{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:19:26Z","timestamp":1759335566310,"version":"3.41.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T00:00:00Z","timestamp":1745020800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T00:00:00Z","timestamp":1745020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Ministry of Education Humanities and Social Sciences Research Project","award":["23JDSZ3143"],"award-info":[{"award-number":["23JDSZ3143"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Computing"],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s00607-025-01465-4","type":"journal-article","created":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T06:12:01Z","timestamp":1745043121000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Energy-aware mobile edge device deployment in health data detection scenario: a DQN optimized firefly algorithm"],"prefix":"10.1007","volume":"107","author":[{"given":"Shanshan","family":"He","sequence":"first","affiliation":[]},{"given":"Huixi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yuelei","family":"Ji","sequence":"additional","affiliation":[]},{"given":"Xingjian","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Feifei","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Xia","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,19]]},"reference":[{"issue":"3","key":"1465_CR1","doi-asserted-by":"publisher","first-page":"3710","DOI":"10.1002\/ett.3710","volume":"33","author":"M Hartmann","year":"2022","unstructured":"Hartmann M, Hashmi US, Imran A (2022) Edge computing in smart health care systems: review, challenges, and research directions. Trans Emerg Telecommun Technol 33(3):3710","journal-title":"Trans Emerg Telecommun Technol"},{"key":"1465_CR2","doi-asserted-by":"crossref","unstructured":"Chen R, Li L, Hou R, Yang T, Wang L, Pan M (2020) Data-driven optimization for resource provision in non-cooperative edge computing market. In: ICC 2020-2020 IEEE international conference on communications (ICC), pp 1\u20136","DOI":"10.1109\/ICC40277.2020.9149382"},{"key":"1465_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2019.101957","volume":"101","author":"M Al-Zinati","year":"2020","unstructured":"Al-Zinati M, Almasri T, Alsmirat M, Jararweh Y (2020) Enabling multiple health security threats detection using mobile edge computing. Simul Model Pract Theory 101:101957","journal-title":"Simul Model Pract Theory"},{"key":"1465_CR4","doi-asserted-by":"crossref","unstructured":"Li D, Asikaburu C, Dong B, Zhou H, Azizi S (2020) Towards optimal system deployment for edge computing: a preliminary study. In: 2020 29th international conference on computer communications and networks (ICCCN), pp 1\u20136","DOI":"10.1109\/ICCCN49398.2020.9209754"},{"issue":"1","key":"1465_CR5","doi-asserted-by":"publisher","first-page":"732","DOI":"10.1109\/COMST.2015.2481183","volume":"18","author":"M Dayarathna","year":"2015","unstructured":"Dayarathna M, Wen Y, Fan R (2015) Data center energy consumption modeling: a survey. IEEE Commun Surv Tutor 18(1):732\u2013794","journal-title":"IEEE Commun Surv Tutor"},{"key":"1465_CR6","first-page":"1","volume":"2021","author":"M Cui","year":"2021","unstructured":"Cui M, Fei Y, Liu Y (2021) A survey on secure deployment of mobile services in edge computing. Secur Commun Netw 2021:1\u20138","journal-title":"Secur Commun Netw"},{"key":"1465_CR7","doi-asserted-by":"publisher","first-page":"85714","DOI":"10.1109\/ACCESS.2020.2991734","volume":"8","author":"K Cao","year":"2020","unstructured":"Cao K, Liu Y, Meng G, Sun Q (2020) An overview on edge computing research. IEEE Access 8:85714\u201385728","journal-title":"IEEE Access"},{"issue":"22","key":"1465_CR8","doi-asserted-by":"publisher","first-page":"10924","DOI":"10.3390\/app112210924","volume":"11","author":"FH Elfouly","year":"2021","unstructured":"Elfouly FH, Ramadan RA, Khedr AY, Yadav K, Azar AT, Abdelhamed MA (2021) Efficient node deployment of large-scale heterogeneous wireless sensor networks. Appl Sci 11(22):10924","journal-title":"Appl Sci"},{"key":"1465_CR9","doi-asserted-by":"crossref","unstructured":"Xiao H, Hu Z, Yang K, Du Y, Chen D (2020) An energy-aware joint routing and task allocation algorithm in mec systems assisted by multiple UAVs. In: 2020 international wireless communications and mobile computing (IWCMC), pp 1654\u20131659","DOI":"10.1109\/IWCMC48107.2020.9148519"},{"issue":"2","key":"1465_CR10","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1109\/JIOT.2017.2717704","volume":"5","author":"O Kaiwartya","year":"2017","unstructured":"Kaiwartya O, Abdullah AH, Cao Y, Lloret J, Kumar S, Shah RR, Prasad M, Prakash S (2017) Virtualization in wireless sensor networks: fault tolerant embedding for internet of things. IEEE Internet Things J 5(2):571\u2013580","journal-title":"IEEE Internet Things J"},{"key":"1465_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108146","volume":"194","author":"AM Maia","year":"2021","unstructured":"Maia AM, Ghamri-Doudane Y, Vieira D, Castro MF (2021) An improved multi-objective genetic algorithm with heuristic initialization for service placement and load distribution in edge computing. Comput Netw 194:108146","journal-title":"Comput Netw"},{"key":"1465_CR12","doi-asserted-by":"publisher","first-page":"167503","DOI":"10.1109\/ACCESS.2021.3134941","volume":"9","author":"T Alfakih","year":"2021","unstructured":"Alfakih T, Hassan MM, Al-Razgan M (2021) Multi-objective accelerated particle swarm optimization with dynamic programing technique for resource allocation in mobile edge computing. IEEE Access 9:167503\u2013167520","journal-title":"IEEE Access"},{"issue":"4","key":"1465_CR13","doi-asserted-by":"publisher","first-page":"2117","DOI":"10.1109\/TNSE.2020.3008381","volume":"7","author":"B Cao","year":"2020","unstructured":"Cao B, Wei Q, Lv Z, Zhao J, Singh AK (2020) Many-objective deployment optimization of edge devices for 5g networks. IEEE Trans Netw Sci Eng 7(4):2117\u20132125","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"1465_CR14","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/j.jpdc.2018.06.008","volume":"127","author":"S Wang","year":"2019","unstructured":"Wang S, Zhao Y, Xu J, Yuan J, Hsu C-H (2019) Edge server placement in mobile edge computing. J Parallel Distrib Comput 127:160\u2013168","journal-title":"J Parallel Distrib Comput"},{"issue":"4","key":"1465_CR15","doi-asserted-by":"publisher","first-page":"1476","DOI":"10.1007\/s11036-022-01975-x","volume":"27","author":"W Li","year":"2022","unstructured":"Li W, Chen J, Li Y, Wen Z, Peng J, Wu X (2022) Mobile edge server deployment towards task offloading in mobile edge computing: a clustering approach. Mob Netw Appl 27(4):1476\u20131489","journal-title":"Mob Netw Appl"},{"issue":"2","key":"1465_CR16","doi-asserted-by":"publisher","first-page":"2230","DOI":"10.1109\/JSYST.2020.2986649","volume":"15","author":"C Jiang","year":"2020","unstructured":"Jiang C, Wan J, Abbas H (2020) An edge computing node deployment method based on improved k-means clustering algorithm for smart manufacturing. IEEE Syst J 15(2):2230\u20132240","journal-title":"IEEE Syst J"},{"issue":"11","key":"1465_CR17","first-page":"2968","volume":"33","author":"W Lv","year":"2022","unstructured":"Lv W, Wang Q, Yang P, Ding Y, Yi B, Wang Z, Lin C (2022) Microservice deployment in edge computing based on deep Q learning. IEEE Trans Parallel Distrib Syst 33(11):2968\u20132978","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1465_CR18","doi-asserted-by":"publisher","first-page":"120604","DOI":"10.1109\/ACCESS.2020.3007002","volume":"8","author":"J Ren","year":"2020","unstructured":"Ren J, Wang H, Hou T, Zheng S, Tang C (2020) Collaborative edge computing and caching with deep reinforcement learning decision agents. IEEE Access 8:120604\u2013120612","journal-title":"IEEE Access"},{"issue":"4","key":"1465_CR19","doi-asserted-by":"publisher","first-page":"2329","DOI":"10.1109\/TWC.2019.2902559","volume":"18","author":"Y Zeng","year":"2019","unstructured":"Zeng Y, Xu J, Zhang R (2019) Energy minimization for wireless communication with rotary-wing UAV. IEEE Trans Wireless Commun 18(4):2329\u20132345","journal-title":"IEEE Trans Wireless Commun"},{"issue":"3","key":"1465_CR20","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1109\/TBME.2016.2570210","volume":"64","author":"H Kalantarian","year":"2016","unstructured":"Kalantarian H, Sideris C, Mortazavi B, Alshurafa N, Sarrafzadeh M (2016) Dynamic computation offloading for low-power wearable health monitoring systems. IEEE Trans Biomed Eng 64(3):621\u2013628","journal-title":"IEEE Trans Biomed Eng"},{"issue":"21","key":"1465_CR21","doi-asserted-by":"publisher","first-page":"4517","DOI":"10.3390\/electronics12214517","volume":"12","author":"S Sharma","year":"2023","unstructured":"Sharma S, Yoon W (2023) Energy efficient power allocation in massive MIMO based on parameterized deep DQN. Electronics 12(21):4517","journal-title":"Electronics"},{"key":"1465_CR22","doi-asserted-by":"publisher","first-page":"374","DOI":"10.1016\/j.ins.2016.12.024","volume":"382","author":"H Wang","year":"2017","unstructured":"Wang H, Wang W, Zhou X, Sun H, Zhao J, Yu X, Cui Z (2017) Firefly algorithm with neighborhood attraction. Inf Sci 382:374\u2013387","journal-title":"Inf Sci"},{"issue":"1","key":"1465_CR23","first-page":"80","volume":"42","author":"C He","year":"2023","unstructured":"He C, Kang P, Li Q, Liu X, Li S, Zhao J (2023) Firefly algorithm with combination of multi-strategies. J Nanchang Instit Technol 42(1):80\u201387","journal-title":"J Nanchang Instit Technol"},{"key":"1465_CR24","volume-title":"Research on portfolio optimization based on reinforecement learning particle swarm optimization","author":"X Jia","year":"2022","unstructured":"Jia X (2022) Research on portfolio optimization based on reinforecement learning particle swarm optimization. Donghua University, Master"},{"key":"1465_CR25","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1016\/j.ins.2022.06.078","volume":"608","author":"F Xue","year":"2022","unstructured":"Xue F, Hai Q, Dong T, Cui Z, Gong Y (2022) A deep reinforcement learning based hybrid algorithm for efficient resource scheduling in edge computing environment. Inf Sci 608:362\u2013374","journal-title":"Inf Sci"},{"key":"1465_CR26","unstructured":"Karaboga D, et al (2005) An idea based on honey bee swarm for numerical optimization. Technical report, Technical report-tr06, Erciyes university, engineering faculty, computer."},{"key":"1465_CR27","doi-asserted-by":"crossref","unstructured":"Yang X-S, Deb S (2009) Cuckoo search via l\u00e9vy flights. In: 2009 World congress on nature & biologically inspired computing (NaBIC), pp 210\u2013214","DOI":"10.1109\/NABIC.2009.5393690"},{"key":"1465_CR28","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.knosys.2018.11.024","volume":"165","author":"G Dhiman","year":"2019","unstructured":"Dhiman G, Kumar V (2019) Seagull optimization algorithm: theory and its applications for large-scale industrial engineering problems. Knowl-Based Syst 165:169\u2013196","journal-title":"Knowl-Based Syst"},{"key":"1465_CR29","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.advengsoft.2016.01.008","volume":"95","author":"S Mirjalili","year":"2016","unstructured":"Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51\u201367","journal-title":"Adv Eng Softw"},{"issue":"3","key":"1465_CR30","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1504\/IJBIC.2013.055093","volume":"5","author":"X-S Yang","year":"2013","unstructured":"Yang X-S, He X (2013) Bat algorithm: literature review and applications. Int J Bio-Inspired Comput 5(3):141\u2013149","journal-title":"Int J Bio-Inspired Comput"},{"issue":"2","key":"1465_CR31","first-page":"53","volume":"5","author":"Z Zhou","year":"2019","unstructured":"Zhou Z, Yu S, Chen X (2019) Edge intelligence: a new nexus of edge computing and artificial intelligence. Big Data Res 5(2):53\u201363","journal-title":"Big Data Res"},{"key":"1465_CR32","doi-asserted-by":"crossref","unstructured":"Ram SS, Apduhan B, Shiratori N (2019) A machine learning framework for edge computing to improve prediction accuracy in mobile health monitoring. In: Computational science and its applications\u2013ICCSA 2019: 19th international conference, Saint Petersburg, Russia, July 1\u20134, 2019, Proceedings, Part III 19, pp 417\u2013431","DOI":"10.1007\/978-3-030-24302-9_30"}],"container-title":["Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-025-01465-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00607-025-01465-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00607-025-01465-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T08:14:26Z","timestamp":1748247266000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00607-025-01465-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,19]]},"references-count":32,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1465"],"URL":"https:\/\/doi.org\/10.1007\/s00607-025-01465-4","relation":{},"ISSN":["0010-485X","1436-5057"],"issn-type":[{"type":"print","value":"0010-485X"},{"type":"electronic","value":"1436-5057"}],"subject":[],"published":{"date-parts":[[2025,4,19]]},"assertion":[{"value":"9 January 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 April 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no known competing fnancial interests or personal relationships that could have appeared to infuence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"115"}}