{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T15:25:14Z","timestamp":1773933914645,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T00:00:00Z","timestamp":1762992000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2026,2]]},"DOI":"10.1007\/s10586-025-05815-x","type":"journal-article","created":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T23:45:02Z","timestamp":1763077502000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced clustering and filtering algorithm for cloudlet movement and placement in dynamic mobile cloud computing environments"],"prefix":"10.1007","volume":"29","author":[{"given":"Lizia","family":"Sahkhar","sequence":"first","affiliation":[]},{"given":"Bunil Kumar","family":"Balabantaray","sequence":"additional","affiliation":[]},{"given":"Sanjaya Kumar","family":"Panda","sequence":"additional","affiliation":[]},{"given":"David","family":"Taniar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,13]]},"reference":[{"key":"5815_CR1","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.jnca.2015.11.009","volume":"62","author":"U Shaukat","year":"2016","unstructured":"Shaukat, U., Ahmed, E., Anwar, Z., Xia, F.: Cloudlet deployment in local wireless networks: Motivation, architectures, applications, and open challenges. Journal of Network and Computer Applications 62, 18\u201340 (2016)","journal-title":"Journal of Network and Computer Applications"},{"key":"5815_CR2","doi-asserted-by":"crossref","unstructured":"Huang, D.: Mobile Cloud Computing Taxonomy. Elsevier Inc (2018)","DOI":"10.1016\/B978-0-12-809641-3.00002-8"},{"issue":"2","key":"5815_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3488247","volume":"3","author":"B Neha","year":"2022","unstructured":"Neha, B., Panda, S.K., Sahu, P.K., Sahoo, K.S., Gandomi, A.H.: A systematic review on osmotic computing. ACM Transactions on Internet of Things 3(2), 1\u201330 (2022)","journal-title":"ACM Transactions on Internet of Things"},{"key":"5815_CR4","doi-asserted-by":"crossref","unstructured":"Sahkhar, L., Balabantaray, BK., Panda, SK.: Mobility-enhanced delay-aware cloudlet movement and placement using cluster-based technique in a smart healthcare platform. Cluster Computing 1\u201319 (2024)","DOI":"10.1007\/s10586-024-04569-2"},{"key":"5815_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.iot.2024.101176","author":"B Neha","year":"2024","unstructured":"Neha, B., Panda, S.K., Sahu, P.K., Taniar, D.: Energy and latency-balanced osmotic-offloading algorithm for healthcare systems. Internet of Things (2024). https:\/\/doi.org\/10.1016\/j.iot.2024.101176","journal-title":"Internet of Things"},{"key":"5815_CR6","doi-asserted-by":"crossref","unstructured":"Soyata, T., Ba, H., Heinzelman, W., Kwon, M., Shi, J.: Accelerating mobile-cloud computing: A survey. In Cloud Technology: Concepts, Methodologies, Tools, and Applications, pp 1933\u20131955. IGI Global (2015)","DOI":"10.4018\/978-1-4666-6539-2.ch090"},{"issue":"4","key":"5815_CR7","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TCC.2015.2449834","volume":"5","author":"M Jia","year":"2015","unstructured":"Jia, M., Cao, J., Liang, W.: Optimal cloudlet placement and user to cloudlet allocation in wireless metropolitan area networks. IEEE Transactions on Cloud Computing 5(4), 725\u2013737 (2015)","journal-title":"IEEE Transactions on Cloud Computing"},{"issue":"10","key":"5815_CR8","first-page":"2866","volume":"27","author":"X Zichuan","year":"2015","unstructured":"Zichuan, X., Liang, W., Wenzheng, X., Jia, M., Guo, S.: Efficient algorithms for capacitated cloudlet placements. IEEE Trans. Parallel Distrib. Syst. 27(10), 2866\u20132880 (2015)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"5815_CR9","doi-asserted-by":"publisher","first-page":"105877","DOI":"10.1109\/ACCESS.2022.3211512","volume":"10","author":"KarimM. Hassan","year":"2022","unstructured":"Hassan, Karim M.., Abdo, Amany, Yakoub, Ahmed: Enhancement of health care services based on cloud computing in iot environment using hybrid swarm intelligence. IEEE Access 10, 105877\u2013105886 (2022)","journal-title":"IEEE Access"},{"key":"5815_CR10","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.sysarc.2018.05.007","volume":"91","author":"M Garc\u00eda-Valls","year":"2018","unstructured":"Garc\u00eda-Valls, M., Dubey, A., Botti, V.: Introducing the new paradigm of social dispersed computing: Applications, technologies and challenges. J. Syst. Archit. 91, 83\u2013102 (2018)","journal-title":"J. Syst. Archit."},{"key":"5815_CR11","doi-asserted-by":"publisher","first-page":"34313","DOI":"10.1109\/ACCESS.2020.2974895","volume":"8","author":"K Peng","year":"2020","unstructured":"Peng, K., Qian, X., Zhao, B., Zhang, K., Liu, Y.: A new cloudlet placement method based on affinity propagation for cyber-physical-social systems in wireless metropolitan area networks. IEEE Access 8, 34313\u201334325 (2020)","journal-title":"IEEE Access"},{"key":"5815_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Wang, K., Zhou, Y., He, Q.: Enhanced adaptive cloudlet placement approach for mobile application on spark. Security and Communication Networks (2018)","DOI":"10.1155\/2018\/1937670"},{"key":"5815_CR13","doi-asserted-by":"crossref","unstructured":"Verbelen, T., Simoens, P., Turck, FD., Dhoedt, B.: Cloudlets: Bringing the cloud to the mobile user. In Proceedings of the third ACM workshop on Mobile cloud computing and services, pp. 29\u201336 (2012)","DOI":"10.1145\/2307849.2307858"},{"key":"5815_CR14","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/j.comcom.2020.05.001","volume":"159","author":"Q-H Nguyen","year":"2020","unstructured":"Nguyen, Q.-H., Dressler, F.: A smartphone perspective on computation offloading\u2014a survey. Computer Communications 159, 133\u2013154 (2020)","journal-title":"Computer Communications"},{"issue":"4","key":"5815_CR15","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MPRV.2009.82","volume":"8","author":"M Satyanarayanan","year":"2009","unstructured":"Satyanarayanan, M., Bahl, P., Caceres, R., Davies, N.: The case for vm-based cloudlets in mobile computing. IEEE Pervasive Comput. 8(4), 14\u201323 (2009)","journal-title":"IEEE Pervasive Comput."},{"key":"5815_CR16","doi-asserted-by":"crossref","unstructured":"Lewis, G., Echeverr\u00eda, S., Simanta, S.: Ben Bradshaw, and James Root. Tactical cloudlets: Moving cloud computing to the edge. In 2014 IEEE Military Communications Conference, pp. 1440\u20131446. IEEE (2014)","DOI":"10.1109\/MILCOM.2014.238"},{"key":"5815_CR17","doi-asserted-by":"publisher","first-page":"29609","DOI":"10.1109\/ACCESS.2021.3059072","volume":"9","author":"M Babar","year":"2021","unstructured":"Babar, M., Khan, M.S., Ali, F., Imran, M., Shoaib, M.: Cloudlet computing: recent advances, taxonomy, and challenges. IEEE access 9, 29609\u201329622 (2021)","journal-title":"IEEE access"},{"key":"5815_CR18","doi-asserted-by":"crossref","unstructured":"Flores, H., Kostakos, V., Tarkoma, S., Hui, P., Li, Y.: Evidence-aware mobile cloud architectures. Mobile Big Data: A Roadmap from Models to Technologies 65\u201384 (2018)","DOI":"10.1007\/978-3-319-67925-9_4"},{"key":"5815_CR19","doi-asserted-by":"crossref","unstructured":"Sahkhar, L., Balabantaray, BK.: Optimal cloudlet movement and placement in a dynamic environment using cluster based technique. In 20234th International Conference on Computing and Communication Systems (I3CS), IEEE, pp. 1\u20136 (2023)","DOI":"10.1109\/I3CS58314.2023.10127324"},{"issue":"1","key":"5815_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-019-1455-8","volume":"2019","author":"C Shen","year":"2019","unstructured":"Shen, C., Xue, S., Shucun, F.: Ecpm: an energy-efficient cloudlet placement method in mobile cloud environment. EURASIP J. Wirel. Commun. Netw. 2019(1), 1\u201310 (2019)","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"5815_CR21","unstructured":"Vailshery, LS.: IoT and non-IoT connections worldwide 2010-2025. https:\/\/www.statista.com\/statistics\/1101442\/iot-number-of-connected-devices-worldwide\/, (2017)"},{"key":"5815_CR22","unstructured":"Lewis, G.: Application virtualization for cloudlet-based cyber-foraging at the edge. Carnegie Mellon University, Software Engineering Institute\u2019s Insights (blog). Accessed: 2024-Aug-10. (2013)"},{"key":"5815_CR23","doi-asserted-by":"crossref","unstructured":"Lewis, GA., Echeverr\u00eda, S., Simanta, S., Bradshaw, B., Root, J.: Cloudlet-based cyber-foraging for mobile systems in resource-constrained edge environments. In Companion Proceedings of the 36th International Conference on Software Engineering, pp. 412\u2013415 (2014)","DOI":"10.1145\/2591062.2591119"},{"key":"5815_CR24","doi-asserted-by":"crossref","unstructured":"Panda, SK., Jana, PK.: An efficient energy saving task consolidation algorithm for cloud computing systems. In 2014 International Conference on Parallel, Distributed and Grid Computing, IEEE, 262\u2013267 (2014)","DOI":"10.1109\/PDGC.2014.7030753"},{"key":"5815_CR25","doi-asserted-by":"crossref","unstructured":"Panda, SK., Jana, PK.: An efficient request-based virtual machine placement algorithm for cloud computing. In Distributed Computing and Internet Technology: 13th International Conference, ICDCIT 2017, Bhubaneswar, India, January 13-16, 2017, Proceedings 13, pp. 129\u2013143. Springer (2017)","DOI":"10.1007\/978-3-319-50472-8_11"},{"key":"5815_CR26","doi-asserted-by":"crossref","unstructured":"Xu, Z., Liang, W., Xu, W., Jia, M., Guo, S.: Capacitated cloudlet placements in wireless metropolitan area networks. In 2015 IEEE 40Th conference on local computer networks (LCN), pp. 570\u2013578. IEEE (2015)","DOI":"10.1109\/LCN.2015.7366372"},{"key":"5815_CR27","doi-asserted-by":"crossref","unstructured":"Ma, L., Wu, J., Chen, L., Liu, Z.: Fast algorithms for capacitated cloudlet placements. In 2017 IEEE 21st International Conference on Computer Supported Cooperative Work in Design (CSCWD), pp. 439\u2013444. IEEE (2017)","DOI":"10.1109\/CSCWD.2017.8066734"},{"key":"5815_CR28","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.jnca.2019.04.014","volume":"138","author":"S Mondal","year":"2019","unstructured":"Mondal, S., Das, G., Wong, E.: Cost-optimal cloudlet placement frameworks over fiber-wireless access networks for low-latency applications. Journal of Network and Computer Applications 138, 27\u201338 (2019)","journal-title":"Journal of Network and Computer Applications"},{"key":"5815_CR29","doi-asserted-by":"crossref","unstructured":"Peng, K., Liang, H., Zhang, Y., Qian, X., Huang, H.: A cloudlet placement method based on birch in wireless metropolitan area network. In International Conference on Blockchain and Trustworthy Systems, pp. 397\u2013409. Springer (2019)","DOI":"10.1007\/978-981-15-2777-7_32"},{"key":"5815_CR30","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1016\/j.procs.2020.04.017","volume":"171","author":"Eva Patel","year":"2020","unstructured":"Patel, Eva, Kushwaha, Dharmender Singh: Clustering cloud workloads: K-means vs gaussian mixture model. Procedia computer science 171, 158\u2013167 (2020)","journal-title":"Procedia computer science"},{"issue":"4","key":"5815_CR31","doi-asserted-by":"publisher","first-page":"4779","DOI":"10.1007\/s10586-023-04205-5","volume":"27","author":"M Daraghmeh","year":"2024","unstructured":"Daraghmeh, M., Agarwal, A., Jararweh, Y.: An ensemble clustering approach for modeling hidden categorization perspectives for cloud workloads. Cluster Computing 27(4), 4779\u20134803 (2024)","journal-title":"Cluster Computing"},{"key":"5815_CR32","doi-asserted-by":"crossref","unstructured":"Saxena, S., Khan, MZ., Singh, R., Agarwal, MA., Priyanka, PM.: Clustering based prediction for vm workload in green computation. Educational Administration: Theory And Practice 30(5), 9657\u20139666 (2024)","DOI":"10.53555\/kuey.v30i5.2585"},{"key":"5815_CR33","doi-asserted-by":"crossref","unstructured":"Zhou, H., Ali, H., Youn, J., Zhang, Z.: A hybrid wired and wireless network infrastructure to improve the productivity and quality care of critical medical applications. In IEEE\/ICME International Conference on Complex Medical Engineering, pages 215\u2013218. IEEE (2010)","DOI":"10.1109\/ICCME.2010.5558842"},{"issue":"1","key":"5815_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.22373\/ekw.v8i2.13027","volume":"9","author":"A Kusmiran","year":"2023","unstructured":"Kusmiran, A.: Clustering and risk analysis of the earthquake in sulawesi using mini batch k-means, k-medoids, and maximum likelihood method. Elkawnie 9(1), 1\u201323 (2023)","journal-title":"Elkawnie"},{"issue":"7","key":"5815_CR35","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12071689","volume":"12","author":"M Lapegna","year":"2023","unstructured":"Lapegna, M., Mele, V., Romano, D.: Clustering algorithms for enhanced trustworthiness on high-performance edge-computing devices. Electronics 12(7), 1689 (2023)","journal-title":"Electronics"},{"key":"5815_CR36","doi-asserted-by":"publisher","first-page":"219430","DOI":"10.1109\/ACCESS.2020.3042716","volume":"8","author":"T Daradkeh","year":"2020","unstructured":"Daradkeh, T., Agarwal, A., Zaman, M., Goel, N.: Dynamic k-means clustering of workload and cloud resource configuration for cloud elastic model. IEEE Access 8, 219430\u2013219446 (2020)","journal-title":"IEEE Access"},{"key":"5815_CR37","doi-asserted-by":"crossref","unstructured":"Feizollah, A., Anuar, NB., Salleh, R., Amalina, F.: Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis. In 2014 international symposium on biometrics and security technologies (ISBAST), pp. 193\u2013197. IEEE (2014)","DOI":"10.1109\/ISBAST.2014.7013120"},{"key":"5815_CR38","doi-asserted-by":"crossref","unstructured":"Fitriyani, SR., Murfi, H.: The k-means with mini batch algorithm for topics detection on online news. In 2016 4th International Conference on Information and Communication Technology (ICoICT), pp. 1\u20135. IEEE (2016)","DOI":"10.1109\/ICoICT.2016.7571914"},{"key":"5815_CR39","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.sysarc.2019.02.009","volume":"98","author":"A Yousefpour","year":"2019","unstructured":"Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K., Jalali, F., Niakanlahiji, A., Kong, J., Jue, J.P.: All one needs to know about fog computing and related edge computing paradigms: A complete survey. Journal of Systems Architecture 98, 289\u2013330 (2019)","journal-title":"Journal of Systems Architecture"},{"issue":"4","key":"5815_CR40","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MPRV.2013.66","volume":"12","author":"T Verbelen","year":"2013","unstructured":"Verbelen, T., Simoens, P., De Turck, F., Dhoedt, B.: Leveraging cloudlets for immersive collaborative applications. IEEE Pervasive Comput 12(4), 30\u201338 (2013)","journal-title":"IEEE Pervasive Comput"},{"issue":"2","key":"5815_CR41","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1109\/MNET.012.1900434","volume":"36","author":"S Guan","year":"2022","unstructured":"Guan, S., Boukerche, A.: Intelligent edge-based service provisioning using smart cloudlets, fog and mobile edges. IEEE Network 36(2), 139\u2013145 (2022)","journal-title":"IEEE Network"},{"key":"5815_CR42","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zhou, Y., Guo, X., Wu, J., He, Q., Liu, X., Yang, Y.: Self-adaptive-means based on a covering algorithm. Complexity 2018 (2018)","DOI":"10.1155\/2018\/7698274"},{"key":"5815_CR43","unstructured":"Alonso, JB.: K-means vs mini batch k-means: a comparison. (2013)"},{"key":"5815_CR44","doi-asserted-by":"crossref","unstructured":"Yuan, C., Yang, H.: Research on k-value selection method of k-means clustering algorithm. J\u2014Multidisciplinary Scientific J.\u00a02(2):226\u2013235 (2019)","DOI":"10.3390\/j2020016"},{"key":"5815_CR45","doi-asserted-by":"publisher","first-page":"11897","DOI":"10.1109\/ACCESS.2018.2810267","volume":"6","author":"K Peng","year":"2018","unstructured":"Peng, K., Leung, V.C.M., Huang, Q.: Clustering approach based on mini batch kmeans for intrusion detection system over big data. IEEE Access 6, 11897\u201311906 (2018)","journal-title":"IEEE Access"},{"key":"5815_CR46","doi-asserted-by":"crossref","unstructured":"Jin, X., Han, J.: K-medoids clustering. (2010)","DOI":"10.1007\/978-0-387-30164-8_426"},{"key":"5815_CR47","doi-asserted-by":"crossref","unstructured":"Holder, C., Guijo-Rubio, D., Bagnall, A.: Clustering time series with k-medoids based algorithms. In International Workshop on Advanced Analytics and Learning on Temporal Data, pp. 39\u201355. Springer (2023)","DOI":"10.1007\/978-3-031-49896-1_4"},{"key":"5815_CR48","unstructured":"Australian Communications and Media Authority. Radiocomms licence data. https:\/\/www.acma.gov.au\/radiocomms-licence-data, September (2025)"},{"key":"5815_CR49","unstructured":"IP-API. Ip geolocation api. https:\/\/ip-api.com\/, September (2025)"},{"key":"5815_CR50","doi-asserted-by":"crossref","unstructured":"Lai, P., He, Q., Abdelrazek, M., Chen, F., Hosking, J., Grundy, J., Yang, Y.: Optimal edge user allocation in edge computing with variable sized vector bin packing. In Service-Oriented Computing: 16th International Conference, ICSOC 2018, Hangzhou, China, November 12-15, 2018, Proceedings 16, pp. 230\u2013245. Springer (2018)","DOI":"10.1007\/978-3-030-03596-9_15"},{"issue":"3","key":"5815_CR51","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/TPDS.2019.2938944","volume":"31","author":"Q He","year":"2019","unstructured":"He, Q., Cui, G., Zhang, X., Chen, F., Deng, S., Jin, H., Li, Y., Yang, Y.: A game-theoretical approach for user allocation in edge computing environment. IEEE Trans. Parallel Distrib. Syst. 31(3), 515\u2013529 (2019)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"5815_CR52","doi-asserted-by":"crossref","unstructured":"Rani, K.: et\u00a0al. Visual analytics for comparing the impact of outliers in k-means and k-medoids algorithm. In 2019 Amity international conference on artificial intelligence (AICAI), pp. 93\u201397. IEEE (2019)","DOI":"10.1109\/AICAI.2019.8701355"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05815-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05815-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05815-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T13:07:34Z","timestamp":1773925654000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05815-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,13]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2]]}},"alternative-id":["5815"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05815-x","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,13]]},"assertion":[{"value":"11 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 September 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Human and animal ethics"}}],"article-number":"30"}}