{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T06:54:45Z","timestamp":1764053685974,"version":"3.37.3"},"reference-count":34,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100010193","name":"Korea Electric Power Corporation","doi-asserted-by":"publisher","award":["R18XA02"],"award-info":[{"award-number":["R18XA02"]}],"id":[{"id":"10.13039\/501100010193","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002560","name":"Soonchunhyang University","doi-asserted-by":"publisher","award":["R18XA02"],"award-info":[{"award-number":["R18XA02"]}],"id":[{"id":"10.13039\/501100002560","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,10,21]]},"abstract":"<jats:p>The existence of Mobile Edge Computing (MEC) provides a novel and great opportunity to enhance user quality of service (QoS) by enabling local communication. The 5th generation (5G) communication is consisting of massive connectivity at the Radio Access Network (RAN), where the tremendous user traffic will be generated and sent to fronthaul and backhaul gateways, respectively. Since fronthaul and backhaul gateways are commonly installed by using optical networks, the bottleneck network will occur when the incoming traffic exceeds the capacity of the gateways. To meet the requirement of real-time communication in terms of ultralow latency (ULL), these aforementioned issues have to be solved. In this paper, we proposed an intelligent real-time traffic control based on MEC to handle user traffic at both gateways. The method sliced the user traffic into four communication classes, including conversation, streaming, interactive, and background communication. And MEC server has been integrated into the gateway for caching the sliced traffic. Subsequently, the MEC server can handle each user traffic slice based on its QoS requirements. The evaluation results showed that the proposed scheme enhances the QoS and can outperform on the conventional approach in terms of delays, jitters, and throughputs. Based on the simulated results, the proposed scheme is suitable for improving time-sensitive communication including IoT sensor\u2019s data. The simulation results are validated through computer software simulation.<\/jats:p>","DOI":"10.1155\/2020\/8881640","type":"journal-article","created":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:50:07Z","timestamp":1603399807000},"page":"1-11","source":"Crossref","is-referenced-by-count":6,"title":["An Intelligent Real-Time Traffic Control Based on Mobile Edge Computing for Individual Private Environment"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8690-4750","authenticated-orcid":true,"given":"Sa","family":"Math","sequence":"first","affiliation":[{"name":"Department of Software Convergence, Soonchunhyang University, Asan-si, Chungcheongnam-do 31538, Republic of Korea"}]},{"given":"Lejun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, Yangzhou University, Yangzhou 225127, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7919-6557","authenticated-orcid":true,"given":"Seokhoon","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Computer Software Engineering, Soonchunhyang University, Asan-si, Chungcheongnam-do 31538, Republic of Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6630-1189","authenticated-orcid":true,"given":"Intae","family":"Ryoo","sequence":"additional","affiliation":[{"name":"Department of Computer Engineering, Kyung Hee University, Gwangju-si, 17104 Gyeonggi-Do, Republic of Korea"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2017.2745201"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2841349"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2959124"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.26599\/tst.2018.9010069"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.26599\/tst.2018.9010098"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.26599\/tst.2018.9010124"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2866641"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/3437854"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2017.2760458"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5674"},{"issue":"3","key":"11","first-page":"1141","article-title":"Flexible deployment of component-based distributed applications on the cloud and beyond","volume":"13","author":"L. M. Pham","year":"2019","journal-title":"KSII Transactions on Internet and Information Systems"},{"issue":"5","key":"12","first-page":"2221","article-title":"Cybersecurity framework for IIoT-based power system connected to microgrid","volume":"14","author":"J. W. Jang","year":"2020","journal-title":"KSII Transactions on Internet and Information Systems"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1186\/s13638-019-1561-7"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1002\/CPE.5681"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2019.09.001"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2020.01.016"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2019.10.002"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.02.050"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2944007"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2883147"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2866942"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/surv.2013.100613.00161"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1364\/JLT.36.000135"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2501026"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1364\/jocn.11.000b60"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2836315"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/3075849"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2936869"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1364\/jocn.11.0000b1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2019.2927065"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/access.2017.2685434"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2959258"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2947454"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-3063-1"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8881640.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8881640.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8881640.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,22]],"date-time":"2020-10-22T20:50:23Z","timestamp":1603399823000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8881640\/"}},"subtitle":[],"editor":[{"given":"Xiaolong","family":"Xu","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,10,21]]},"references-count":34,"alternative-id":["8881640","8881640"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8881640","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,10,21]]}}}