|
|
xxiii | |
Acronyms |
|
xxix | |
|
Part I Fog Computing Systems and Architectures |
|
|
1 | (308) |
|
|
3 | (40) |
|
|
|
|
|
|
3 | (2) |
|
1.2 Mobile Fog Computing and Related Models |
|
|
5 | (1) |
|
1.3 The Needs of Mobile Fog Computing |
|
|
6 | (9) |
|
1.3.1 Infrastructural Mobile Fog Computing |
|
|
7 | (1) |
|
1.3.1.1 Road Crash Avoidance |
|
|
7 | (1) |
|
1.3.1.2 Marine Data Acquisition |
|
|
7 | (1) |
|
1.3.1.3 Forest Fire Detection |
|
|
8 | (1) |
|
1.3.1.4 Mobile Ambient Assisted Living |
|
|
9 | (1) |
|
|
9 | (2) |
|
|
11 | (1) |
|
1.3.4 Unmanned Aerial Vehicular Fog |
|
|
12 | (1) |
|
1.3.5 User Equipment-Based Fog |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
14 | (1) |
|
|
15 | (1) |
|
1.4 Communication Technologies |
|
|
15 | (3) |
|
|
15 | (1) |
|
|
16 | (1) |
|
1.4.3 WPAN, Short-Range Technologies |
|
|
17 | (1) |
|
1.4.4 LPWAN, Other Medium-and Long-Range Technologies |
|
|
18 | (1) |
|
1.5 Nonfunctional Requirements |
|
|
18 | (13) |
|
|
20 | (1) |
|
1.5.1.1 Server Heterogeneity |
|
|
21 | (1) |
|
1.5.1.2 End-Device Heterogeneity |
|
|
21 | (1) |
|
1.5.1.3 End-to-End Network Heterogeneity |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
1.5.2.3 End-to-end Context |
|
|
24 | (1) |
|
1.5.2.4 Application Context |
|
|
24 | (1) |
|
|
25 | (1) |
|
1.5.3.1 Application Management |
|
|
25 | (2) |
|
1.5.3.2 Cost of Energy and Tenancy |
|
|
27 | (1) |
|
|
27 | (1) |
|
1.5.4.1 Physical Placement |
|
|
27 | (1) |
|
1.5.4.2 Server Discoverability and Connectivity |
|
|
28 | (1) |
|
1.5.4.3 Operation Management |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
1.5.5.1 Physical Security |
|
|
30 | (1) |
|
1.5.5.2 End-to-End Security |
|
|
30 | (1) |
|
1.5.5.3 Security Monitoring and Management |
|
|
30 | (1) |
|
1.5.5.4 Trust Management and Multitenancy Security |
|
|
31 | (1) |
|
|
31 | (4) |
|
1.6.1 Challenges in Land Vehicular Fog Computing |
|
|
31 | (1) |
|
1.6.2 Challenges in Marine Fog Computing |
|
|
32 | (1) |
|
1.6.3 Challenges in Unmanned Aerial Vehicular Fog Computing |
|
|
32 | (1) |
|
1.6.4 Challenges in User Equipment-based Fog Computing |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
33 | (1) |
|
1.6.5.2 Autonomous Runtime Adjustment and Rapid Redeployment |
|
|
34 | (1) |
|
1.6.5.3 Scheduling of Fog Applications |
|
|
34 | (1) |
|
1.6.5.4 Scalable Resource Management of Fog Providers |
|
|
35 | (1) |
|
|
35 | (8) |
|
|
36 | (1) |
|
|
36 | (7) |
|
2 Edge and Fog: A Survey, Use Cases, and Future Challenges |
|
|
43 | (24) |
|
|
|
|
|
43 | (1) |
|
|
44 | (3) |
|
2.2.1 Edge Computing Architecture |
|
|
46 | (1) |
|
|
47 | (3) |
|
2.3.1 Fog Computing Architecture |
|
|
49 | (1) |
|
2.4 Fog and Edge Illustrative Use Cases |
|
|
50 | (7) |
|
2.4.1 Edge Computing Use Cases |
|
|
50 | (1) |
|
2.4.1.1 A Wearable ECG Sensor |
|
|
51 | (1) |
|
|
52 | (2) |
|
2.4.2 Fog Computing Use Cases |
|
|
54 | (1) |
|
2.4.2.1 Smart Traffic Light System |
|
|
54 | (1) |
|
2.4.2.2 Smart Pipeline Monitoring System |
|
|
55 | (2) |
|
|
57 | (4) |
|
2.5.1 Resource Management |
|
|
57 | (1) |
|
2.5.2 Security and Privacy |
|
|
58 | (3) |
|
|
61 | (1) |
|
|
61 | (6) |
|
|
62 | (1) |
|
|
62 | (5) |
|
3 Deep Learning in the Era of Edge Computing: Challenges and Opportunities |
|
|
67 | (12) |
|
|
|
|
|
|
|
|
|
|
67 | (1) |
|
3.2 Challenges and Opportunities |
|
|
68 | (8) |
|
3.2.1 Memory and Computational Expensiveness of DNN Models |
|
|
68 | (2) |
|
3.2.2 Data Discrepancy in Real-world Settings |
|
|
70 | (1) |
|
3.2.3 Constrained Battery Life of Edge Devices |
|
|
71 | (1) |
|
3.2.4 Heterogeneity in Sensor Data |
|
|
72 | (1) |
|
3.2.5 Heterogeneity in Computing Units |
|
|
73 | (1) |
|
3.2.6 Multitenancy of Deep Learning Tasks |
|
|
73 | (2) |
|
3.2.7 Offloading to Nearby Edges |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
76 | (3) |
|
|
77 | (2) |
|
4 Caching, Security, and Mobility in Content-centric Networking |
|
|
79 | (26) |
|
|
|
|
|
|
79 | (2) |
|
4.2 Caching and Fog Computing |
|
|
81 | (1) |
|
4.3 Mobility Management in CCN |
|
|
82 | (6) |
|
4.3.1 Classification of CCN Contents and their Mobility |
|
|
83 | (1) |
|
|
83 | (1) |
|
4.3.3 Server-side Mobility |
|
|
84 | (1) |
|
4.3.4 Direct Exchange for Location Update |
|
|
84 | (1) |
|
4.3.5 Query to the Rendezvous for Location Update |
|
|
84 | (1) |
|
4.3.6 Mobility with Indirection Point |
|
|
84 | (1) |
|
4.3.7 Interest Forwarding |
|
|
85 | (1) |
|
4.3.8 Proxy-based Mobility Management |
|
|
85 | (1) |
|
4.3.9 Tunnel-based Redirection (TBR) |
|
|
86 | (2) |
|
4.4 Security in Content-centric Networks |
|
|
88 | (3) |
|
4.4.1 Risks Due to Caching |
|
|
90 | (1) |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (10) |
|
4.5.1 Cache Allocation Approaches |
|
|
91 | (2) |
|
4.5.2 Data Allocation Approaches |
|
|
93 | (8) |
|
|
101 | (4) |
|
|
101 | (4) |
|
5 Security and Privacy Issues in Fog Computing |
|
|
105 | (34) |
|
|
|
|
|
|
105 | (2) |
|
|
107 | (2) |
|
|
109 | (4) |
|
|
109 | (4) |
|
|
113 | (4) |
|
|
114 | (3) |
|
|
117 | (3) |
|
5.5.1 Requirements of Privacy in IoT |
|
|
118 | (1) |
|
|
118 | (1) |
|
5.5.1.2 Communication Privacy |
|
|
118 | (1) |
|
|
118 | (1) |
|
5.5.1.4 Processing Privacy |
|
|
118 | (2) |
|
5.6 Web Semantics and Trust Management for Fog Computing |
|
|
120 | (3) |
|
5.6.1 Trust Through Web Semantics |
|
|
120 | (3) |
|
|
123 | (7) |
|
|
124 | (1) |
|
|
125 | (5) |
|
|
130 | (9) |
|
|
130 | (9) |
|
6 How Fog Computing Can Support Latency/Reliability-sensitive IoT Applications: An Overview and a Taxonomy of State-of-the-art Solutions |
|
|
139 | (76) |
|
|
|
|
|
|
Isam Mashhour Al Jawarneh |
|
|
|
|
139 | (3) |
|
6.2 Fog Computing for IoT: Definition and Requirements |
|
|
142 | (12) |
|
|
142 | (2) |
|
|
144 | (4) |
|
6.2.3 Fog Computing Requirements When Applied to Challenging IoTs Application Domains |
|
|
148 | (1) |
|
|
148 | (1) |
|
|
149 | (1) |
|
6.2.3.3 Real-Time Responsiveness |
|
|
149 | (1) |
|
|
150 | (1) |
|
6.2.3.5 Security and Privacy |
|
|
151 | (1) |
|
6.2.3.6 Location-Awareness |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
152 | (2) |
|
6.3 Fog Computing: Architectural Model |
|
|
154 | (4) |
|
|
154 | (2) |
|
6.3.2 Security and Privacy |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
156 | (1) |
|
|
157 | (1) |
|
6.3.6 Analytics and Decision-Making |
|
|
157 | (1) |
|
6.4 Fog Computing for IoT: A Taxonomy |
|
|
158 | (31) |
|
|
159 | (1) |
|
|
160 | (2) |
|
|
162 | (1) |
|
|
163 | (1) |
|
|
164 | (1) |
|
6.4.2 Security and Privacy Layer |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (3) |
|
|
169 | (1) |
|
|
170 | (1) |
|
|
171 | (1) |
|
|
171 | (2) |
|
|
173 | (1) |
|
6.4.4.1 Data Normalization |
|
|
174 | (2) |
|
|
176 | (1) |
|
|
177 | (2) |
|
|
179 | (1) |
|
|
179 | (3) |
|
|
182 | (1) |
|
6.4.6 Analytics and Decision-Making Layer |
|
|
183 | (1) |
|
|
184 | (2) |
|
|
186 | (3) |
|
6.5 Comparisons of Surveyed Solutions |
|
|
189 | (9) |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
190 | (1) |
|
6.5.1.3 Low-latency Communication |
|
|
190 | (1) |
|
|
191 | (1) |
|
6.5.2 Security and Privacy |
|
|
191 | (1) |
|
|
191 | (1) |
|
|
192 | (1) |
|
|
192 | (1) |
|
|
193 | (1) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
6.5.4.1 Data Normalization |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
6.5.6 Analytics and Decision-Making Layer |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
6.6 Challenges and Recommended Research Directions |
|
|
198 | (3) |
|
|
201 | (14) |
|
|
202 | (13) |
|
7 Harnessing the Computing Continuum for Programming Our World |
|
|
215 | (16) |
|
|
|
|
|
|
|
|
7.1 Introduction and Overview |
|
|
215 | (2) |
|
|
217 | (2) |
|
7.3 A Goal-oriented Approach to Programming the Computing Continuum |
|
|
219 | (9) |
|
7.3.1 A Motivating Continuum Example |
|
|
219 | (2) |
|
7.3.2 Goal-oriented Annotations for Intensional Specification |
|
|
221 | (1) |
|
7.3.3 A Mapping and Run-time System for the Computing Continuum |
|
|
222 | (2) |
|
7.3.4 Building Blocks and Enabling Technologies |
|
|
224 | (1) |
|
7.3.4.1 The Array of Things (AoT) |
|
|
225 | (1) |
|
7.3.4.2 Iowa Quantified (IQ) |
|
|
225 | (1) |
|
7.3.4.3 Intelligent, Multiversion Libraries |
|
|
225 | (1) |
|
7.3.4.4 Data Flow Execution for Big Data |
|
|
226 | (2) |
|
|
228 | (3) |
|
|
228 | (3) |
|
8 Fog Computing for Energy Harvesting-enabled Internet of Things |
|
|
231 | (14) |
|
|
|
|
|
|
231 | (1) |
|
|
232 | (6) |
|
|
233 | (1) |
|
8.2.1.1 Local Execution Model |
|
|
234 | (1) |
|
8.2.1.2 Fog Execution Model |
|
|
234 | (1) |
|
8.2.2 Energy Harvesting Model |
|
|
235 | (1) |
|
8.2.2.1 Stochastic Process |
|
|
235 | (1) |
|
8.2.2.2 Wireless Power Transfer |
|
|
236 | (2) |
|
8.3 Tradeoffs in EH Fog Systems |
|
|
238 | (2) |
|
8.3.1 Energy Consumption vs. Latency |
|
|
238 | (1) |
|
8.3.2 Execution Delay vs. Task Dropping Cost |
|
|
239 | (1) |
|
8.4 Future Research Challenges |
|
|
240 | (5) |
|
|
241 | (1) |
|
|
241 | (4) |
|
9 Optimizing Energy Efficiency of Wearable Sensors Using Fog-assisted Control |
|
|
245 | (24) |
|
|
|
|
|
|
|
|
|
245 | (2) |
|
|
247 | (2) |
|
|
249 | (1) |
|
|
250 | (1) |
|
9.5 IoT System Architecture |
|
|
251 | (2) |
|
9.5.1 Fog Computing and its Benefits |
|
|
252 | (1) |
|
9.6 Fog-assisted Runtime Energy Management in Wearable Sensors |
|
|
253 | (10) |
|
9.6.1 Computational Self-Awareness |
|
|
255 | (1) |
|
9.6.2 Energy Optimization Algorithms |
|
|
255 | (3) |
|
|
258 | (1) |
|
|
259 | (4) |
|
|
263 | (6) |
|
|
264 | (1) |
|
|
264 | (5) |
|
10 Latency Minimization Through Optimal Data Placement in Fog Networks |
|
|
269 | (24) |
|
|
|
|
269 | (3) |
|
|
272 | (1) |
|
10.2.1 Long-Term and Short-Term Placement |
|
|
272 | (1) |
|
|
272 | (1) |
|
|
273 | (2) |
|
|
273 | (1) |
|
10.3.2 Multiple Data Placement with Budget Problem |
|
|
274 | (1) |
|
|
274 | (1) |
|
10.4 Delay Minimization Without Replication |
|
|
275 | (4) |
|
10.4.1 Problem Formulation |
|
|
275 | (1) |
|
10.4.2 Min-Cost Flow Formulation |
|
|
276 | (1) |
|
10.4.3 Complexity Reduction |
|
|
277 | (2) |
|
10.5 Delay Minimization with Replication |
|
|
279 | (6) |
|
|
279 | (1) |
|
10.5.2 Single Request in Line Topology |
|
|
279 | (1) |
|
10.5.3 Greedy Solution in Multiple Requests |
|
|
280 | (2) |
|
10.5.4 Rounding Approach in Multiple Requests |
|
|
282 | (1) |
|
10.5.4.1 Generating Linear Programming Solution |
|
|
282 | (1) |
|
10.5.4.2 Creating Centers |
|
|
283 | (1) |
|
10.5.4.3 Converting to Integral Solution |
|
|
284 | (1) |
|
10.6 Performance Evaluation |
|
|
285 | (4) |
|
|
285 | (1) |
|
10.6.2 Experimental Setting |
|
|
285 | (1) |
|
10.6.3 Algorithm Comparison |
|
|
286 | (1) |
|
10.6.4 Experimental Results |
|
|
287 | (1) |
|
|
287 | (1) |
|
10.6.4.2 Results Without Data Replication |
|
|
288 | (1) |
|
10.6.4.3 Results with Data Replication |
|
|
288 | (1) |
|
|
289 | (1) |
|
|
289 | (4) |
|
|
289 | (1) |
|
|
290 | (3) |
|
11 Modeling and Simulation of Distributed Fog Environment Using FogNetSim+4- |
|
|
293 | (16) |
|
|
|
|
|
|
293 | (1) |
|
11.2 Modeling and Simulation |
|
|
294 | (2) |
|
11.3 FogNetSim++: Architecture |
|
|
296 | (2) |
|
11.4 FogNetSim++: Installation and Environment Setup |
|
|
298 | (7) |
|
11.4.1 OMNeT++ Installation |
|
|
298 | (2) |
|
11.4.2 FogNetSim++ Installation |
|
|
300 | (1) |
|
11.4.3 Sample Fog Simulation |
|
|
300 | (5) |
|
|
305 | (4) |
|
|
305 | (4) |
|
Part II Fog Computing Techniques and Applications |
|
|
309 | (238) |
|
12 Distributed Machine Learning for IoT Applications in the Fog |
|
|
311 | (36) |
|
|
|
|
|
|
311 | (3) |
|
12.2 Challenges in Data Processing for IoT |
|
|
314 | (8) |
|
|
315 | (3) |
|
|
318 | (1) |
|
12.2.3 Data Stream Processing |
|
|
319 | (3) |
|
12.3 Computational Intelligence and Fog Computing |
|
|
322 | (6) |
|
|
322 | (4) |
|
|
326 | (2) |
|
12.4 Challenges for Running Machine Learning on Fog Devices |
|
|
328 | (6) |
|
12.4.1 Solutions Available on the Market to Deploy ML on Fog Devices |
|
|
331 | (3) |
|
12.5 Approaches to Distribute Intelligence on Fog Devices |
|
|
334 | (6) |
|
|
340 | (7) |
|
|
341 | (1) |
|
|
341 | (6) |
|
13 Fog Computing-Based Communication Systems for Modern Smart Grids |
|
|
347 | (24) |
|
|
|
|
347 | (2) |
|
13.2 An Overview of Communication Technologies in Smart Grid |
|
|
349 | (7) |
|
13.3 Distribution Management System (DMS) Based on Fog/Cloud Computing |
|
|
356 | (3) |
|
13.4 Real-time Simulation of the Proposed Feeder-based Communication Scheme Using MATLAB and Thing Speak |
|
|
359 | (7) |
|
|
366 | (5) |
|
|
367 | (4) |
|
14 An Estimation of Distribution Algorithm to Optimize the Utility of Task Scheduling Under Fog Computing Systems |
|
|
371 | (14) |
|
|
|
|
371 | (1) |
|
14.2 Estimation of Distribution Algorithm |
|
|
372 | (1) |
|
|
373 | (1) |
|
|
374 | (2) |
|
14.5 Details of Proposed Algorithm |
|
|
376 | (2) |
|
14.5.1 Encoding and Decoding Method |
|
|
376 | (1) |
|
|
377 | (1) |
|
14.5.2.1 Probability Model and Initialization |
|
|
377 | (1) |
|
14.5.2.2 Updating and Sampling Method |
|
|
377 | (1) |
|
14.5.3 Local Search Method |
|
|
378 | (1) |
|
|
378 | (5) |
|
14.6.1 Comparison Algorithm |
|
|
378 | (1) |
|
14.6.2 Simulation Environment and Experiment Settings |
|
|
379 | (2) |
|
14.6.3 Compared with the Heuristic Method |
|
|
381 | (2) |
|
|
383 | (2) |
|
|
383 | (2) |
|
15 Reliable and Power-Efficient Machine Learning in Wearable Sensors |
|
|
385 | (26) |
|
|
|
|
385 | (1) |
|
15.2 Preliminaries and Related Work |
|
|
386 | (3) |
|
15.2.1 Gold Standard MET Computation |
|
|
386 | (1) |
|
15.2.2 Sensor-based MET Estimation |
|
|
387 | (1) |
|
15.2.3 Unreliability Mitigation |
|
|
388 | (1) |
|
|
388 | (1) |
|
15.3 System Architecture and Methods |
|
|
389 | (5) |
|
15.3.1 Reliable MET Calculation |
|
|
390 | (1) |
|
15.3.1.1 Sensor Localization |
|
|
390 | (2) |
|
15.3.1.2 MET Value Estimation |
|
|
392 | (1) |
|
15.3.2 The Reconfigurable MET Estimation System |
|
|
392 | (2) |
|
15.4 Data Collection and Experimental Procedures |
|
|
394 | (2) |
|
15.4.1 Exergaming Experiment |
|
|
394 | (1) |
|
15.4.2 Treadmill Experiment |
|
|
395 | (1) |
|
|
396 | (8) |
|
15.5.1 Reliable MET Calculation |
|
|
396 | (2) |
|
15.5.1.1 Sensor Localization |
|
|
398 | (1) |
|
15.5.1.2 MET Value Estimation |
|
|
398 | (1) |
|
15.5.1.3 The Impact of Sensor Localization |
|
|
399 | (3) |
|
15.5.2 Reconfigurable Design |
|
|
402 | (1) |
|
15.5.2.1 Treadmill Experiment |
|
|
402 | (1) |
|
15.5.2.2 Exergaming Experiment |
|
|
403 | (1) |
|
15.6 Discussion and Future Work |
|
|
404 | (1) |
|
|
405 | (6) |
|
|
406 | (5) |
|
16 Insights into Software-Defined Networking and Applications in Fog Computing |
|
|
411 | (20) |
|
|
|
|
|
411 | (3) |
|
|
414 | (2) |
|
|
414 | (2) |
|
16.3 SDN-Based Research Works |
|
|
416 | (3) |
|
16.4 SDN in Fog Computing |
|
|
419 | (2) |
|
16.5 SDN in Wireless Mesh Networks |
|
|
421 | (3) |
|
16.5.1 Challenges in Wireless Mesh Networks |
|
|
421 | (1) |
|
16.5.2 SDN Technique in WMNs |
|
|
421 | (2) |
|
16.5.3 Benefits of SDN in WMNs |
|
|
423 | (1) |
|
16.5.4 Fault Tolerance in SDN-based WMNs |
|
|
424 | (1) |
|
16.6 SDN in Wireless Sensor Networks |
|
|
424 | (3) |
|
16.6.1 Challenges in Wireless Sensor Networks |
|
|
424 | (1) |
|
16.6.2 SDN in Wireless Sensor Networks |
|
|
425 | (1) |
|
|
426 | (1) |
|
16.6.4 Home Networks Using SDWN |
|
|
426 | (1) |
|
16.6.5 Securing Software Defined Wireless Networks (SDWN) |
|
|
426 | (1) |
|
|
427 | (4) |
|
|
427 | (4) |
|
17 Time-Critical Fog Computing for Vehicular Networks |
|
|
431 | (28) |
|
|
|
|
|
431 | (3) |
|
17.2 Applications and Timeliness Guarantees and Perturbations |
|
|
434 | (9) |
|
17.2.1 Application Scenarios |
|
|
434 | (2) |
|
|
436 | (1) |
|
17.2.3 Timeliness Guarantees |
|
|
436 | (1) |
|
17.2.4 Benchmarking Vehicular Applications Concerning Timeliness Guarantees |
|
|
437 | (3) |
|
17.2.5 Building Blocks to Reach Timeliness Guarantees |
|
|
440 | (1) |
|
17.2.6 Timeliness Perturbations |
|
|
441 | (1) |
|
|
441 | (1) |
|
|
442 | (1) |
|
|
442 | (1) |
|
17.3 Coping with Perturbation to Meet Timeliness Guarantees |
|
|
443 | (6) |
|
17.3.1 Coping with Constraints |
|
|
443 | (1) |
|
17.3.1.1 Network Resource Management |
|
|
443 | (1) |
|
17.3.1.2 Computational Resource and Data Management |
|
|
444 | (4) |
|
17.3.2 Coping with Failures |
|
|
448 | (1) |
|
17.3.3 Coping with Threats |
|
|
448 | (1) |
|
17.4 Research Gaps and Future Research Directions |
|
|
449 | (2) |
|
17.4.1 Mobile Fog Computing |
|
|
449 | (1) |
|
17.4.2 Fog Service Level Agreement (SLA) |
|
|
450 | (1) |
|
|
451 | (8) |
|
|
451 | (8) |
|
18 A Reliable and Efficient Fog-Based Architecture for Autonomous Vehicular Networks |
|
|
459 | (14) |
|
|
|
|
|
Muhammad Usman Shahid Khan |
|
|
|
|
459 | (2) |
|
18.2 Proposed Methodology |
|
|
461 | (2) |
|
18.3 Hypothesis Formulation |
|
|
463 | (1) |
|
|
464 | (5) |
|
18.4.1 Results and Discussions |
|
|
464 | (3) |
|
18.4.2 Hypothesis Testing |
|
|
467 | (1) |
|
18.4.2.1 First Hypothesis |
|
|
467 | (1) |
|
18.4.2.2 Second Hypothesis |
|
|
468 | (1) |
|
18.4.2.3 Third Hypothesis |
|
|
469 | (1) |
|
|
469 | (4) |
|
|
470 | (3) |
|
19 Fog Computing to Enable Geospatial Video Analytics for Disaster-incident Situational Awareness |
|
|
473 | (32) |
|
|
|
|
|
473 | (5) |
|
19.1.1 How Can Geospatial Video Analytics Help with Disaster-Incident Situational Awareness? |
|
|
473 | (1) |
|
19.1.2 Fog Computing for Geospatial Video Analytics |
|
|
474 | (1) |
|
19.1.3 Function-Centric Cloud/Fog Computing Paradigm |
|
|
475 | (1) |
|
19.1.4 Function-Centric Fog/Cloud Computing Challenges |
|
|
476 | (1) |
|
19.1.5 Chapter Organization |
|
|
477 | (1) |
|
19.2 Computer Vision Application Case Studies and FCC Motivation |
|
|
478 | (6) |
|
19.2.1 Patient Tracking with Face Recognition Case Study |
|
|
478 | (1) |
|
19.2.1.1 Application's 3C Pipeline Needs |
|
|
478 | (1) |
|
19.2.1.2 Face Recognition Pipeline Details |
|
|
479 | (1) |
|
19.2.2 3-D Scene Reconstruction from LIDAR Scans |
|
|
480 | (1) |
|
19.2.2.1 Application's 3C Pipeline Needs |
|
|
480 | (1) |
|
19.2.2.2 3-D Scene Reconstruction Pipeline Details |
|
|
481 | (1) |
|
19.2.3 Tracking Objects of Interest in WAMI |
|
|
482 | (1) |
|
19.2.3.1 Application's 3C Pipeline Needs |
|
|
482 | (1) |
|
19.2.3.2 Object Tracking Pipeline Details |
|
|
483 | (1) |
|
19.3 Geospatial Video Analytics Data Collection Using Edge Routing |
|
|
484 | (6) |
|
19.3.1 Network Edge Geographic Routing Challenges |
|
|
484 | (2) |
|
19.3.2 Artificial Intelligence Relevance in Geographic Routing |
|
|
486 | (1) |
|
19.3.3 AI-Augmented Geographic Routing Implementation |
|
|
487 | (3) |
|
19.4 Fog/Cloud Data Processing for Geospatial Video Analytics Consumption |
|
|
490 | (6) |
|
19.4.1 Geo-Distributed Latency-Sensitive SFC Challenges |
|
|
491 | (1) |
|
|
491 | (1) |
|
|
491 | (1) |
|
|
491 | (1) |
|
19.4.2 Metapath-Based Composite Variable Approach |
|
|
492 | (1) |
|
19.4.2.1 Metalinks and Metapaths |
|
|
492 | (1) |
|
19.4.2.2 Constrained Shortest Metapaths |
|
|
493 | (1) |
|
19.4.2.3 Multiple-link Chain Composition via Metapath |
|
|
493 | (2) |
|
19.4.2.4 Allowable Fitness Functions for Metapath-Based Variables |
|
|
495 | (1) |
|
19.4.2.5 Metapath Composite Variable Approach Results |
|
|
495 | (1) |
|
19.4.3 Metapath-Based SFC Orchestration Implementation |
|
|
495 | (1) |
|
19.4.3.1 Control Applications |
|
|
495 | (1) |
|
|
496 | (1) |
|
19.4.3.3 SDN and Hypervisor |
|
|
496 | (1) |
|
|
496 | (9) |
|
19.5.1 What Have We Learned? |
|
|
496 | (1) |
|
19.5.2 The Road Ahead and Open Problems |
|
|
497 | (1) |
|
|
498 | (7) |
|
20 An Insight into 5G Networks with Fog Computing |
|
|
505 | (24) |
|
|
|
|
|
|
505 | (2) |
|
|
507 | (1) |
|
20.3 Fog Computing with 5G Networks |
|
|
508 | (1) |
|
|
508 | (1) |
|
20.3.2 The Need of Fog Computing in 5G Networks |
|
|
508 | (1) |
|
|
508 | (6) |
|
20.4.1 Cellular Architecture |
|
|
508 | (2) |
|
|
510 | (2) |
|
20.4.3 Two-Tier Architecture |
|
|
512 | (1) |
|
|
512 | (1) |
|
20.4.5 Cloud-Based Architecture |
|
|
513 | (1) |
|
20.5 Technology and Methodology for 5G |
|
|
514 | (7) |
|
|
515 | (1) |
|
20.5.2 Beam Division Multiple Access (BDMA) |
|
|
516 | (1) |
|
20.5.3 Mixed Bandwidth Data Path |
|
|
516 | (1) |
|
20.5.4 Wireless Virtualization |
|
|
516 | (2) |
|
|
518 | (1) |
|
20.5.6 Multiple-Input Multiple-Output (MIMO) |
|
|
518 | (1) |
|
|
519 | (1) |
|
20.5.8 Multibeam-Based Communication System |
|
|
520 | (1) |
|
20.5.9 Software-Defined Networking (SDN) |
|
|
520 | (1) |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
521 | (1) |
|
20.6.3 Logistic and Tracking |
|
|
521 | (1) |
|
|
521 | (1) |
|
|
522 | (1) |
|
|
522 | (2) |
|
|
524 | (5) |
|
|
524 | (5) |
|
21 Fog Computing for Bioinformatics Applications |
|
|
529 | (18) |
|
|
|
|
|
529 | (2) |
|
|
531 | (2) |
|
|
532 | (1) |
|
|
532 | (1) |
|
21.3 Cloud Computing Applications in Bioinformatics |
|
|
533 | (4) |
|
21.3.1 Bioinformatics Tools Deployed as SaaS |
|
|
533 | (2) |
|
21.3.2 Bioinformatics Platforms Deployed as PaaS |
|
|
535 | (1) |
|
21.3.3 Bioinformatics Tools Deployed as IaaS |
|
|
535 | (2) |
|
|
537 | (2) |
|
21.5 Fog Computing for Bioinformatics Applications |
|
|
539 | (4) |
|
21.5.1 Real-Time Microorganism Detection System |
|
|
541 | (2) |
|
|
543 | (4) |
|
|
543 | (4) |
Index |
|
547 | |