{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:10:32Z","timestamp":1758845432620,"version":"3.37.3"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Things J."],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/jiot.2019.2910875","type":"journal-article","created":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T23:39:38Z","timestamp":1558481978000},"page":"6725-6735","source":"Crossref","is-referenced-by-count":7,"title":["Sustainability Analysis for Fog Nodes With Renewable Energy Supplies"],"prefix":"10.1109","volume":"6","author":[{"given":"Jiaojiao","family":"Jiang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3026-7537","authenticated-orcid":false,"given":"Longxiang","family":"Gao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0306-2691","authenticated-orcid":false,"given":"Jiong","family":"Jin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5215-7443","authenticated-orcid":false,"given":"Tom H.","family":"Luan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4485-6743","authenticated-orcid":false,"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3545-7863","authenticated-orcid":false,"given":"Yong","family":"Xiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8719-284X","authenticated-orcid":false,"given":"Saurabh","family":"Garg","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","volume":"106","author":"everitt","year":"2002","journal-title":"The Cambridge Dictionary of Statistics"},{"key":"ref32","volume":"3","author":"noble","year":"1988","journal-title":"Applied Linear Algebra"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1982.tb03089.x"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.1991.188640"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150428"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-5861-5_5"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1128\/CDLI.9.6.1235-1239.2002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2677046.2677052"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2014.141214"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2565516"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2645559"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.032591612"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2016.2597546"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26187-4_7"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/S0305004100036094"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/0166-5316(93)90035-S"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"81","DOI":"10.3233\/JHS-1993-2104","article-title":"Analysis of the leaky bucket algorithm for on-off data sources","volume":"2","author":"yin","year":"1993","journal-title":"J High Speed Netw"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2839359"},{"key":"ref27","first-page":"82","article-title":"Performance limitation of leaky bucket algorithm for usage parameter control and bandwidth allocation methods","volume":"75","author":"yamanaka","year":"1992","journal-title":"IEICE Trans Commun"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2322606"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.10.025"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.1994.577075"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2558146"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2015.2478381"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3390\/s16050696"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3485"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2584538"},{"key":"ref20","first-page":"331","article-title":"Queue M\/G\/1 with adaptive multistage vacation","volume":"5","author":"naishuo","year":"1989","journal-title":"MATHEMATICA APPLICATA"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2013.02.023"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2017.8215403"},{"key":"ref24","first-page":"125","article-title":"Online-monitoring and prediction of wind power in German transmission system operation centres","author":"ernst","year":"2002","journal-title":"Proc 1st IEA Joint Action Symp Wind Forecast Tech"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2004.1321381"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/dac.4510030214"},{"key":"ref25","volume":"19","author":"schwartz","year":"1996","journal-title":"Broadband Integrated Networks"}],"container-title":["IEEE Internet of Things Journal"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488907\/8784345\/08689072.pdf?arnumber=8689072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:45:58Z","timestamp":1657745158000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8689072\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":36,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jiot.2019.2910875","relation":{},"ISSN":["2327-4662","2372-2541"],"issn-type":[{"type":"electronic","value":"2327-4662"},{"type":"electronic","value":"2372-2541"}],"subject":[],"published":{"date-parts":[[2019,8]]}}}