2020
DOI: 10.11591/ijece.v10i1.pp296-307
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative-hierarchical based edge-computing approach for resources allocation of distributed mobile and IoT applications

Abstract: <span lang="EN-US">Using mobile and Internet of Things (IoT) applications is becoming very popular and obtained researchers’ interest and commercial investment, in order to fulfill future vision and the requirements for smart cities. These applications have common demands such as fast response, distributed nature, and awareness of service location. However, these requirements’ nature cannot be satisfied by central systems services that reside in the clouds. Therefore, edge computing paradigm has emerged … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 30 publications
0
10
0
Order By: Relevance
“…Because of the increased level of digital data generation, combined with the increasing complexity of the data. It has become impossible to process them using conventional data processing methods; as a result, efforts are now being directed toward developing advanced computing infrastructures that can handle data volumes and complexity of this magnitude (referred to as parallel and distributed processing) [25]- [42].…”
Section: Introductionmentioning
confidence: 99%
“…Because of the increased level of digital data generation, combined with the increasing complexity of the data. It has become impossible to process them using conventional data processing methods; as a result, efforts are now being directed toward developing advanced computing infrastructures that can handle data volumes and complexity of this magnitude (referred to as parallel and distributed processing) [25]- [42].…”
Section: Introductionmentioning
confidence: 99%
“…The security of this technology is still a big question, because it is still unsafe by nature. For embedded systems, this is not a new security issue [1][2][3]. Security issues such as eavesdropping can illegally affect people's daily activities, even a -legitimate subject can collect data without user consent.…”
Section: Introductionmentioning
confidence: 99%
“…In cognitive radio field the secondary user (SU) detect the primary user bands and depends on this decision it selects the spectrum for its communication [4][5][6].The CR system could be single channel or Multi-channel, choosing the system according to needs, because each system has benefits and drawbacks. In CR system, the secondary user have to detect the vacant channel [7][8][9][10]. When a vacant channel is detected, the secondary system will access that channel.…”
Section: Introductionmentioning
confidence: 99%