeral case, using Jolie/Tquery outperforms using an external database (MongoDB, specifically).
Collapse
|
17
|
Energy efficient service placement in fog computing. PeerJ Comput Sci 2022; 8:e1035. [PMID: 36092002 PMCID: PMC9455019 DOI: 10.7717/peerj-cs.1035] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/07/2022] [Accepted: 06/20/2022] [Indexed: 06/15/2023]
Abstract
The Internet of Things (IoT) concept evolved into a slew of applications. To satisfy the requests of these applications, using cloud computing is troublesome because of the high latency caused by the distance between IoT devices and cloud resources. Fog computing has become promising with its geographically distributed infrastructure for providing resources using fog nodes near IoT devices, thereby reducing the bandwidth and latency. A geographical distribution, heterogeneity and resource constraints of fog nodes introduce the key challenge of placing application modules/services in such a large scale infrastructure. In this work, we propose an improved version of the JAYA approach for optimal placement of modules that minimizes the energy consumption of a fog landscape. We analyzed the performance in terms of energy consumption, network usage, delays and execution time. Using iFogSim, we ran simulations and observed that our approach reduces on average 31% of the energy consumption compared to modern methods.
Collapse
|
18
|
FCML-gait: fog computing and machine learning inspired human identity and gender recognition using gait sequences. SIGNAL, IMAGE AND VIDEO PROCESSING 2022; 17:925-936. [PMID: 35528215 PMCID: PMC9067894 DOI: 10.1007/s11760-022-02217-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/20/2021] [Revised: 01/30/2022] [Accepted: 03/23/2022] [Indexed: 06/14/2023]
Abstract
Security threats are always there if the human intruders are not identified and recognized well in time in highly security-sensitive environments like the military, airports, parliament houses, and banks. Fog computing and machine learning algorithms on Gait sequences can prove to be better for restricting intruders promptly. Gait recognition provides the ability to observe an individual unobtrusively, without any direct cooperation or interaction from the people, making it very attractive than other biometric recognition techniques. In this paper, a Fog Computing and Machine Learning Inspired Human Identity and Gender Recognition using Gait Sequences (FCML-Gait) are proposed. Internet of things (IoT) devices and video capturing sensors are used to acquire data. Frames are clustered using the affinity propagation (AP) clustering technique into several clusters, and cluster-based averaged gait image(C-AGI) feature is determined for each cluster. For training and testing of datasets, sparse reconstruction-based metric learning (SRML) and Speeded Up Robust Features (SURF) with support vector machine (SVM) are applied on benchmark gait database ADSC-AWD having 80 subjects of 20 different individuals in the Fog Layer to improve the processing. The performance metrics, for instance, accuracy, precision, recall, F-measure, C-time, and R-time have been measured, and a comparative evaluation of the projected method with the existing SRML technique has been provided in which the proposed FCML-Gait outperforms and attains the highest accuracy of 95.49%.
Collapse
|
19
|
Floating Fog: extending fog computing to vast waters for aerial users. CLUSTER COMPUTING 2022; 26:181-195. [PMID: 35464821 PMCID: PMC9014405 DOI: 10.1007/s10586-022-03567-6] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 07/09/2021] [Revised: 12/22/2021] [Accepted: 01/28/2022] [Indexed: 06/14/2023]
Abstract
There are thousands of flights carrying millions of passengers each day, having three or more Internet-connected devices with them on average. Usually, onboard devices remain idle for most of the journey (which can be of several hours), therefore, we can tap on their underutilized potential. Although these devices are generally becoming more and more resourceful, for complex services (such as related to machine learning, augmented/virtual reality, smart healthcare, and so on) those devices do not suffice standalone. This makes a case for multi-device resource aggregation such as through femto-cloud. As our first contribution, we present the utility of femto-cloud for aerial users. But for that sake, a reliable and faster Internet is required (to access online services or cloud resources), which is currently not the case with satellite-based Internet. That is the second challenge we try to address in our paper, by presenting an adaptive beamforming-based solution for aerial Internet provisioning. However, on average, most of the flight path is above waters. Given that, we propose that beamforming transceivers can be docked on stationery ships deployed in the vast waters (such as the ocean). Nevertheless, certain services would be delay-sensitive, and accessing their on-ground servers or cloud may not be feasible (in terms of delay). Similarly, certain complex services may require resources in addition to the flight-local femto-cloud. That is the third challenge we try to tackle in this paper, by proposing that the traditional fog computing (which is a cloud-like but localized pool of resources) can also be extended to the waters on the ships harboring beamforming transceivers. We name it Floating Fog. In addition to that, Floating Fog will enable several new services such as live black-box. We also present a cost and bandwidth analysis to highlight the potentials of Floating Fog. Lastly, we identify some challenges to tackle the successful deployment of Floating Fog.
Collapse
|
20
|
Cloud-based virtualization environment for IoT-based WSN: solutions, approaches and challenges. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING 2022; 13:4681-4703. [PMID: 35371335 PMCID: PMC8959803 DOI: 10.1007/s12652-021-03515-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/09/2020] [Accepted: 09/09/2021] [Indexed: 06/14/2023]
Abstract
Internet of Things (IoT) is an ever-growing technology that enables advanced communication among millions of various devices to provide ubiquitous services without human intervention. The potential growth of electronic devices in sensing systems has led to the realization of IoT paradigm where applications depend on sensors to interact with the environment and collect data in a real-time scenario. Nowadays, smart applications require fast data acquisition, parallel processing, and dynamic resource sharing. Unfortunately, these requirements can not be supported efficiently with traditional Wireless Sensor Networks (WSN) due to the deficiency of computing resources and the lack of resource-sharing. Therefore, it is not recommended to develop innovative applications based on these constrained devices without further enhancement and improvement. Hence, this article explores a coeffective solution based on Cloud Computing and Virtualization Techniques to address these challenges. Cloud computing provides efficient computing resources and huge storage space, while the virtualization technique allows resources to be virtualized and shared between various applications. Integrating IoT-WSN with the Cloud-based Virtualization Environment will eliminate the drawbacks and limitations of conventional networks and facilitate the development of novel applications in a more flexible way. Furthermore, this article reviews the recent trends in IoT-WSN, virtualization techniques, and cloud computing. Also, we present the integration process of sensor networks with Cloud-based Virtualization and propose a new general architecture view for the Sensor-Cloud paradigm, and discuss its key elements, basic principles, lifecycle operation, and outline its advantages and disadvantages. Finally, we review the state-of-the-art, present the major challenges, and suggest future work directions.
Collapse
|
21
|
Toward a mixed reality domain model for time-Sensitive applications using IoE infrastructure and edge computing (MRIoEF). THE JOURNAL OF SUPERCOMPUTING 2022; 78:10656-10689. [PMID: 35095192 PMCID: PMC8785157 DOI: 10.1007/s11227-022-04307-8] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 12/31/2021] [Indexed: 06/14/2023]
Abstract
Mixed reality (MR) is one of the technologies with many challenges in the design and implementation phases, especially the problems associated with time-sensitive applications. The main objective of this paper is to introduce a conceptual model for MR application that gives MR application a new layer of interactivity by using Internet of things/Internet of everything models, which provide an improved quality of experience for end-users. The model supports the cloud and fog compute layers to give more functionalities that need more processing resources and reduce the latency problems for time-sensitive applications. Validation of the proposed model is performed via demonstrating a prototype of the model applied to a real-time case study and discussing how to enable standard technologies of the various components in the model. Moreover, it shows the applicability of the model, the ease of defining the roles, and the coherence of data or processes found in the most common applications.
Collapse
|
22
|
A novel IoT-fog-cloud-based healthcare system for monitoring and predicting COVID-19 outspread. THE JOURNAL OF SUPERCOMPUTING 2022; 78:1783-1806. [PMID: 34177116 PMCID: PMC8215493 DOI: 10.1007/s11227-021-03935-w] [Citation(s) in RCA: 7] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Accepted: 06/04/2021] [Indexed: 05/04/2023]
Abstract
Rapid communication of viral sicknesses is an arising public medical issue across the globe. Out of these, COVID-19 is viewed as the most critical and novel infection nowadays. The current investigation gives an effective framework for the monitoring and prediction of COVID-19 virus infection (C-19VI). To the best of our knowledge, no research work is focused on incorporating IoT technology for C-19 outspread over spatial-temporal patterns. Moreover, limited work has been done in the direction of prediction of C-19 in humans for controlling the spread of COVID-19. The proposed framework includes a four-level architecture for the expectation and avoidance of COVID-19 contamination. The presented model comprises COVID-19 Data Collection (C-19DC) level, COVID-19 Information Classification (C-19IC) level, COVID-19-Mining and Extraction (C-19ME) level, and COVID-19 Prediction and Decision Modeling (C-19PDM) level. Specifically, the presented model is used to empower a person/community to intermittently screen COVID-19 Fever Measure (C-19FM) and forecast it so that proactive measures are taken in advance. Additionally, for prescient purposes, the probabilistic examination of C-19VI is quantified as degree of membership, which is cumulatively characterized as a COVID-19 Fever Measure (C-19FM). Moreover, the prediction is realized utilizing the temporal recurrent neural network. Additionally, based on the self-organized mapping technique, the presence of C-19VI is determined over a geographical area. Simulation is performed over four challenging datasets. In contrast to other strategies, altogether improved outcomes in terms of classification efficiency, prediction viability, and reliability were registered for the introduced model.
Collapse
|
23
|
CONFRONT: Cloud-fog-dew based monitoring framework for COVID-19 management. INTERNET OF THINGS (AMSTERDAM, NETHERLANDS) 2021; 16:100459. [PMID: 38620743 PMCID: PMC8464028 DOI: 10.1016/j.iot.2021.100459] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/01/2021] [Revised: 05/21/2021] [Accepted: 09/12/2021] [Indexed: 06/15/2023]
Abstract
In the recent times, the IoT (Internet of Things) enabled devices and applications have seen a rapid growth in various sectors including healthcare. The ability of low-cost connected sensors to cover large areas makes it a potential tool in the fight against pandemics, like COVID-19. The COVID-19 has posed a formidable challenge for the developing countries, like India, which need to cater to large population base with limited health infrastructure. In this paper, we proposed a Cloud-fog-dew based mOnitoriNg Framework foR cOvid-19 maNagemenT, called CONFRONT. This cloud-fog-dew based healthcare model may help in preliminary diagnosis and also in monitoring patients while they are in quarantine facilities or home based treatments. The fog architecture ensures that the model is suited for real-time scenarios while keeping the bandwidth requirements low. To analyse large scale COVID-19 statistics data for extracting aggregate information of the disease spread, the cloud servers are leveraged due to its scalable computational and storage capabilities. The dew architecture ensures that the application is available at a limited scale even when cloud connectivity is lost, leading to a faster uptime for the application. A low cost wearable device consisting of heterogeneous sensors has also been designed and fabricated to realize the proposed framework.
Collapse
|
24
|
Smart healthcare IoT applications based on fog computing: architecture, applications and challenges. COMPLEX INTELL SYST 2021; 8:3805-3815. [PMID: 34804767 PMCID: PMC8595960 DOI: 10.1007/s40747-021-00582-9] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/17/2021] [Accepted: 10/19/2021] [Indexed: 11/26/2022]
Abstract
The history of human development has proven that medical and healthcare applications for humanity always are the main driving force behind the development of science and technology. The advent of Cloud technology for the first time allows providing systems infrastructure as a service, platform as a service and software as a service. Cloud technology has dominated healthcare information systems for decades now. However, one limitation of cloud-based applications is the high service response time. In some emergency scenarios, the control and monitoring of patient status, decision-making with related resources are limited such as hospital, ambulance, doctor, medical conditions in seconds and has a direct impact on the life of patients. To solve these challenges, optimal computing technologies have been proposed such as cloud computing, edge computing, and fog computing technologies. In this article, we make a comparison between computing technologies. Then, we present a common architectural framework based on fog computing for Internet of Health Things (Fog-IoHT) applications. Besides, we also indicate possible applications and challenges in integrating fog computing into IoT Healthcare applications. The analysis results indicated that there is huge potential for IoHT applications based on fog computing. We hope, this study will be an important guide for the future development of fog-based Healthcare IoT applications.
Collapse
|
25
|
Processing Complex Events in Fog-Based Internet of Things Systems for Smart Agriculture. SENSORS 2021; 21:s21217226. [PMID: 34770533 PMCID: PMC8587757 DOI: 10.3390/s21217226] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/20/2021] [Revised: 10/15/2021] [Accepted: 10/21/2021] [Indexed: 11/17/2022]
Abstract
The recent growth of the Internet of Things' services and applications has increased data processing and storage requirements. The Edge computing concept aims to leverage the processing capabilities of the IoT and other devices placed at the edge of the network. One embodiment of this paradigm is Fog computing, which provides an intermediate and often hierarchical processing tier between the data sources and the remote Cloud. Among the major benefits of this concept, the end-to-end latency can be decreased, thus favoring time-sensitive applications. Moreover, the data traffic at the network core and the Cloud computing workload can be reduced. Combining the Fog computing paradigm with Complex Event Processing (CEP) and data fusion techniques has excellent potential for generating valuable knowledge and aiding decision-making processes in the Internet of Things' systems. In this context, we propose a multi-tier complex event processing approach (sensor node, Fog, and Cloud) that promotes fast decision making and is based on information with 98% accuracy. The experiments show a reduction of 77% in the average time of sending messages in the network. In addition, we achieved a reduction of 82% in data traffic.
Collapse
|
26
|
Towards effective offloading mechanisms in fog computing. MULTIMEDIA TOOLS AND APPLICATIONS 2021; 81:1997-2042. [PMID: 34690529 PMCID: PMC8526054 DOI: 10.1007/s11042-021-11423-9] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/02/2020] [Revised: 02/06/2021] [Accepted: 08/10/2021] [Indexed: 06/13/2023]
Abstract
Fog computing is considered a formidable next-generation complement to cloud computing. Nowadays, in light of the dramatic rise in the number of IoT devices, several problems have been raised in cloud architectures. By introducing fog computing as a mediate layer between the user devices and the cloud, one can extend cloud computing's processing and storage capability. Offloading can be utilized as a mechanism that transfers computations, data, and energy consumption from the resource-limited user devices to resource-rich fog/cloud layers to achieve an optimal experience in the quality of applications and improve the system performance. This paper provides a systematic and comprehensive study to evaluate fog offloading mechanisms' current and recent works. Each selected paper's pros and cons are explored and analyzed to state and address the present potentialities and issues of offloading mechanisms in a fog environment efficiently. We classify offloading mechanisms in a fog system into four groups, including computation-based, energy-based, storage-based, and hybrid approaches. Furthermore, this paper explores offloading metrics, applied algorithms, and evaluation methods related to the chosen offloading mechanisms in fog systems. Additionally, the open challenges and future trends derived from the reviewed studies are discussed.
Collapse
|
27
|
A fog assisted intelligent framework based on cyber physical system for safe evacuation in panic situations. COMPUTER COMMUNICATIONS 2021; 178:297-306. [PMID: 34518711 PMCID: PMC8427940 DOI: 10.1016/j.comcom.2021.08.022] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/31/2020] [Revised: 07/17/2021] [Accepted: 08/20/2021] [Indexed: 06/13/2023]
Abstract
In the current scenario of the COVID-19 pandemic and worldwide health emergency, one of the major challenges is to identify and predict the panic health of persons. The management of panic health and on-time evacuation prevents COVID-19 infection incidences in educational institutions and public places. Therefore, a system is required to predict the infection and suggests a safe evacuation path to people that control panic scenarios with mortality. In this paper, a fog-assisted cyber physical system is introduced to control panic attacks and COVID-19 infection risk in public places. The proposed model uses the concept of physical and cyber space. The physical space helps in real time data collection and transmission of the alert generation to the stakeholders. Cyberspace consists of two spaces, fog space, and cloud-space. The fog-space facilitates panic health and COVID-19 symptoms determination with alert generation for risk-affected areas. Cloud space monitors and predicts the person's panic health and symptoms using the SARIMA model. Furthermore, it also identifies risk-prone regions in the affected place using Geographical Population Analysis. The performance evaluation acknowledges the efficiency related to panic health determination and prediction based on the SARIMA with risks mapping accuracy. The proposed system provides an efficient on time evacuation with priority from risk-affected places that protect people from attacks due to panic and infection caused by COVID-19.
Collapse
|
28
|
Fog-based healthcare systems: A systematic review. MULTIMEDIA TOOLS AND APPLICATIONS 2021; 80:36361-36400. [PMID: 34512110 PMCID: PMC8418296 DOI: 10.1007/s11042-021-11227-x] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/13/2020] [Revised: 06/03/2021] [Accepted: 07/07/2021] [Indexed: 06/13/2023]
Abstract
The healthcare system aims to provide a reliable and organized solution to enhance the health of human society. Studying the history of patients can help physicians to consider patients' needs in healthcare system designing and offering service, which leads to an increase in patient satisfaction. Therefore, healthcare is becoming a growing contesting market. With this significant growth in healthcare systems, such challenges as huge data volume, response time, latency, and security vulnerability are raised. Therefore, fog computing, as a well-known distributed architecture, could help to solve such challenges. In fog computing architecture, processing components are placed between the end devices and cloud components, and they execute applications. This architecture is suitable for such applications as healthcare systems that need a real-time response and low latency. In this paper, a systematic review of available approaches in the field of fog-based healthcare systems is proposed; the challenges of its application in healthcare are explored, classified, and discussed. First, the fog computing approaches in healthcare are categorized into three main classes: communication, application, and resource/service. Then, they are discussed and compared based on their tools, evaluation methods, and evaluation metrics. Finally, based on observations, some open issues and challenges are highlighted for further studies in fog-based healthcare.
Collapse
|
29
|
Actuator behaviour modelling in IoT-Fog-Cloud simulation. PeerJ Comput Sci 2021; 7:e651. [PMID: 34401476 PMCID: PMC8330428 DOI: 10.7717/peerj-cs.651] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/11/2020] [Accepted: 07/05/2021] [Indexed: 06/13/2023]
Abstract
The inevitable evolution of information technology has led to the creation of IoT-Fog-Cloud systems, which combine the Internet of Things (IoT), Cloud Computing and Fog Computing. IoT systems are composed of possibly up to billions of smart devices, sensors and actuators connected through the Internet, and these components continuously generate large amounts of data. Cloud and fog services assist the data processing and storage needs of IoT devices. The behaviour of these devices can change dynamically (e.g. properties of data generation or device states). We refer to systems allowing behavioural changes in physical position (i.e. geolocation), as the Internet of Mobile Things (IoMT). The investigation and detailed analysis of such complex systems can be fostered by simulation solutions. The currently available, related simulation tools are lacking a generic actuator model including mobility management. In this paper, we present an extension of the DISSECT-CF-Fog simulator to support the analysis of arbitrary actuator events and mobility capabilities of IoT devices in IoT-Fog-Cloud systems. The main contributions of our work are: (i) a generic actuator model and its implementation in DISSECT-CF-Fog, and (ii) the evaluation of its use through logistics and healthcare scenarios. Our results show that we can successfully model IoMT systems and behavioural changes of actuators in IoT-Fog-Cloud systems in general, and analyse their management issues in terms of usage cost and execution time.
Collapse
|
30
|
Dynamic sampling of images from various categories for classification based incremental deep learning in fog computing. PeerJ Comput Sci 2021; 7:e633. [PMID: 34322595 PMCID: PMC8293927 DOI: 10.7717/peerj-cs.633] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/05/2021] [Accepted: 06/18/2021] [Indexed: 06/13/2023]
Abstract
Incremental learning evolves deep neural network knowledge over time by learning continuously from new data instead of training a model just once with all data present before the training starts. However, in incremental learning, new samples are always streaming in whereby the model to be trained needs to continuously adapt to new samples. Images are considered to be high dimensional data and thus training deep neural networks on such data is very time-consuming. Fog computing is a paradigm that uses fog devices to carry out computation near data sources to reduce the computational load on the server. Fog computing allows democracy in deep learning by enabling intelligence at the fog devices, however, one of the main challenges is the high communication costs between fog devices and the centralized servers especially in incremental learning where data samples are continuously arriving and need to be transmitted to the server for training. While working with Convolutional Neural Networks (CNN), we demonstrate a novel data sampling algorithm that discards certain training images per class before training even starts which reduces the transmission cost from the fog device to the server and the model training time while maintaining model learning performance both for static and incremental learning. Results show that our proposed method can effectively perform data sampling regardless of the model architecture, dataset, and learning settings.
Collapse
|
31
|
FogFrame: a framework for IoT application execution in the fog. PeerJ Comput Sci 2021; 7:e588. [PMID: 34307857 PMCID: PMC8279146 DOI: 10.7717/peerj-cs.588] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 02/19/2021] [Accepted: 05/20/2021] [Indexed: 06/13/2023]
Abstract
Recently, a multitude of conceptual architectures and theoretical foundations for fog computing have been proposed. Despite this, there is still a lack of concrete frameworks to setup real-world fog landscapes. In this work, we design and implement the fog computing framework FogFrame-a system able to manage and monitor edge and cloud resources in fog landscapes and to execute Internet of Things (IoT) applications. FogFrame provides communication and interaction as well as application management within a fog landscape, namely, decentralized service placement, deployment and execution. For service placement, we formalize a system model, define an objective function and constraints, and solve the problem implementing a greedy algorithm and a genetic algorithm. The framework is evaluated with regard to Quality of Service parameters of IoT applications and the utilization of fog resources using a real-world operational testbed. The evaluation shows that the service placement is adapted according to the demand and the available resources in the fog landscape. The greedy placement leads to the maximum utilization of edge devices keeping at the edge as many services as possible, while the placement based on the genetic algorithm keeps devices from overloads by balancing between the cloud and edge. When comparing edge and cloud deployment, the service deployment time at the edge takes 14% of the deployment time in the cloud. If fog resources are utilized at maximum capacity, and a new application request arrives with the need of certain sensor equipment, service deployment becomes impossible, and the application needs to be delegated to other fog resources. The genetic algorithm allows to better accommodate new applications and keep the utilization of edge devices at about 50% CPU. During the experiments, the framework successfully reacts to runtime events: (i) services are recovered when devices disappear from the fog landscape; (ii) cloud resources and highly utilized devices are released by migrating services to new devices; (iii) and in case of overloads, services are migrated in order to release resources.
Collapse
|
32
|
Smart SDN Management of Fog Services to Optimize QoS and Energy. SENSORS 2021; 21:s21093105. [PMID: 33946909 PMCID: PMC8124283 DOI: 10.3390/s21093105] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/09/2021] [Revised: 04/23/2021] [Accepted: 04/26/2021] [Indexed: 11/16/2022]
Abstract
The short latency required by IoT devices that need to access specific services have led to the development of Fog architectures that can serve as a useful intermediary between IoT systems and the Cloud. However, the massive numbers of IoT devices that are being deployed raise concerns about the power consumption of such systems as the number of IoT devices and Fog servers increase. Thus, in this paper, we describe a software-defined network (SDN)-based control scheme for client–server interaction that constantly measures ongoing client–server response times and estimates network power consumption, in order to select connection paths that minimize a composite goal function, including both QoS and power consumption. The approach using reinforcement learning with neural networks has been implemented in a test-bed and is detailed in this paper. Experiments are presented that show the effectiveness of our proposed system in the presence of a time-varying workload of client-to-service requests, resulting in a reduction of power consumption of approximately 15% for an average response time increase of under 2%.
Collapse
|
33
|
Trust Enforced Computational Offloading for Health Care Applications in Fog Computing. WIRELESS PERSONAL COMMUNICATIONS 2021; 119:1369-1386. [PMID: 33840908 PMCID: PMC8022126 DOI: 10.1007/s11277-021-08285-7] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Accepted: 02/08/2021] [Indexed: 06/12/2023]
Abstract
Internet of Things (IoT) is a network of internet connected devices that generates huge amount of data every day. The usage of IoT devices such as smart wearables, smart phones, smart cities are increasing in the linear scale. Health care is one of the primary applications today that uses IoT devices. Data generated in this application may need computation, storage and data analytics operations which requires resourceful environment for remote patient health monitoring. The data related with health care applications are primarily private and should be readily available to the users. Enforcing these two constraints in cloud environment is a hard task. Fog computing is an emergent architecture for providing computation, storage, control and network services within user's proximity. To handle private data, the processing elements should be trustable entities in Fog environment. In this paper we propose novel Trust Enforced computation ofFLoading technique for trust worthy applications using fOg computiNg (TEFLON). The proposed system comprises of two algorithms namely optimal service offloader and trust assessment for addressing security and trust issues with reduced response time. And the simulation results show that proposed TEFLON framework improves success rate of fog collaboration with reduced average latency for delay sensitive applications and ensures trust for trustworthy applications.
Collapse
|
34
|
A novel IoT-based health and tactical analysis model with fog computing. PeerJ Comput Sci 2021; 7:e342. [PMID: 33816993 PMCID: PMC7959607 DOI: 10.7717/peerj-cs.342] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/07/2020] [Accepted: 11/30/2020] [Indexed: 06/12/2023]
Abstract
In sports competitions, depending on the conditions such as excitement, stress, fatigue, etc. during the match, negative situations such as disability or loss of life may occur for players and spectators. Therefore, it is extremely important to constantly check their health. In addition, some strategic analyzes are made during the match. According to the results of these analyzes, the technical team affects the course of the match. Effects can have positive and sometimes negative results. In this article, fog computing and an Internet of Things (IoT) based architecture are proposed to produce new technical strategies and to avoid disabilities. Players and spectators are monitored with sensors such as blood pressure, body temperature, heart rate, location etc. The data obtained from the sensors are processed in the fog layer and the resulting information is sent to the devices of the technical team and club doctors. In the architecture based on fog computing and IoT, priority processes are computed with low latency. For this, a task management algorithm based on priority queue and list of fog nodes is modified in the fog layer. Authentication and data confidentiality are provided with the Federated Lightweight Authentication of Things (FLAT) method used in the proposed model. In addition, using the Software Defined Network controller based on blockchain technology ensures data integrity.
Collapse
|
35
|
FoBSim: an extensible open-source simulation tool for integrated fog-blockchain systems. PeerJ Comput Sci 2021; 7:e431. [PMID: 33977127 PMCID: PMC8056250 DOI: 10.7717/peerj-cs.431] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/31/2020] [Accepted: 02/15/2021] [Indexed: 05/14/2023]
Abstract
A lot of hard work and years of research are still needed for developing successful Blockchain (BC) applications. Although it is not yet standardized, BC technology was proven as to be an enhancement factor for security, decentralization, and reliability, leading to be successfully implemented in cryptocurrency industries. Fog computing (FC) is one of the recently emerged paradigms that needs to be improved to serve Internet of Things (IoT) environments of the future. As hundreds of projects, ideas, and systems were proposed, one can find a great R&D potential for integrating BC and FC technologies. Examples of organizations contributing to the R&D of these two technologies, and their integration, include Linux, IBM, Google, Microsoft, and others. To validate an integrated Fog-Blockchain protocol or method implementation, before the deployment phase, a suitable and accurate simulation environment is needed. Such validation should save a great deal of costs and efforts on researchers and companies adopting this integration. Current available simulation environments facilitate Fog simulation, or BC simulation, but not both. In this paper, we introduce a Fog-Blockchain simulator, namely FoBSim, with the main goal to ease the experimentation and validation of integrated Fog-Blockchain approaches. According to our proposed workflow of simulation, we implement different Consensus Algorithms (CA), different deployment options of the BC in the FC architecture, and different functionalities of the BC in the simulation. Furthermore, technical details and algorithms on the simulated integration are provided. We validate FoBSim by describing the technologies used within FoBSim, highlighting FoBSim's novelty compared to the state-of-the-art, discussing the event validity in FoBSim, and providing a clear walk-through validation. Finally, we simulate case studies, then present and analyze the obtained results, where deploying the BC network in the fog layer shows enhanced efficiency in terms of total run time and total storage cost.
Collapse
|
36
|
Matching IoT Devices to the Fog Service Providers: A Mechanism Design Perspective. SENSORS 2020; 20:s20236761. [PMID: 33256006 PMCID: PMC7730117 DOI: 10.3390/s20236761] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 10/29/2020] [Revised: 11/19/2020] [Accepted: 11/23/2020] [Indexed: 11/17/2022]
Abstract
In the Internet of Things (IoT) + Fog + Cloud architecture, with the unprecedented growth of IoT devices, one of the challenging issues that needs to be tackled is to allocate Fog service providers (FSPs) to IoT devices, especially in a game-theoretic environment. Here, the issue of allocation of FSPs to the IoT devices is sifted with game-theoretic idea so that utility maximizing agents may be benign. In this scenario, we have multiple IoT devices and multiple FSPs, and the IoT devices give preference ordering over the subset of FSPs. Given such a scenario, the goal is to allocate at most one FSP to each of the IoT devices. We propose mechanisms based on the theory of mechanism design without money to allocate FSPs to the IoT devices. The proposed mechanisms have been designed in a flexible manner to address the long and short duration access of the FSPs to the IoT devices. For analytical results, we have proved the economic robustness, and probabilistic analyses have been carried out for allocation of IoT devices to the FSPs. In simulation, mechanism efficiency is laid out under different scenarios with an implementation in Python.
Collapse
|
37
|
A home hospitalization system based on the Internet of things, Fog computing and cloud computing. INFORMATICS IN MEDICINE UNLOCKED 2020; 20:100368. [PMID: 32537483 PMCID: PMC7282767 DOI: 10.1016/j.imu.2020.100368] [Citation(s) in RCA: 37] [Impact Index Per Article: 9.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/29/2020] [Revised: 06/03/2020] [Accepted: 06/07/2020] [Indexed: 02/06/2023] Open
Abstract
In recent years, the world has witnessed a significant increase in the number of elderly who often suffer from chronic diseases, and has witnessed in recent months a major spread of the new coronavirus (COVID-19), which has led to thousands of deaths, especially among the elderly and people who suffer from chronic diseases. Coronavirus has also caused many problems in hospitals, where these are no longer able to accommodate a large number of patients. This virus has also begun to spread between medical and paramedical teams, and this causes a major risk to the health of patients staying in hospitals. To reduce the spread of the virus and maintain the health of patients who need a hospital stay, home hospitalization is one of the best possible solutions. This paper proposes a home hospitalization system based on the Internet of Things (IoT), Fog computing, and Cloud computing, which are among the most important technologies that have contributed to the development of the healthcare sector in a significant way. These systems allow patients to recover and receive treatment in their homes and among their families, where patient health and the hospitalization room environmental state are monitored, to enable doctors to follow the hospitalization process and make recommendations to patients and their supervisors, through monitoring units and mobile applications developed for this purpose. The results of evaluation have shown great acceptance of this system by patients and doctors alike. A home hospitalization system based on the Internet of Things (IoT), Fog computing and Cloud computing, has been proposed. An environmental sensing unit and a vital signs sensing unit were developed. Mobile applications have been developed for doctors, nurses, patients, and their relatives. The proposed home hospitalization system was evaluated by patients and doctors.
Collapse
|
38
|
A re-organizing biosurveillance framework based on fog and mobile edge computing. MULTIMEDIA TOOLS AND APPLICATIONS 2020; 80:16805-16825. [PMID: 32837246 PMCID: PMC7244940 DOI: 10.1007/s11042-020-09050-x] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/30/2019] [Revised: 04/27/2020] [Accepted: 05/07/2020] [Indexed: 05/29/2023]
Abstract
Biological threats are becoming a serious security issue for many countries across the world. Effective biosurveillance systems can primarily support appropriate responses to biological threats and consequently save human lives. Nevertheless, biosurveillance systems are costly to implement and hard to operate. Furthermore, they rely on static infrastructures that might not cope with the evolving dynamics of the monitored environment. In this paper, we present a reorganizing biosurveillance framework for the detection and localization of biological threats with fog and mobile edge computing support. In the proposed framework, a hierarchy of fog nodes are responsible for aggregating monitoring data within their regions and detecting potential threats. Although fog nodes are deployed on a fixed base station infrastructure, the framework provides an innovative technique for reorganizing the monitored environment structure to adapt to the evolving environmental conditions and to overcome the limitations of the static base station infrastructure. Evaluation results illustrate the ability of the framework to localize biological threats and detect infected areas. Moreover, the results show the effectiveness of the reorganization mechanisms in adjusting the environment structure to cope with the highly dynamic environment.
Collapse
|
39
|
Trends in IoT based solutions for health care: Moving AI to the edge. Pattern Recognit Lett 2020; 135:346-353. [PMID: 32406416 PMCID: PMC7217772 DOI: 10.1016/j.patrec.2020.05.016] [Citation(s) in RCA: 49] [Impact Index Per Article: 12.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/31/2020] [Revised: 04/28/2020] [Accepted: 05/11/2020] [Indexed: 11/18/2022]
Abstract
In recent times, we assist to an ever growing diffusion of smart medical sensors and Internet of things devices that are heavily changing the way healthcare is approached worldwide. In this context, a combination of Cloud and IoT architectures is often exploited to make smart healthcare systems capable of supporting near realtime applications when processing and performing Artificial Intelligence on the huge amount of data produced by wearable sensor networks. Anyway, the response time and the availability of cloud based systems, together with security and privacy, still represent critical issues that prevents Internet of Medical Things (IoMT) devices and architectures from being a reliable and effective solution to the aim. Lately, there is a growing interest towards architectures and approaches that exploit Edge and Fog computing as an answer to compensate the weaknesses of the cloud. In this paper, we propose a short review about the general use of IoT solutions in health care, starting from early health monitoring solutions from wearable sensors up to a discussion about the latest trends in fog/edge computing for smart health.
Collapse
|
40
|
Fog computing at industrial level, architecture, latency, energy, and security: A review. Heliyon 2020; 6:e03706. [PMID: 32300668 PMCID: PMC7150518 DOI: 10.1016/j.heliyon.2020.e03706] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/22/2019] [Revised: 09/10/2019] [Accepted: 03/26/2020] [Indexed: 11/10/2022] Open
Abstract
The industrial applications in the cloud do not meet the requirements of low latency and reliability since variables must be continuously monitored. For this reason, industrial internet of things (IIoT) is a challenge for the current infrastructure because it generates a large amount of data making cloud computing reach the edge and become fog computing (FC). FC can be considered as a new component of Industry 4.0, which aims to solve the problem of big data, reduce energy consumption in industrial sensor networks, improve the security, processing and storage real-time data. It is a promising growing paradigm that offers new opportunities and challenges, beside the ones inherited from cloud computing, which requires a new heterogeneous architecture to improve the network capacity for delivering edge services, that is, providing computing resources closer to the end user. The purpose of this research is to show a systematic review of the most recent studies about the architecture, security, latency, and energy consumption that FC presents at industrial level and thus provide an overview of the current characteristics and challenges of this new technology.
Collapse
|
41
|
Advancing the State of the Fog Computing to Enable 5G Network Technologies. SENSORS (BASEL, SWITZERLAND) 2020; 20:E1754. [PMID: 32245261 PMCID: PMC7146597 DOI: 10.3390/s20061754] [Citation(s) in RCA: 16] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/27/2020] [Revised: 03/12/2020] [Accepted: 03/18/2020] [Indexed: 12/03/2022]
Abstract
Fog Computing (FC) is promising to Internet architecture for the emerging of modern technological approaches such as Fifth Generation (5G) networks and the Internet of Things (IoT). These are the advanced technologies that enable Internet architecture to enhance the data dissemination services based on numerous sensors generating continuous sensory information. It is tough for the current Internet architecture to meet up with the growing demands of the users for such a massive amount of information. Therefore, it needs to adopt modern technologies for efficient data dissemination services across the Internet. Thus, the FC and 5G are updating the data transmission using new technological approaches that are intelligently processing data to provide enhanced communications. This study proposes necessary measures to boost the growth of FC to 5G network usage. It is done by taking an extensive review of how 5G operates as well as studying its taxonomy, the idea of IoT, reviewed projects on IoT applicability, comparison of computing technologies, and the importance of FC. Moreover, it elaborates dynamic issues of computing network technologies, and information is provided on how to remedy these for future recommendations in the field of research and computing network technologies. This paper heavily focuses on the applications of FC as an enabler to the 5G network by identifying the necessary services and network-oriented features that are needed to be used in the place for an improved future enterprise network technology.
Collapse
|
42
|
An E-health system for monitoring elderly health based on Internet of Things and Fog computing. Health Inf Sci Syst 2019; 7:24. [PMID: 31695910 DOI: 10.1007/s13755-019-0087-z] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/17/2019] [Accepted: 10/14/2019] [Indexed: 11/28/2022] Open
Abstract
With the significant increase in the number of elderly in the world and the resulting health problems of these increasing, finding technical solutions to address this problem has become a pressing necessity, particularly in the field of health care. This paper proposes an e-health system for monitoring elderly health based on the Internet of Things (IoT) and Fog computing. The system was developed using Mysignals HW V2 platform and an Android app that plays the role of Fog server, which enables the collection of physiological parameters and general health parameters from elderly periodically. This Android app enables also the elderly and their families to follow their health, and they can also communicate with health care providers (administrators and doctors) and receive recommendations, notifications and alerts. By evaluating this system, we find the most users they consider useful, easy to use and learn, suggesting that our proposal can improve the quality of health care for elderly.
Collapse
|
43
|
IoT Security Configurability with Security-by-Contract. SENSORS 2019; 19:s19194121. [PMID: 31548501 PMCID: PMC6806331 DOI: 10.3390/s19194121] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.6] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/15/2019] [Revised: 09/16/2019] [Accepted: 09/19/2019] [Indexed: 11/18/2022]
Abstract
Cybersecurity is one of the biggest challenges in the Internet of Things (IoT) domain, as well as one of its most embarrassing failures. As a matter of fact, nowadays IoT devices still exhibit various shortcomings. For example, they lack secure default configurations and sufficient security configurability. They also lack rich behavioural descriptions, failing to list provided and required services. To answer this problem, we envision a future where IoT devices carry behavioural contracts and Fog nodes store network policies. One requirement is that contract consistency must be easy to prove. Moreover, contracts must be easy to verify against network policies. In this paper, we propose to combine the security-by-contract (S × C) paradigm with Fog computing to secure IoT devices. Following our previous work, first we formally define the pillars of our proposal. Then, by means of a running case study, we show that we can model communication flows and prevent information leaks. Last, we show that our contribution enables a holistic approach to IoT security, and that it can also prevent unexpected chains of events.
Collapse
|
44
|
A study on medical Internet of Things and Big Data in personalized healthcare system. Health Inf Sci Syst 2018; 6:14. [PMID: 30279984 PMCID: PMC6146872 DOI: 10.1007/s13755-018-0049-x] [Citation(s) in RCA: 65] [Impact Index Per Article: 10.8] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/29/2018] [Accepted: 08/12/2018] [Indexed: 12/26/2022] Open
Abstract
Personalized healthcare systems deliver e-health services to fulfill the medical and assistive needs of the aging population. Internet of Things (IoT) is a significant advancement in the Big Data era, which supports many real-time engineering applications through enhanced services. Analytics over data streams from IoT has become a source of user data for the healthcare systems to discover new information, predict early detection, and makes decision over the critical situation for the improvement of the quality of life. In this paper, we have made a detailed study on the recent emerging technologies in the personalized healthcare systems with the focus towards cloud computing, fog computing, Big Data analytics, IoT and mobile based applications. We have analyzed the challenges in designing a better healthcare system to make early detection and diagnosis of diseases and discussed the possible solutions while providing e-health services in secure manner. This paper poses a light on the rapidly growing needs of the better healthcare systems in real-time and provides possible future work guidelines.
Collapse
|
45
|
A Capillary Computing Architecture for Dynamic Internet of Things: Orchestration of Microservices from Edge Devices to Fog and Cloud Providers. SENSORS (BASEL, SWITZERLAND) 2018; 18:E2938. [PMID: 30181454 PMCID: PMC6164252 DOI: 10.3390/s18092938] [Citation(s) in RCA: 61] [Impact Index Per Article: 10.2] [Reference Citation Analysis] [Abstract] [Key Words] [Grants] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 08/10/2018] [Revised: 08/31/2018] [Accepted: 09/02/2018] [Indexed: 11/16/2022]
Abstract
The adoption of advanced Internet of Things (IoT) technologies has impressively improved in recent years by placing such services at the extreme Edge of the network. There are, however, specific Quality of Service (QoS) trade-offs that must be considered, particularly in situations when workloads vary over time or when IoT devices are dynamically changing their geographic position. This article proposes an innovative capillary computing architecture, which benefits from mainstream Fog and Cloud computing approaches and relies on a set of new services, including an Edge/Fog/Cloud Monitoring System and a Capillary Container Orchestrator. All necessary Microservices are implemented as Docker containers, and their orchestration is performed from the Edge computing nodes up to Fog and Cloud servers in the geographic vicinity of moving IoT devices. A car equipped with a Motorhome Artificial Intelligence Communication Hardware (MACH) system as an Edge node connected to several Fog and Cloud computing servers was used for testing. Compared to using a fixed centralized Cloud provider, the service response time provided by our proposed capillary computing architecture was almost four times faster according to the 99th percentile value along with a significantly smaller standard deviation, which represents a high QoS.
Collapse
|
46
|
Kyasanur Forest Disease Classification Framework Using Novel Extremal Optimization Tuned Neural Network in Fog Computing Environment. J Med Syst 2018; 42:187. [PMID: 30173290 PMCID: PMC7088392 DOI: 10.1007/s10916-018-1041-3] [Citation(s) in RCA: 11] [Impact Index Per Article: 1.8] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 07/19/2018] [Accepted: 08/20/2018] [Indexed: 11/23/2022]
Abstract
Kyasanur Forest Disease (KFD) is a life-threatening tick-borne viral infectious disease endemic to South Asia and has been taking so many lives every year in the past decade. But recently, this disease has been witnessed in other regions to a large extent and can become an epidemic very soon. In this paper, a new fog computing based e-Healthcare framework has been proposed to monitor the KFD infected patients in an early phase of infection and control the disease outbreak. For ensuring high prediction rate, a novel Extremal Optimization tuned Neural Network (EO-NN) classification algorithm has been developed using hybridization of the extremal optimization with the feed-forward neural network. Additionally, a location based alert system has also been suggested to provide the global positioning system (GPS)-based location information of each KFD infected user and the risk-prone zones as early as possible to prevent the outbreak. Furthermore, a comparative study of proposed EO-NN with state of art classification algorithms has been carried out and it can be concluded that EO-NN outperforms others with an average accuracy of 91.56%, a sensitivity of 91.53% and a specificity of 97.13% respectively in classification and accurate identification of risk-prone areas.
Collapse
|
47
|
A security mechanism based on evolutionary game in fog computing. Saudi J Biol Sci 2018; 25:237-241. [PMID: 29472771 PMCID: PMC5816014 DOI: 10.1016/j.sjbs.2017.09.010] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 08/01/2017] [Revised: 09/25/2017] [Accepted: 09/27/2017] [Indexed: 11/17/2022] Open
Abstract
Fog computing is a distributed computing paradigm at the edge of the network and requires cooperation of users and sharing of resources. When users in fog computing open their resources, their devices are easily intercepted and attacked because they are accessed through wireless network and present an extensive geographical distribution. In this study, a credible third party was introduced to supervise the behavior of users and protect the security of user cooperation. A fog computing security mechanism based on human nervous system is proposed, and the strategy for a stable system evolution is calculated. The MATLAB simulation results show that the proposed mechanism can reduce the number of attack behaviors effectively and stimulate users to cooperate in application tasks positively.
Collapse
|
48
|
Wearable IoT sensor based healthcare system for identifying and controlling chikungunya virus. COMPUT IND 2017; 91:33-44. [PMID: 32287550 PMCID: PMC7114341 DOI: 10.1016/j.compind.2017.05.006] [Citation(s) in RCA: 93] [Impact Index Per Article: 13.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/02/2016] [Revised: 05/05/2017] [Accepted: 05/31/2017] [Indexed: 11/23/2022]
Abstract
Chikungunya is a vector borne disease that spreads quickly in geographically affected areas. Its outbreak results in acute illness that may lead to chronic phase. Chikungunya virus (CHV) diagnosis solutions are not easily accessible and affordable in developing countries. Also old approaches are very slow in identifying and controlling the spread of CHV outbreak. The sudden development and advancement of wearable internet of things (IoT) sensors, fog computing, mobile technology, cloud computing and better internet coverage have enhanced the quality of remote healthcare services. IoT assisted fog health monitoring system can be used to identify possibly infected users from CHV in an early phase of their illness so that the outbreak of CHV can be controlled. Fog computing provides many benefits such as low latency, minimum response time, high mobility, enhanced service quality, location awareness and notification service itself at the edge of the network. In this paper, IoT and fog based healthcare system is proposed to identify and control the outbreak of CHV. Fuzzy-C means (FCM) is used to diagnose the possibly infected users and immediately generate diagnostic and emergency alerts to users from fog layer. Furthermore on cloud server, social network analysis (SNA) is used to represent the state of CHV outbreak. Outbreak role index is calculated from SNA graph which represents the probability of any user to receive or spread the infection. It also generates warning alerts to government and healthcare agencies to control the outbreak of CHV in risk prone or infected regions. The experimental results highlight the advantages of using both fog computing and cloud computing services together for achieving network bandwidth efficiency, high quality of service and minimum response time in generation of real time notification as compared to a cloud only model.
Collapse
|
49
|
A resource-sharing model based on a repeated game in fog computing. Saudi J Biol Sci 2017; 24:687-694. [PMID: 28386197 PMCID: PMC5372394 DOI: 10.1016/j.sjbs.2017.01.043] [Citation(s) in RCA: 50] [Impact Index Per Article: 7.1] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 10/23/2016] [Revised: 12/23/2016] [Accepted: 01/07/2017] [Indexed: 11/30/2022] Open
Abstract
With the rapid development of cloud computing techniques, the number of users is undergoing exponential growth. It is difficult for traditional data centers to perform many tasks in real time because of the limited bandwidth of resources. The concept of fog computing is proposed to support traditional cloud computing and to provide cloud services. In fog computing, the resource pool is composed of sporadic distributed resources that are more flexible and movable than a traditional data center. In this paper, we propose a fog computing structure and present a crowd-funding algorithm to integrate spare resources in the network. Furthermore, to encourage more resource owners to share their resources with the resource pool and to supervise the resource supporters as they actively perform their tasks, we propose an incentive mechanism in our algorithm. Simulation results show that our proposed incentive mechanism can effectively reduce the SLA violation rate and accelerate the completion of tasks.
Collapse
|