{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T13:08:39Z","timestamp":1723036119418},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T00:00:00Z","timestamp":1547856000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s00779-019-01200-9","type":"journal-article","created":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T16:49:27Z","timestamp":1547916567000},"page":"563-571","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Fog computing perception mechanism based on throughput rate constraint in intelligent Internet of Things"],"prefix":"10.1007","volume":"23","author":[{"given":"Jiang","family":"Fei","sequence":"first","affiliation":[]},{"given":"Ma","family":"Xiaoping","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,19]]},"reference":[{"key":"1200_CR1","doi-asserted-by":"crossref","unstructured":"Chen Y-K (2012) Challenges and opportunities of Internet of things, in the proceedings of 17th Asia and South Pacific Design Automation Conference, 30 Jan.\u4e0002 Feb., Santa Clara, CA, USA","DOI":"10.1109\/ASPDAC.2012.6164978"},{"key":"1200_CR2","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/j.procs.2015.04.158","volume":"48","author":"AV Lakra","year":"2015","unstructured":"Lakra AV, Yadav DK (2015) Multi-objective tasks scheduling algorithm for cloud computing throughput optimization. Procedia Computer Science 48:107\u2013113","journal-title":"Procedia Computer Science"},{"issue":"11","key":"1200_CR3","doi-asserted-by":"publisher","first-page":"1542","DOI":"10.1093\/bioinformatics\/bts165","volume":"28","author":"L Jourdren","year":"2012","unstructured":"Jourdren L et al (2012) Eoulsan: a cloud computing-based framework facilitating high throughput sequencing analyses. Bioinformatics 28(11):1542\u20131543","journal-title":"Bioinformatics"},{"key":"1200_CR4","doi-asserted-by":"crossref","unstructured":"Perera C et al (2017) Fog computing for sustainable smart cities: a survey. ACM Comput Surv 503:32\u201345","DOI":"10.1145\/3057266"},{"issue":"5","key":"1200_CR5","doi-asserted-by":"publisher","first-page":"1728","DOI":"10.1109\/JSAC.2016.2545559","volume":"34","author":"F Jalali","year":"2016","unstructured":"Jalali F et al (2016) Fog computing may help to save energy in cloud computing. IEEE J Sel Areas Commun 34(5):1728\u20131739","journal-title":"IEEE J Sel Areas Commun"},{"issue":"4","key":"1200_CR6","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MCOM.2017.1600894","volume":"55","author":"S Li","year":"2017","unstructured":"Li S, Maddahali MA, Avestimehr AS (2017) Coding for distributed fog computing. IEEE Commun Mag 55(4):34\u201340","journal-title":"IEEE Commun Mag"},{"issue":"8","key":"1200_CR7","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MC.2016.245","volume":"49","author":"AV Dastjerdi","year":"2016","unstructured":"Dastjerdi AV, Buyya R (2016) Fog computing: helping the Internet of things realize its potential. Computer 49(8):112\u2013116","journal-title":"Computer"},{"issue":"2","key":"1200_CR8","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MIC.2017.37","volume":"21","author":"A Alrawais","year":"2017","unstructured":"Alrawais A et al (2017) Fog computing for the Internet of things: security and privacy issues. IEEE Internet Comput 21(2):34\u201342","journal-title":"IEEE Internet Comput"},{"key":"1200_CR9","doi-asserted-by":"crossref","unstructured":"Xia KJ, Wang JQ, Wu Y (2017) Robust alzheimer disease classification based on feature integration fusion model for Magnetic[J]. Journal of Medical Imaging & Health Informatics 7(6):1171\u20131176","DOI":"10.1166\/jmihi.2017.2250"},{"key":"1200_CR10","doi-asserted-by":"crossref","unstructured":"Paya, Ashkan, Marinescu D (2017) Energy-aware load balancing and application scaling for the cloud ecosystem. IEEE Transactions on Cloud Computing\u00a0PP 99(2017):1\u20131","DOI":"10.1109\/TCC.2015.2396059"},{"issue":"2","key":"1200_CR11","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MCOM.2018.1700621","volume":"56","author":"Q Yan","year":"2018","unstructured":"Yan Q et al (2018) A multi-level DDoS mitigation framework for the industrial Internet of things. IEEE Commun Mag 56(2):30\u201336","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"1200_CR12","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCC.2017.27","volume":"4","author":"LF Bittencourt","year":"2017","unstructured":"Bittencourt LF et al (2017) Mobility-aware application scheduling in fog computing. IEEE Cloud Computing 4(2):26\u201335","journal-title":"IEEE Cloud Computing"},{"issue":"7","key":"1200_CR13","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1109\/MC.2015.207","volume":"48","author":"JS Preden","year":"2015","unstructured":"Preden JS, Tammemae K, Jantsch A, Leier M, Riid A, Calis E (2015) The benefits of self-awareness and attention in fog and mist computing. Computer 48(7):37\u201345","journal-title":"Computer"},{"key":"1200_CR14","doi-asserted-by":"crossref","unstructured":"Moses J et al. (2011) Shared resource monitoring and throughput optimization in cloud-computing datacenters. IEEE International Parallel & Distributed Processing Symposium IEEE Computer Society","DOI":"10.1109\/IPDPS.2011.98"},{"issue":"2","key":"1200_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/ijcac.2014040101","volume":"4","author":"Y Jararweh","year":"2014","unstructured":"Jararweh Y et al (2014) High-throughput encryption for Cloud computing storage system. International Journal of Cloud Applications & Computing 4(2):1\u201314","journal-title":"International Journal of Cloud Applications & Computing"},{"key":"1200_CR16","doi-asserted-by":"crossref","unstructured":"Xia KJ, Yin HS, Zhang YD (2019) Deep semantic segmentation of kidney and space-occupying lesion area based on SCNN and ResNet models combined with SIFT-Flow Algorithm[J]. J Med Syst 43(1):2","DOI":"10.1007\/s10916-018-1116-1"},{"issue":"5","key":"1200_CR17","doi-asserted-by":"publisher","first-page":"2140","DOI":"10.1109\/TII.2017.2679740","volume":"13","author":"B Tang","year":"2017","unstructured":"Tang B et al (2017) Incorporating intelligence in fog computing for big data analysis in smart cities. IEEE Trans Ind Inf 13(5):2140\u20132150","journal-title":"IEEE Trans Ind Inf"},{"key":"1200_CR18","first-page":"17","volume":"11","author":"F Song","year":"2017","unstructured":"Song F et al (2017) Smart collaborative caching for information-centric IoT in fog computing. Sensors 11:17","journal-title":"Sensors"},{"key":"1200_CR19","first-page":"9","volume":"17","author":"MS Albela","year":"2017","unstructured":"Albela MS et al (2017) A practical evaluation of a high-security energy-efficient gateway for IoT fog computing applications. Sensors 17:9","journal-title":"Sensors"},{"issue":"12","key":"1200_CR20","doi-asserted-by":"publisher","first-page":"3702","DOI":"10.1109\/TC.2016.2536019","volume":"65","author":"D Zeng","year":"2016","unstructured":"Zeng D et al (2016) Joint optimization of task scheduling and image placement in fog computing supported software-defined embedded system. IEEE Trans Comput 65(12):3702\u20133712","journal-title":"IEEE Trans Comput"},{"key":"1200_CR21","first-page":"18","volume":"554","author":"FGO Risso","year":"2017","unstructured":"Risso FGO (2017) Clarifying fog computing and networking: 10 questions and answers. IEEE Commun Mag 554:18\u201320","journal-title":"IEEE Commun Mag"},{"key":"1200_CR22","doi-asserted-by":"crossref","unstructured":"Jin Y, Xia K (2018) Intelligent location and recognition mechanism of abnormal point of medical image based on reliable transmission in medial CT scanner local big data Networks[J]. Journal of Medical Imaging & Health Informatics 8(3):609\u2013617","DOI":"10.1166\/jmihi.2018.2321"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-019-01200-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01200-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-019-01200-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,18]],"date-time":"2020-01-18T19:20:22Z","timestamp":1579375222000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-019-01200-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,19]]},"references-count":22,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["1200"],"URL":"https:\/\/doi.org\/10.1007\/s00779-019-01200-9","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,19]]},"assertion":[{"value":"5 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 January 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}