[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Machine Learning-based Mist Computing Enabled Internet of Battlefield Things

Published: 01 September 2021 Publication History

Abstract

The rapid advancement in information and communication technology has revolutionized military departments and their operations. This advancement also gave birth to the idea of the Internet of Battlefield Things (IoBT). The IoBT refers to the fusion of the Internet of Things (IoT) with military operations on the battlefield. Various IoBT-based frameworks have been developed for the military. Nonetheless, many of these frameworks fail to maintain a high Quality of Service (QoS) due to the demanding and critical nature of IoBT. This study makes the use of mist computing while leveraging machine learning. Mist computing places computational capabilities on the edge itself (mist nodes), e.g., on end devices, wearables, sensors, and micro-controllers. This way, mist computing not only decreases latency but also saves power consumption and bandwidth as well by eliminating the need to communicate all data acquired, produced, or sensed. A mist-based version of the IoTNetWar framework is also proposed in this study. The mist-based IoTNetWar framework is a four-layer structure that aims at decreasing latency while maintaining QoS. Additionally, to further minimize delays, mist nodes utilize machine learning. Specifically, they use the delay-based K nearest neighbour algorithm for device-to-device communication purposes. The primary research objective of this work is to develop a system that is not only energy, time, and bandwidth-efficient, but it also helps military organizations with time-critical and resources-critical scenarios to monitor troops. By doing so, the system improves the overall decision-making process in a military campaign or battle. The proposed work is evaluated with the help of simulations in the EdgeCloudSim. The obtained results indicate that the proposed framework can achieve decreased network latency of 0.01 s and failure rate of 0.25% on average while maintaining high QoS in comparison to existing solutions.

References

[1]
Fariha Afsana, Md Asif-Ur-Rahman, Muhammad R. Ahmed, Mufti Mahmud, and M. Shamim Kaiser. 2018. An energy conserving routing scheme for wireless body sensor nanonetwork communication. IEEE Access 6 (2018), 9186–9200.
[2]
Bengt Ahlgren, Pedro A. Aranda, Prosper Chemouil, Sara Oueslati, Luis M. Correia, Holger Karl, Michael Söllner, and Annikki Welin. 2011. Content, connectivity, and cloud: Ingredients for the network of the future. IEEE Commun. Mag. 49, 7 (2011), 62–70.
[3]
Wajahat Ali, Ikram Ud Din, Ahmad Almogren, Mohsen Guizani, and Mansour Zuair. 2020. A lightweight privacy-aware IoT-based metering scheme for smart industrial ecosystems. IEEE Trans. Industr. Inf. 1, 1 (2020), 1–1.
[4]
Md Asif-Ur-Rahman, Fariha Afsana, Mufti Mahmud, M. Shamim Kaiser, Muhammad R. Ahmed, Omprakash Kaiwartya, and Anne James-Taylor. 2018. Towards a heterogeneous mist, fog, and cloud based framework for the Internet of Healthcare Things. IEEE IoT J. 6, 3 (2018), 4049–4062.
[5]
Kamran Ahmad Awan, Ikram Ud Din, Ahmad Almogren, Mohsen Guizani, and Sonia Khan. 2020. StabTrust—A stable and centralized trust-based clustering mechanism for IoT enabled vehicular ad-hoc networks. IEEE Access 8 (2020), 21159–21177.
[6]
Rabindra K. Barik, Amaresh Chandra Dubey, Ankita Tripathi, T. Pratik, Sapna Sasane, Rakesh K. Lenka, Harishchandra Dubey, Kunal Mankodiya, and Vinay Kumar. 2018. Mist data: Leveraging mist computing for secure and scalable architecture for smart and connected health. Proc. Comput. Sci. 125 (2018), 647–653.
[7]
Flavio Bonomi, Rodolfo Milito, Jiang Zhu, and Sateesh Addepalli. 2012. Fog computing and its role in the internet of things. In Proceedings of the 1st MCC Workshop on Mobile Cloud Computing, Vol. 1. ACM, 13–16.
[8]
Arne Bröring, Stefan Schmid, Corina-Kim Schindhelm, Abdelmajid Khelil, Sebastian Käbisch, Denis Kramer, Danh Le Phuoc, Jelena Mitic, Darko Anicic, and Ernest Teniente. 2017. Enabling IoT ecosystems through platform interoperability. IEEE Softw. 34, 1 (2017), 54–61.
[9]
Rodrigo N. Calheiros, Rajiv Ranjan, Anton Beloglazov, César A. F. De Rose, and Rajkumar Buyya. 2011. CloudSim: A toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Softw.: Pract. Exp. 41, 1 (2011), 23–50.
[10]
Louis Columbus. 2016. Roundup of internet of things forecasts and market estimates, 2016. Forbes Magazine. Retrieved fromhttps://www.forbes.com/sites/louiscolumbus/2016/11/27/roundup-ofinternet-of-things-forecasts-and-market-estimates-2016/#81d22e292d51.
[11]
Padraig Cunningham and Sarah Jane Delany. 2007. k-Nearest neighbour classifiers. Mult. Classif. Syst. 34, 8 (2007), 1–17.
[12]
Amir Vahid Dastjerdi and Rajkumar Buyya. 2016. Fog computing: Helping the Internet of Things realize its potential. Computer 49, 8 (2016), 112–116.
[13]
Flavia C. Delicato, Paulo F. Pires, Thais Batista, Everton Cavalcante, Bruno Costa, and Thomaz Barros. 2013. Towards an IoT ecosystem. In Proceedings of the 1st International Workshop on Software Engineering for Systems-of-Systems, Vol. 34. ACM, 25–28.
[14]
Jyoti Deogirikar and Amarsinh Vidhate. 2017. Security attacks in IoT: A survey. In Proceedings of the 2017 International Conference on IoT in Social, Mobile, Analytics and Cloud (I-SMAC’17). IEEE, 32–37.
[15]
Manuel Díaz, Cristian Martín, and Bartolomé Rubio. 2016. State-of-the-art, challenges, and open issues in the integration of Internet of things and cloud computing. J. Netw. Comput. Appl. 67 (2016), 99–117.
[16]
Ikram Ud Din, Ahmad Almogren, Mohsen Guizani, and Mansour Zuair. 2019. A decade of Internet of Things: Analysis in the light of healthcare applications. IEEE Access 7 (2019), 89967–89979.
[17]
Ikram Ud Din, Mohsen Guizani, Suhaidi Hassan, Byung-Seo Kim, Muhammad Khurram Khan, Mohammed Atiquzzaman, and Syed Hassan Ahmed. 2018. The Internet of Things: A review of enabled technologies and future challenges. IEEE Access 7 (2018), 7606–7640.
[18]
Ikram Ud Din, Mohsen Guizani, Joel J. P. C. Rodrigues, Suhaidi Hassan, and Valery V. Korotaev. 2019. Machine learning in the Internet of Things: Designed techniques for smart cities. Fut. Gener. Comput. Syst. 100 (2019), 826–843.
[19]
Koustabh Dolui and Soumya Kanti Datta. 2017. Comparison of edge computing implementations: Fog computing, cloudlet and mobile edge computing. In Proceedings of the 2017 Global Internet of Things Summit (GIoTS’17). IEEE, 1–6.
[20]
Miroslav Dulík and Miroslav Dulík Junior. 2016. Security in military cloud computing applications. Sci. Mil. J. 11, 1 (2016), 26.
[21]
Dave Evans. 2011. The Internet of Things: How the Next Evolution of the Internet Is Changing Everything, Cisco Independent Business Scientific Group White paper, Apr. 2011; 1–11. www.cisco.com/web/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
[22]
Wei Fan and Albert Bifet. 2013. Mining big data: Current status, and forecast to the future. ACM sIGKDD Explor. Newslett. 14, 2 (2013), 1–5.
[23]
Giancarlo Fortino, Mukaddim Pathan, and Giuseppe Di Fatta. 2012. BodyCloud: Integration of cloud computing and body sensor networks. In Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings. IEEE, 851–856.
[24]
Paula Fraga-Lamas, Tiago Fernández-Caramés, Manuel Suárez-Albela, Luis Castedo, and Miguel González-López. 2016. A review on internet of things for defense and public safety. Sensors 16, 10 (2016), 1644.
[25]
Kerim Goztepe, Ismet Cehreli, and S. Eyup Sensoy. 2013. A decision framework for combat cloud computing strategy. In Proceedings of the 6th International Information Security & Cryptology Conference, Vol. 9. Bildiriler Kitabı, Ankara, Turkey, 28–31.
[26]
Jayavardhana Gubbi, Rajkumar Buyya, Slaven Marusic, and Marimuthu Palaniswami. 2013. Internet of Things (IoT): A vision, architectural elements, and future directions. Fut. Gener. Comput. Syst. 29, 7 (2013), 1645–1660.
[27]
Monika Gupta. 2017. Fog computing pushing intelligence to the edge. Int. J. Sci. Technol. Eng. 3, 8 (2017), 42–46.
[28]
İsmail Güvenç, Ozgur Ozdemir, Yavuz Yapici, Hani Mehrpouyan, and David Matolak. 2017. Detection, localization, and tracking of unauthorized UAS and jammers. In Proceedings of the 2017 IEEE/AIAA 36th Digital Avionics Systems Conference (DASC’17). IEEE, 1–10.
[29]
Peter Hart. 1968. The condensed nearest neighbor rule (Corresp.). IEEE Trans. Inf. Theory 14, 3 (1968), 515–516.
[30]
Khalid Haseeb, Ahmad Almogren, Ikram Ud Din, Naveed Islam, and Ayman Altameem. 2020. SASC: Secure and authentication-based sensor cloud architecture for intelligent Internet of Things. Sensors 20, 9 (2020), 2468.
[31]
Khalid Haseeb, Ikram Ud Din, Ahmad Almogren, and Naveed Islam. 2020. An energy efficient and secure IoT-based WSN framework: An application to smart agriculture. Sensors 20, 7 (2020), 2081.
[32]
Cheng Huang, Rongxing Lu, and Kim-Kwang Raymond Choo. 2017. Vehicular fog computing: Architecture, use case, and security and forensic challenges. IEEE Commun. Mag. 55, 11 (2017), 105–111.
[33]
Naveed Islam, Yasir Faheem, Ikram Ud Din, Muhammad Talha, Mohsen Guizani, and Mudassir Khalil. 2019. A blockchain-based fog computing framework for activity recognition as an application to e-Healthcare services. Fut. Gener. Comput. Syst. 100 (2019), 569–578.
[34]
Naveed Islam, Khalid Haseeb, Ahmad Almogren, Ikram Ud Din, Mohsen Guizani, and Ayman Altameem. 2019. A framework for topological based map building: A solution to autonomous robot navigation in smart cities. Fut. Gener. Comput. Syst. 100 (10 2019), 1–24.
[35]
Bilal Jan, Haleem Farman, Murad Khan, Muhammad Talha, and Ikram Ud Din. 2019. Designing a smart transportation system: An Internet of Things and big data approach. IEEE Wireless Commun. 26, 4 (2019), 73–79.
[36]
Frank T Johnsen, Zbigniew Zieliński, Konrad Wrona, Niranjan Suri, Christoph Fuchs, Manas Pradhan, Janusz Furtak, Bogdan Vasilache, Vincenzo Pellegrini, Michał Dyk, et al. 2018. Application of IoT in military operations in a smart city. In Proceedings of the 2018 International Conference on Military Communications and Information Systems (ICMCIS’18). IEEE, 1–8.
[37]
Siddhesh P. Karekar and Sachin M. Vaidya. 2015. Perspective of decoy technique using mobile fog computing with effect to wireless environment. Int. J. Sci. Eng. Technol. Res. 4, 14 (2015), 2620–2626.
[38]
Shah Rukh Khan, Misba Sikandar, Ahmad Almogren, Ikram [Ud Din], Antonio Guerrieri, and Giancarlo Fortino. 2020. IoMT-based computational approach for detecting brain tumor. Fut. Gener. Comput. Syst. 109 (2020), 360–367.
[39]
Hasan Ali Khattak, Hafsa Arshad, Saif ul Islam, Ghufran Ahmed, Sohail Jabbar, Abdullahi Mohamud Sharif, and Shehzad Khalid. 2019. Utilization and load balancing in fog servers for health applications. EURASIP J. Wireless Commun. Netw. 2019, 1 (2019), 91.
[40]
Georgios Kontaxis, Michalis Polychronakis, and Angelos D. Keromytis. 2014. Computational decoys for cloud security. In Secure Cloud Computing. Springer, New York, NY, 261–270.
[41]
Alexander Kott, Ananthram Swami, and Bruce J. West. 2016. The internet of battle things. Computer 49, 12 (2016), 70–75.
[42]
Neeraj Kumar, Naveen Chilamkurti, and Subhas C. Misra. 2015. Bayesian coalition game for the internet of things: An ambient intelligence-based evaluation. IEEE Commun. Mag. 53, 1 (2015), 48–55.
[43]
Neeraj Kumar, Manoj Kumar, and R. B. Patel. 2011. Capacity and interference aware link scheduling with channel assignment in wireless mesh networks. J. Netw. Comput. Appl. 34, 1 (2011), 30–38.
[44]
Neeraj Kumar, Sudip Misra, Joel J. P. C. Rodrigues, and Mohammad S. Obaidat. 2015. Coalition games for spatio-temporal big data in Internet of Vehicles environment: A comparative analysis. IEEE IoT J. 2, 4 (2015), 310–320.
[45]
Neeraj Kumar, Athanasios V. Vasilakos, and Joel J. P. C. Rodrigues. 2017. A multi-tenant cloud-based DC nano grid for self-sustained smart buildings in smart cities. IEEE Commun. Mag. 55, 3 (2017), 14–21.
[46]
Aparna Kumari, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Michele Maasberg, and Kim-Kwang Raymond Choo. 2018. Multimedia big data computing and Internet of Things applications: A taxonomy and process model. J. Netw. Comput. Appl. 124 (2018), 169–195.
[47]
Divya Lanka, Ch Lakshmi Veenadhari, and D. Suryanarayana. 2017. Application of fog computing in military operations. Int. J. Comput. Appl. 975 (2017), 8887.
[48]
Chao Lin, Debiao He, Neeraj Kumar, Kim-Kwang Raymond Choo, Alexey Vinel, and Xinyi Huang. 2018. Security and privacy for the internet of drones: Challenges and solutions. IEEE Commun. Mag. 56, 1 (2018), 64–69.
[49]
Ying-Dar Lin and Yu-Ching Hsu. 2000. Multihop cellular: A new architecture for wireless communications. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM’00), Vol. 3. IEEE, 1273–1282.
[50]
Niall J. MacKay. 2006. Lanchester combat models. Bull. Inst. Math. Appl. 42, 170 (2006), 1–8.
[51]
Duncan McFarlane. 2015. The Origin of the Internet of Things. Retrieved from https://www.redbite.com/the-origin-of-the-internet-of-things/.
[52]
Donald Michie, David J. Spiegelhalter, C. C. Taylor, et al. 1994. Machine learning. Neural Stat. Class. 13 (1994), 19–22.
[53]
Manas Pradhan, Filippo Poltronieri, and Mauro Tortonesi. 2019. Generic architecture for edge computing based on SPF for military HADR operations. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT’19). IEEE, 225–230.
[54]
Jürgo S. Preden, Kalle Tammemäe, Axel Jantsch, Mairo Leier, Andri Riid, and Emine Calis. 2015. The benefits of self-awareness and attention in fog and mist computing. Computer 48, 7 (2015), 37–45.
[55]
Poonam N. Railkar, Sandesh Mahamure, and Parikshit N. Mahalle. 2012. Application security using blockchain in cyber physical system. CSI Commun. 41, 9 (2012), 25–28.
[56]
Partha Pratim Ray. 2015. Towards an internet of things based architectural framework for defence. In Proceedings of the 2015 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT’15). IEEE, 411–416.
[57]
J. Mounika Reddy and J. Mary Monika. 2012. Integrate military with distributed cloud computing and secure virtualization. In Proceedings of the 2012 SC Companion: High Performance Computing, Networking Storage and Analysis. IEEE, 1200–1206.
[58]
Giulio Riberto, Marco Govoni, Cesare Stefanelli, Niranjan Suri, and Mauro Tortonesi. 2018. Leveraging civilian IoT infrastructures to support warfighting activities in urban environments. In Proceedings of the 2018 IEEE 4th World Forum on Internet of Things (WF-IoT’18). IEEE, 118–123.
[59]
Daniel Rozas-Vásquez, Christine Fürst, Davide Geneletti, and Osvaldo Almendra. 2018. Integration of ecosystem services in strategic environmental assessment across spatial planning scales. Land Use Policy 71 (2018), 303–310.
[60]
Philip Russom et al. 2011. Big data analytics. TDWI Best Pract. Rep. Fourth Quart. 19, 4 (2011), 1–34.
[61]
Miguel Sánchez and Pietro Manzoni. 2001. ANEJOS: A java based simulator for ad hoc networks. Fut. Gener. Comput. Syst. 17, 5 (2001), 573–583.
[62]
Ichiro Satoh. 2013. A framework for data processing at the edges of networks. In Proceedings of the International Conference on Database and Expert Systems Applications. Springer, Berlin, 304–318.
[63]
Ayesha Siddiqua, Munam Ali Shah, Hasan Ali Khattak, Ikram [Ud Din], and Mohsen Guizani. 2019. iCAFE: Intelligent congestion avoidance and fast emergency services. Fut. Gener. Comput. Syst. 99 (2019), 365–375.
[64]
Misba Sikarndar, Waqas Anwar, Ahmad Almogren, Ikram Ud Din, and Nadra Guizani. 2020. IoMT-based association rule mining for the prediction of human protein complexes. IEEE Access 8 (2020), 6226–6237.
[65]
Dhananjay Singh, Gaurav Tripathi, Antonio M. Alberti, and Antonio Jara. 2017. Semantic edge computing and IoT architecture for military health services in battlefield. In Proceedings of the 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC’17). IEEE, 185–190.
[66]
Suresh Singh, Mike Woo, and Cauligi S. Raghavendra. 1998. Power-aware routing in mobile ad hoc networks. In Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking. ACM, 181–190.
[67]
Cagatay Sonmez, Atay Ozgovde, and Cem Ersoy. 2017. Performance evaluation of single-tier and two-tier cloudlet assisted applications. In Proceedings of the 2017 IEEE International Conference on Communications Workshops (ICC’17 Workshops). IEEE, 302–307.
[68]
Cagatay Sonmez, Atay Ozgovde, and Cem Ersoy. 2018. Edgecloudsim: An environment for performance evaluation of edge computing systems. Trans. Emerg. Telecommun. Technol. 29, 11 (2018), e3493.
[69]
Manuel Suárez-Albela, Paula Fraga-Lamas, and Tiago M. Fernández-Caramés. 2018. A practical evaluation on RSA and ECC-based cipher suites for IoT high-security energy-efficient fog and mist computing devices. Sensors 18, 11 (2018), 3868.
[70]
Niranjan Suri, Mauro Tortonesi, James Michaelis, Peter Budulas, Giacomo Benincasa, Stephen Russell, Cesare Stefanelli, and Robert Winkler. 2016. Analyzing the applicability of internet of things to the battlefield environment. In Proceedings of the 2016 International Conference on Military Communications and Information Systems (ICMCIS’16). IEEE, 1–8.
[71]
Asfa Toor, Saif ul Islam, Nimra Sohail, Adnan Akhunzada, Jalil Boudjadar, Hasan Ali Khattak, Ikram Ud Din, and Joel J. P. C. Rodrigues. 2019. Energy and performance aware fog computing: A case of DVFS and green renewable energy. Fut. Gener. Comput. Syst. 101 (2019), 1112–1121.
[72]
Ubaid Ullah, Anwar Khan, Mahdi Zareei, Ihsan Ali, Hasan Ali Khattak, and Ikram Ud Din. 2019. Energy-effective cooperative and reliable delivery routing protocols for underwater wireless sensor networks. Energies 12, 13 (2019), 2630.
[73]
Yiming Wang, Zhiyuan Ren, Hailin Zhang, Xiangwang Hou, and Yao Xiao. 2018. “Combat Cloud-Fog” network architecture for Internet of Battlefield Things and load balancing technology. In Proceedings of the 2018 IEEE International Conference on Smart Internet of Things (SmartIoT’18). IEEE, 263–268.
[74]
Peter Wittek and Xavier Rubio-Campillo. 2012. Military reconstructive simulation in the cloud to aid battlefield excavations. In Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings. IEEE, 869–874.
[75]
Xindong Wu, Xingquan Zhu, Gong-Qing Wu, and Wei Ding. 2013. Data mining with big data. IEEE Trans. Knowl. Data Eng. 26, 1 (2013), 97–107.
[76]
Manas Kumar Yogi, K. Chandrasekhar, and G. Vijay Kumar. 2017. Mist computing: Principles, trends and future direction. SSRG Int. J. Comput. Sci. Eng. 4, 7 (2017), 19–21.

Cited By

View all
  • (2024)A survey of indoor positioning systems based on a six-layer modelComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.110042237:COnline publication date: 4-Mar-2024
  • (2024)A Systematic Review on Federated Learning in Edge-Cloud ContinuumSN Computer Science10.1007/s42979-024-03235-z5:7Online publication date: 17-Sep-2024
  • (2023)Enhancing Energy Efficiency and Fast Decision Making for Medical Sensors in Healthcare Systems: An Overview and Novel ProposalSensors10.3390/s2316728623:16(7286)Online publication date: 20-Aug-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 21, Issue 4
November 2021
520 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/3472282
  • Editor:
  • Ling Lu
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 September 2021
Accepted: 01 July 2020
Revised: 01 June 2020
Received: 01 March 2020
Published in TOIT Volume 21, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Mist computing
  2. fog computing
  3. IoBT
  4. real-time system
  5. battlefield monitoring system
  6. device-to-device communication
  7. K nearest neighbours

Qualifiers

  • Research-article
  • Refereed

Funding Sources

  • King Saud University, Riyadh, Saudi Arabia, through Researchers Supporting Project

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)66
  • Downloads (Last 6 weeks)5
Reflects downloads up to 14 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A survey of indoor positioning systems based on a six-layer modelComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2023.110042237:COnline publication date: 4-Mar-2024
  • (2024)A Systematic Review on Federated Learning in Edge-Cloud ContinuumSN Computer Science10.1007/s42979-024-03235-z5:7Online publication date: 17-Sep-2024
  • (2023)Enhancing Energy Efficiency and Fast Decision Making for Medical Sensors in Healthcare Systems: An Overview and Novel ProposalSensors10.3390/s2316728623:16(7286)Online publication date: 20-Aug-2023
  • (2023)PQ-Mist: Priority Queueing-Assisted Mist–Cloud–Fog System for Geospatial Web ServicesMathematics10.3390/math1116356211:16(3562)Online publication date: 17-Aug-2023
  • (2023)Machine Learning Applications in Internet-of-Drones: Systematic Review, Recent Deployments, and Open IssuesACM Computing Surveys10.1145/357172855:12(1-45)Online publication date: 3-Mar-2023
  • (2023) Leveraging towards dynamic allocations of mist nodes for IoT-Mist-Fog-Cloud system using M/E r /1 queueing model 2023 OITS International Conference on Information Technology (OCIT)10.1109/OCIT59427.2023.10431331(59-64)Online publication date: 13-Dec-2023
  • (2023)Blockchain-based IoMT for an intelligent healthcare system using a drop-offs queue2023 First International Conference on Microwave, Antenna and Communication (MAC)10.1109/MAC58191.2023.10176337(1-6)Online publication date: 24-Mar-2023
  • (2023)JMDCJournal of Parallel and Distributed Computing10.1016/j.jpdc.2022.11.008173:C(83-93)Online publication date: 1-Mar-2023
  • (2023)An interconnected IoT-inspired network architecture for data visualization in remote sensing domainAlexandria Engineering Journal10.1016/j.aej.2023.08.07881(17-28)Online publication date: Oct-2023
  • (2023)Performance Evaluation of IoST–Mist–Fog–Cloud Framework for Geospatial Crime Data Visualization: A State Dependent Queueing ApproachSN Computer Science10.1007/s42979-023-02400-05:1Online publication date: 8-Dec-2023
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media