{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T16:16:04Z","timestamp":1770912964643,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T00:00:00Z","timestamp":1616976000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T00:00:00Z","timestamp":1616976000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s11042-021-10840-0","type":"journal-article","created":{"date-parts":[[2021,3,29]],"date-time":"2021-03-29T18:02:50Z","timestamp":1617040970000},"page":"23983-24004","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":64,"title":["Reinforcement learning for medical information processing over heterogeneous networks"],"prefix":"10.1007","volume":"80","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4829-818X","authenticated-orcid":false,"given":"Amit","family":"Kishor","sequence":"first","affiliation":[]},{"given":"Chinmay","family":"Chakraborty","sequence":"additional","affiliation":[]},{"given":"Wilson","family":"Jeberson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,29]]},"reference":[{"key":"10840_CR1","doi-asserted-by":"crossref","unstructured":"Alam MG, Tun YK, Hong CS (2016) Multi-agent and reinforcement learning based code offloading in mobile fog. In international conference on information networking (ICOIN), IEEE, pp 285-290","DOI":"10.1109\/ICOIN.2016.7427078"},{"key":"10840_CR2","doi-asserted-by":"crossref","unstructured":"Baek JY, Kaddoum G, Garg S, Kaur K, Gravel V (2019) Managing fog networks using reinforcement learning based load balancing algorithm. In IEEE wireless communications and networking conference (WCNC), IEEE, pp 1-7","DOI":"10.1109\/WCNC.2019.8885745"},{"key":"10840_CR3","first-page":"241","volume-title":"OTM confederated international conferences\" on the move to meaningful internet systems\"","author":"AR Benamer","year":"2018","unstructured":"Benamer AR, Teyeb H, Hadj-Alouane NB (2018) Latency-aware placement heuristic in fog computing environment. In: OTM confederated international conferences\" on the move to meaningful internet systems\". Springer, Cham, pp 241\u2013257"},{"key":"10840_CR4","doi-asserted-by":"publisher","unstructured":"Brogi A, Forti S (2017) QoS-aware deployment of IoT applications through the fog. IEEE Internet Things J 4(5):1185\u20131192. https:\/\/doi.org\/10.1109\/JIOT.2017.2701408","DOI":"10.1109\/JIOT.2017.2701408"},{"issue":"3","key":"10840_CR5","doi-asserted-by":"publisher","first-page":"3655","DOI":"10.1007\/s11277-017-4281-5","volume":"96","author":"C Chakraborty","year":"2017","unstructured":"Chakraborty C (2017) Chronic wound image analysis by particle swarm optimization technique for tele-wound network. Wirel Pers Commun 96(3):3655\u20133671","journal-title":"Wirel Pers Commun"},{"issue":"2","key":"10840_CR6","first-page":"35","volume":"3","author":"C Chakraborty","year":"2011","unstructured":"Chakraborty C, Roy R, Pathak S, Chakrabarti S (2011) An optimal probabilistic traffic engineering scheme for heterogeneous networks. CIIT Int Journal of Fuzzy Syst 3(2):35\u201339","journal-title":"CIIT Int Journal of Fuzzy Syst"},{"issue":"12","key":"10840_CR7","doi-asserted-by":"publisher","first-page":"5261","DOI":"10.1007\/s11227-017-2083-x","volume":"73","author":"S El Kafhali","year":"2017","unstructured":"El Kafhali S, Salah K (2017) Efficient and dynamic scaling of fog nodes for IoT devices. J Supercomput 73(12):5261\u20135284","journal-title":"J Supercomput"},{"key":"10840_CR8","doi-asserted-by":"publisher","unstructured":"Kadhim AJ, Seno SAH (2019) Energy-efficient multicast routing protocol based on SDN and fog computing for vehicular networks. Ad Hoc Netw 84:68\u201381. https:\/\/doi.org\/10.1016\/j.adhoc.2018.09.018","DOI":"10.1016\/j.adhoc.2018.09.018"},{"key":"10840_CR9","unstructured":"Kaur P, Khurmi DS, Josan DG (2012) Fuzzy based analysis of proposed model for physical health standard based on association rule mining techniques. Int J Comput Sci Commun Eng 1(2)"},{"key":"10840_CR10","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.procs.2015.04.076","volume":"50","author":"S KBa","year":"2015","unstructured":"KBa S, Sa D, Sa M, Ra VC (2015) Cloud based fuzzy healthcare system. Procedia Comput Sci 50:143\u2013148","journal-title":"Procedia Comput Sci"},{"issue":"3","key":"10840_CR11","doi-asserted-by":"publisher","first-page":"2163","DOI":"10.1007\/s11042-013-1507-8","volume":"72","author":"HJ Kim","year":"2014","unstructured":"Kim HJ, Choi SG (2014) QoE assessment model for multimedia streaming services using QoS parameters. Multimed Tools Appl 72(3):2163\u20132175","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"10840_CR12","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/TDSC.2017.2662216","volume":"16","author":"Y Li","year":"2017","unstructured":"Li Y, Yu Y, Min G, Susilo W, Ni J, Choo KK (2017) Fuzzy identity-based data integrity auditing for reliable cloud storage systems. IEEE Trans Depend Secure Comput 16(1):72\u201383","journal-title":"IEEE Trans Depend Secure Comput"},{"issue":"1","key":"10840_CR13","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/JIOT.2017.2780236","volume":"5","author":"L Liu","year":"2017","unstructured":"Liu L, Chang Z, Guo X, Mao S, Ristaniemi T (2017) Multiobjective optimization for computation offloading in fog computing. IEEE Internet Things J 5(1):283\u2013294","journal-title":"IEEE Internet Things J"},{"key":"10840_CR14","doi-asserted-by":"crossref","unstructured":"Mahmud R, Koch FL, Buyya R (2018) Cloud-fog interoperability in IoT-enabled healthcare solutions. In proceedings of the 19th international conference on distributed computing and networking, India, pp 1-10","DOI":"10.1145\/3154273.3154347"},{"issue":"9","key":"10840_CR15","doi-asserted-by":"publisher","first-page":"2830","DOI":"10.3390\/s18092830","volume":"18","author":"L Mai","year":"2018","unstructured":"Mai L, Dao NN, Park M (2018) Real-time task assignment approach leveraging reinforcement learning with evolution strategies for long-term latency minimization in fog computing. Sensors 18(9):2830","journal-title":"Sensors"},{"issue":"5s","key":"10840_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3358203","volume":"18","author":"K Moazzemi","year":"2019","unstructured":"Moazzemi K, Maity B, Yi S, Rahmani AM, Dutt N (2019) HESSLE-FREE: heterogeneous systems leveraging fuzzy control for runtime resource management. ACM Trans Embed Comput Syst (TECS) 18(5s):1\u201319","journal-title":"ACM Trans Embed Comput Syst (TECS)"},{"issue":"1","key":"10840_CR17","doi-asserted-by":"publisher","first-page":"9","DOI":"10.21928\/uhdjst.v4n1y2020.pp9-17","volume":"4","author":"ZF Mohammed","year":"2020","unstructured":"Mohammed ZF, Abdulla AA (2020) Thresholding-based white blood cells segmentation from microscopic blood images. UHD J Sci Technol 4(1):9\u201317","journal-title":"UHD J Sci Technol"},{"key":"10840_CR18","doi-asserted-by":"crossref","unstructured":"Mohammed ZF, Abdulla AA (2020) An efficient CAD system for ALL cell identification from microscopic blood images. Multimed Tools Appl:1\u201314","DOI":"10.1007\/s11042-020-10066-6"},{"key":"10840_CR19","doi-asserted-by":"publisher","unstructured":"Mondal HS, Hasan MT, Hossain MB, Mandal R (2017) Improving reliable cloud computing environment using fuzzy logic. 2017 20th international conference of computer and information technology (ICCIT, IEEE, Dhaka, Bangladesh, 2017, pp. 1-4. https:\/\/doi.org\/10.1109\/ICCITECHN.2017.8281825","DOI":"10.1109\/ICCITECHN.2017.8281825"},{"key":"10840_CR20","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.future.2018.07.049","volume":"90","author":"AA Mutlag","year":"2019","unstructured":"Mutlag AA, Abd Ghani MK, Arunkumar NA, Mohammed MA, Mohd O (2019) Enabling technologies for fog computing in healthcare IoT systems. Futur Gener Comput Syst 90:62\u201378","journal-title":"Futur Gener Comput Syst"},{"key":"10840_CR21","doi-asserted-by":"publisher","unstructured":"Naseri A, Navimipour NJ (2019) A new agent-based method for QoS-aware cloud service composition using particle swarm optimization algorithm. J Ambient Intell Humaniz Comput 10(5):1851\u20131864. https:\/\/doi.org\/10.1007\/s12652-018-0773-8","DOI":"10.1007\/s12652-018-0773-8"},{"key":"10840_CR22","doi-asserted-by":"crossref","unstructured":"Nishtala R, Carpenter P, Petrucci V, Martorell X (2017) Hipster: hybrid task manager for latency-critical cloud workloads. In proceedings IEEE international symposium on high performance computer architecture (HPCA), IEEE, pp 409-420","DOI":"10.1109\/HPCA.2017.13"},{"key":"10840_CR23","doi-asserted-by":"crossref","unstructured":"Ritu, Jain S (2016) A trust model in cloud computing based on fuzzy logic. In IEEE international conference on recent trends in electronics, Information & Communication Technology (RTEICT), IEEE, pp. 47\u201352","DOI":"10.1109\/RTEICT.2016.7807780"},{"key":"10840_CR24","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1016\/j.compeleceng.2016.09.013","volume":"69","author":"BB Saravana","year":"2018","unstructured":"Saravana BB, Karthikeyan NK, RajKumar RS (2018) Fuzzy service conceptual ontology system for cloud service recommendation. Comput Electr Eng 69:435\u2013446","journal-title":"Comput Electr Eng"},{"key":"10840_CR25","doi-asserted-by":"crossref","unstructured":"Selvakanmani S, Sumathi M (2020) Fuzzy assisted fog and cloud computing with MIoT system for performance analysis of health surveillance system. J Ambient Intell Human Comput","DOI":"10.1007\/s12652-020-02156-y"},{"key":"10840_CR26","doi-asserted-by":"publisher","unstructured":"Singh S, Ra IH, Meng W, Kaur M, Cho GH (2019) SH-BlockCC: a secure and efficient internet of things smart home architecture based on cloud computing and blockchain technology. Int J Distrib Sens Netw 15(4):1550147719844159. https:\/\/doi.org\/10.1177\/1550147719844159","DOI":"10.1177\/1550147719844159"},{"key":"10840_CR27","doi-asserted-by":"publisher","unstructured":"Sodhro AH, Luo Z, Sangaiah AK, Baik SW (2019) Mobile edge computing based QoS optimization in medical healthcare applications. Int J Inf Manag 45:308\u2013318. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.08.004","DOI":"10.1016\/j.ijinfomgt.2018.08.004"},{"issue":"3","key":"10840_CR28","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1007\/s00521-018-3931-1","volume":"32","author":"AH Sodhro","year":"2020","unstructured":"Sodhro AH, Malokani AS, Sodhro GH, Muzammal M, Zongwei L (2020) An adaptive QoS computation for medical data processing in intelligent healthcare applications. Neural Comput & Applic 32(3):723\u2013734","journal-title":"Neural Comput & Applic"},{"key":"10840_CR29","doi-asserted-by":"publisher","first-page":"15619","DOI":"10.1109\/ACCESS.2017.2733225","volume":"5","author":"SA Soleymani","year":"2017","unstructured":"Soleymani SA, Abdullah AH, Zareei M, Anisi MH, Vargas-Rosales C, Khan MK, Goudarzi S (2017) A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing. IEEE Access 5:15619\u201315629","journal-title":"IEEE Access"},{"key":"10840_CR30","doi-asserted-by":"publisher","unstructured":"Sun L, Ma J, Zhang Y, Dong H, Hussain FK (2016) Cloud-FuSeR: fuzzy ontology and MCDM based cloud528service selection. Futur Gener Comput Syst 57:42\u201355. https:\/\/doi.org\/10.1016\/j.future.2015.11.025","DOI":"10.1016\/j.future.2015.11.025"},{"issue":"04","key":"10840_CR31","doi-asserted-by":"publisher","first-page":"1750023","DOI":"10.1142\/S1469026817500237","volume":"16","author":"U Umoh","year":"2017","unstructured":"Umoh U, Asuquo D (2017) Fuzzy logic-based quality of service evaluation for multimedia transmission over wireless ad hoc networks. Int J Comput Intell Appl 16(04):1750023","journal-title":"Int J Comput Intell Appl"},{"issue":"12","key":"10840_CR32","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1109\/MCOM.2017.1700523","volume":"55","author":"H Xiang","year":"2017","unstructured":"Xiang H, Zhou W, Daneshmand M, Peng M (2017) Network slicing in fog radio access networks: issues and challenges. IEEE Commun Mag 55(12):110\u2013116","journal-title":"IEEE Commun Mag"},{"issue":"2","key":"10840_CR33","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1109\/JIOT.2017.2788802","volume":"5","author":"A Yousefpour","year":"2018","unstructured":"Yousefpour A, Ishigaki G, Gour R, Jue JP (2018) On reducing IoT service delay via fog offloading. IEEE Internet Things J 5(2):998\u20131010","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"10840_CR34","first-page":"39","volume":"5","author":"MO Zavvar","year":"2016","unstructured":"Zavvar MO, Rezaei ME, Garavand SH, Ramezani FA (2016) Fuzzy logic-based algorithm resource scheduling for improving the reliability of cloud computing. Asia-Pac J Inf Technol Multimed 5(1):39\u201348","journal-title":"Asia-Pac J Inf Technol Multimed"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10840-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11042-021-10840-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-021-10840-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,5]],"date-time":"2021-07-05T04:07:39Z","timestamp":1625458059000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11042-021-10840-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,29]]},"references-count":34,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["10840"],"URL":"https:\/\/doi.org\/10.1007\/s11042-021-10840-0","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,29]]},"assertion":[{"value":"27 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 February 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}