{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,22]],"date-time":"2026-04-22T19:40:02Z","timestamp":1776886802685,"version":"3.51.2"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,12,27]],"date-time":"2022-12-27T00:00:00Z","timestamp":1672099200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,27]],"date-time":"2022-12-27T00:00:00Z","timestamp":1672099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s11277-022-10160-y","type":"journal-article","created":{"date-parts":[[2022,12,27]],"date-time":"2022-12-27T18:02:31Z","timestamp":1672164151000},"page":"853-880","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Machine Learning for Fog Computing: Review, Opportunities and a Fog Application Classifier and Scheduler"],"prefix":"10.1007","volume":"129","author":[{"given":"Mohd","family":"Aqib","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1992-1398","authenticated-orcid":false,"given":"Dinesh","family":"Kumar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sarsij","family":"Tripathi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,12,27]]},"reference":[{"key":"10160_CR1","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/B978-0-12-821472-5.00017-X","volume-title":"IoT-based data analytics for the healthcare industry","author":"D Kumar","year":"2021","unstructured":"Kumar, D., Maurya, A. K., & Baranwal, G. (2021). IoT services in healthcare industry with fog\/edge and cloud computing. IoT-based data analytics for the healthcare industry (pp. 81\u2013103). Academic Press."},{"key":"10160_CR2","unstructured":"Sajid, M., & Raza, Z. (2013). Cloud computing: Issues & challenges. In International Conference on Cloud, Big Data and Trust (Vol. 20, pp. 34\u201341). Retrieved from https:\/\/www.researchgate.net\/profile\/Mohammad-Sajid-12\/publication\/278117154_Cloud_Computing_Issues_Challenges\/links\/557c12a908ae26eada8c7097\/Cloud-Computing-Issues-Challenges.pdf."},{"key":"10160_CR3","doi-asserted-by":"publisher","unstructured":"Baranwal, G., & Kumar, D. (2020). DAFNA: Decentralized auction based fog node allocation in 5G Era. In 2020 IEEE 15th International Conference on Industrial and Information Systems, ICIIS 2020 - Proceedings (pp. 575\u2013580). IEEE. https:\/\/doi.org\/10.1109\/ICIIS51140.2020.9342683.","DOI":"10.1109\/ICIIS51140.2020.9342683"},{"key":"10160_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-019-09491-1","author":"M Ghobaei-Arani","year":"2020","unstructured":"Ghobaei-Arani, M., Souri, A., & Rahmanian, A. A. (2020). Resource management approaches in fog computing: A comprehensive review. Journal of Grid Computing. https:\/\/doi.org\/10.1007\/s10723-019-09491-1","journal-title":"Journal of Grid Computing"},{"key":"10160_CR5","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.sysarc.2019.02.009","volume":"98","author":"A Yousefpour","year":"2019","unstructured":"Yousefpour, A., Fung, C., Nguyen, T., Kadiyala, K., Jalali, F., Niakanlahiji, A., & Jue, J. P. (2019). All one needs to know about fog computing and related edge computing paradigms: A complete survey. Journal of Systems Architecture, 98, 289\u2013330. https:\/\/doi.org\/10.1016\/j.sysarc.2019.02.009","journal-title":"Journal of Systems Architecture"},{"key":"10160_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/S10723-021-09593-9","author":"D Kumar","year":"2021","unstructured":"Kumar, D., Baranwal, G., & Vidyarthi, D. P. (2021). A survey on auction based approaches for resource allocation and pricing in emerging edge technologies. Journal of Grid Computing. https:\/\/doi.org\/10.1007\/S10723-021-09593-9","journal-title":"Journal of Grid Computing"},{"key":"10160_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/S11280-022-01053-Y","author":"D Kumar","year":"2022","unstructured":"Kumar, D., Baranwal, G., Shankar, Y., & Vidyarthi, D. P. (2022). A survey on nature-inspired techniques for computation offloading and service placement in emerging edge technologies. World Wide Web. https:\/\/doi.org\/10.1007\/S11280-022-01053-Y","journal-title":"World Wide Web"},{"key":"10160_CR8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2947542","author":"KH Abdulkareem","year":"2019","unstructured":"Abdulkareem, K. H., Mohammed, M. A., Gunasekaran, S. S., Al-Mhiqani, M. N., Mutlag, A. A., Mostafa, S. A., & Ibrahim, D. A. (2019). A review of fog computing and machine learning: Concepts, applications, challenges, and open issues. IEEE Access. https:\/\/doi.org\/10.1109\/ACCESS.2019.2947542","journal-title":"IEEE Access"},{"key":"10160_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2943405","author":"TK Rodrigues","year":"2020","unstructured":"Rodrigues, T. K., Suto, K., Nishiyama, H., Liu, J., & Kato, N. (2020). Machine Learning meets computation and communication control in evolving edge and cloud: Challenges and future perspective. IEEE Communications Surveys and Tutorials. https:\/\/doi.org\/10.1109\/COMST.2019.2943405","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"10160_CR10","doi-asserted-by":"publisher","unstructured":"Bonomi, F., Milito, R., Zhu, J., & Addepalli, S. (2012). Fog computing and its role in the internet of things. In MCC\u201912 - Proceedings of the 1st ACM Mobile Cloud Computing Workshop (pp. 13\u201315). https:\/\/doi.org\/10.1145\/2342509.2342513.","DOI":"10.1145\/2342509.2342513"},{"key":"10160_CR11","unstructured":"OpenFog Consortium Architecture Working Group. (2016). OpenFog Architecture Overview. OpenFogConsortium, (February), 1\u201335. Retrieved from www.OpenFogConsortium.org."},{"key":"10160_CR12","unstructured":"OpenfogConsortium. (2017). OpenFog Reference Architecture for Fog Computing Produced. Reference Architecture. OPFRA001.020817."},{"key":"10160_CR13","doi-asserted-by":"publisher","DOI":"10.1145\/3341145","author":"T Le Duc","year":"2019","unstructured":"Le Duc, T., Leiva, R. G., Casari, P., & \u00d6stberg, P. O. (2019). Machine learning methods for reliable resource provisioning in edge-cloud computing: A survey. ACM Computing Surveys. https:\/\/doi.org\/10.1145\/3341145","journal-title":"ACM Computing Surveys"},{"key":"10160_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2021.107682","author":"U Farooq","year":"2021","unstructured":"Farooq, U., Shabir, M. W., Javed, M. A., & Imran, M. (2021). Intelligent energy prediction techniques for fog computing networks. Applied Soft Computing. https:\/\/doi.org\/10.1016\/j.asoc.2021.107682","journal-title":"Applied Soft Computing"},{"issue":"7\u20138","key":"10160_CR15","doi-asserted-by":"publisher","first-page":"2367","DOI":"10.1007\/s00170-020-05548-8","volume":"108","author":"H Qiao","year":"2020","unstructured":"Qiao, H., Wang, T., & Wang, P. (2020). A tool wear monitoring and prediction system based on multiscale deep learning models and fog computing. International Journal of Advanced Manufacturing Technology, 108(7\u20138), 2367\u20132384. https:\/\/doi.org\/10.1007\/s00170-020-05548-8","journal-title":"International Journal of Advanced Manufacturing Technology"},{"issue":"1","key":"10160_CR16","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/JIOT.2019.2945066","volume":"7","author":"X Gao","year":"2020","unstructured":"Gao, X., Huang, X., Bian, S., Shao, Z., & Yang, Y. (2020). PORA: Predictive offloading and resource allocation in dynamic fog computing systems. IEEE Internet of Things Journal, 7(1), 72\u201387. https:\/\/doi.org\/10.1109\/JIOT.2019.2945066","journal-title":"IEEE Internet of Things Journal"},{"issue":"8","key":"10160_CR17","doi-asserted-by":"publisher","first-page":"8305","DOI":"10.1007\/s12652-020-02564-0","volume":"12","author":"G Baranwal","year":"2021","unstructured":"Baranwal, G., & Vidyarthi, D. P. (2021). Computation offloading model for smart factory. Journal of Ambient Intelligence and Humanized Computing, 12(8), 8305\u20138318. https:\/\/doi.org\/10.1007\/s12652-020-02564-0","journal-title":"Journal of Ambient Intelligence and Humanized Computing"},{"key":"10160_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-021-09568-w","author":"X Li","year":"2021","unstructured":"Li, X. (2021). A computing offloading resource allocation scheme using deep reinforcement learning in mobile edge computing systems. Journal of Grid Computing. https:\/\/doi.org\/10.1007\/s10723-021-09568-w","journal-title":"Journal of Grid Computing"},{"key":"10160_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.102974","author":"A Shakarami","year":"2021","unstructured":"Shakarami, A., Shahidinejad, A., & Ghobaei-Arani, M. (2021). An autonomous computation offloading strategy in mobile edge computing: A deep learning-based hybrid approach. Journal of Network and Computer Applications. https:\/\/doi.org\/10.1016\/j.jnca.2021.102974","journal-title":"Journal of Network and Computer Applications"},{"key":"10160_CR20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103078","author":"ZM Nayeri","year":"2021","unstructured":"Nayeri, Z. M., Ghafarian, T., & Javadi, B. (2021). Application placement in Fog computing with AI approach: Taxonomy and a state of the art survey. Journal of Network and Computer Applications. https:\/\/doi.org\/10.1016\/j.jnca.2021.103078","journal-title":"Journal of Network and Computer Applications"},{"key":"10160_CR21","volume-title":"Communications in computer and information science","author":"M Arif","year":"2020","unstructured":"Arif, M., Azam, F., Anwar, M. W., & Rasheed, Y. (2020). A model-driven framework for optimum application placement in fog computing using a machine learning based approach. Communications in computer and information science. Springer."},{"key":"10160_CR22","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2021.3123165","author":"M Goudarzi","year":"2021","unstructured":"Goudarzi, M., Palaniswami, M. S., & Buyya, R. (2021). A distributed deep reinforcement learning technique for application placement in edge and fog computing environments. IEEE Transactions on Mobile Computing. https:\/\/doi.org\/10.1109\/TMC.2021.3123165","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"10160_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.07.019","author":"H Lu","year":"2020","unstructured":"Lu, H., Gu, C., Luo, F., Ding, W., & Liu, X. (2020). Optimization of lightweight task offloading strategy for mobile edge computing based on deep reinforcement learning. Future Generation Computer Systems. https:\/\/doi.org\/10.1016\/j.future.2019.07.019","journal-title":"Future Generation Computer Systems"},{"key":"10160_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.03.424","author":"N Mani","year":"2020","unstructured":"Mani, N., Singh, A., & Nimmagadda, S. L. (2020). An IoT guided healthcare monitoring system for managing real-time notifications by fog computing services. Procedia Computer Science. https:\/\/doi.org\/10.1016\/j.procs.2020.03.424","journal-title":"Procedia Computer Science"},{"key":"10160_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8737-0","author":"G Baranwal","year":"2018","unstructured":"Baranwal, G., Kumar, D., Raza, Z., & Vidyarthi, D. P. (2018). Auction based resource provisioning in cloud computing. SpringerBriefs in Computer Science. Singapore: Springer Singapore. https:\/\/doi.org\/10.1007\/978-981-10-8737-0","journal-title":"SpringerBriefs in Computer Science. Singapore: Springer Singapore."},{"issue":"5","key":"10160_CR26","doi-asserted-by":"publisher","first-page":"2140","DOI":"10.1109\/TII.2017.2679740","volume":"13","author":"B Tang","year":"2017","unstructured":"Tang, B., Chen, Z., Hefferman, G., Pei, S., Wei, T., He, H., & Yang, Q. (2017). Incorporating intelligence in fog computing for big data analysis in smart cities. IEEE Transactions on Industrial Informatics, 13(5), 2140\u20132150. https:\/\/doi.org\/10.1109\/TII.2017.2679740","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"10160_CR27","doi-asserted-by":"publisher","unstructured":"Alrashdi, I., Alqazzaz, A., Aloufi, E., Alharthi, R., Zohdy, M., & Ming, H. (2019). AD-IoT: Anomaly detection of IoT cyberattacks in smart city using machine learning. In 2019 IEEE 9th Annual Computing and Communication Workshop and Conference, CCWC 2019. https:\/\/doi.org\/10.1109\/CCWC.2019.8666450.","DOI":"10.1109\/CCWC.2019.8666450"},{"key":"10160_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.05.049","author":"S Rathore","year":"2018","unstructured":"Rathore, S., & Park, J. H. (2018). Semi-supervised learning based distributed attack detection framework for IoT. Applied Soft Computing Journal. https:\/\/doi.org\/10.1016\/j.asoc.2018.05.049","journal-title":"Applied Soft Computing Journal"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-10160-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-022-10160-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-022-10160-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,26]],"date-time":"2023-03-26T22:32:08Z","timestamp":1679869928000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-022-10160-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,27]]},"references-count":28,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["10160"],"URL":"https:\/\/doi.org\/10.1007\/s11277-022-10160-y","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,27]]},"assertion":[{"value":"15 December 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 December 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}