{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:01:49Z","timestamp":1773615709151,"version":"3.50.1"},"reference-count":25,"publisher":"Allerton Press","issue":"4","license":[{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T00:00:00Z","timestamp":1722470400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.3103\/s0146411624700512","type":"journal-article","created":{"date-parts":[[2024,8,28]],"date-time":"2024-08-28T06:02:32Z","timestamp":1724824952000},"page":"392-407","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A Research on Genetic Algorithm-Based Task Scheduling in Cloud-Fog Computing Systems"],"prefix":"10.3103","volume":"58","author":[{"family":"Wang Hao","sequence":"first","affiliation":[]},{"given":"Li","family":"Hui","sequence":"additional","affiliation":[]},{"given":"Song","family":"Duanzheng","sequence":"additional","affiliation":[]},{"given":"Zhu","family":"Jintao","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2024,8,28]]},"reference":[{"key":"7712_CR1","doi-asserted-by":"publisher","first-page":"7008","DOI":"10.1109\/twc.2020.2996628","volume":"19","author":"F. Fang","year":"2020","unstructured":"Fang, F., Ye, G., Zhang, H., Cheng, J., and Leung, V.C.M., Energy-efficient joint user association and power allocation in a heterogeneous network, IEEE Trans. Wireless Commun., 2020, vol. 19, no. 11, pp. 7008\u20137020. https:\/\/doi.org\/10.1109\/twc.2020.2996628","journal-title":"IEEE Trans. Wireless Commun."},{"key":"7712_CR2","first-page":"155","volume":"39","author":"W. Liu","year":"2016","unstructured":"Liu, W., Yu, J., and Mu, X., Research on power control technology based on LTE-A heterogeneous network, J.\u00a0Electron. Meas. Technol., 2016, vol. 39, no. 12, pp. 155\u2013158.","journal-title":"J.\u00a0Electron. Meas. Technol."},{"key":"7712_CR3","doi-asserted-by":"publisher","unstructured":"Falfushinsky, V., Skarlat, O., and Tulchinsky, V., Cloud computing platform within grid infrastructure, 2013 IEEE 7th Int. Conf. on Intelligent Data Acquisition and Advanced Computing Systems (IDAACS), Berlin, 2013, IEEE, 2013, pp. 717\u2013720. https:\/\/doi.org\/10.1109\/idaacs.2013.6663018","DOI":"10.1109\/idaacs.2013.6663018"},{"key":"7712_CR4","doi-asserted-by":"publisher","unstructured":"Marbukh, V., Systemic risks in the cloud computing model: Complex systems perspective, 2016 IEEE 9th Int. Conf. on Cloud Computing (CLOUD), San Francisco, 2016, IEEE, 2016, pp. 863\u2013866. https:\/\/doi.org\/10.1109\/cloud.2016.0124","DOI":"10.1109\/cloud.2016.0124"},{"key":"7712_CR5","doi-asserted-by":"publisher","first-page":"10","DOI":"10.3390\/bdcc2020010","volume":"2","author":"H. Atlam","year":"2018","unstructured":"Atlam, H., Walters, R., and Wills, G., Fog computing and the Internet of Things: A review, Big Data Cognit. Comput., 2018, vol. 2, no. 2, p. 10. https:\/\/doi.org\/10.3390\/bdcc2020010","journal-title":"Big Data Cognit. Comput."},{"key":"7712_CR6","doi-asserted-by":"publisher","unstructured":"Tun, Kh.N. and Myat Paing, A.M., Resource aware placement of IoT devices in fog computing, 2020 Int. Conf. on Advanced Information Technologies (ICAIT), Yangon, Myanmar, 2020, IEEE, 2020, pp. 176\u2013181. https:\/\/doi.org\/10.1109\/icait51105.2020.9261787","DOI":"10.1109\/icait51105.2020.9261787"},{"key":"7712_CR7","doi-asserted-by":"publisher","unstructured":"Lee, Yo.Ch. and Lian, B., Cloud bursting scheduler for cost efficiency, 2017 IEEE 10th Int. Conf. on Cloud Computing (CLOUD), Honololu, Hawaii, 2017, IEEE, 2017, pp. 774\u2013777. https:\/\/doi.org\/10.1109\/cloud.2017.112","DOI":"10.1109\/cloud.2017.112"},{"key":"7712_CR8","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/mcc.2017.37","volume":"4","author":"D.S. Linthicum","year":"2017","unstructured":"Linthicum, D.S., Connecting fog and cloud computing, IEEE Cloud Comput., 2017, vol. 4, no. 2, pp. 18\u201320. https:\/\/doi.org\/10.1109\/mcc.2017.37","journal-title":"IEEE Cloud Comput."},{"key":"7712_CR9","doi-asserted-by":"publisher","first-page":"16874","DOI":"10.1109\/jiot.2022.3146239","volume":"9","author":"Ch. Fang","year":"2022","unstructured":"Fang, Ch., Xu, H., Yang, Yi., Hu, Zh., Tu, Sh., Ota, K., Yang, Zh., Dong, M., Han, Zh., Yu, F.R., and Liu, Yu., Deep-reinforcement-learning-based resource allocation for content distribution in fog radio access networks, IEEE Internet Things J., 2022, vol. 9, no. 18, pp. 16874\u201316883. https:\/\/doi.org\/10.1109\/jiot.2022.3146239","journal-title":"IEEE Internet Things J."},{"key":"7712_CR10","doi-asserted-by":"publisher","first-page":"5189","DOI":"10.1109\/jiot.2021.3111079","volume":"9","author":"Q. Fan","year":"2022","unstructured":"Fan, Q., Bai, J., Zhang, H., Yi, Ya., and Liu, L., Delay-aware resource allocation in fog-assisted IoT networks through reinforcement learning, IEEE Internet Things J., 2022, vol. 9, no. 7, pp. 5189\u20135199. https:\/\/doi.org\/10.1109\/jiot.2021.3111079","journal-title":"IEEE Internet Things J."},{"key":"7712_CR11","doi-asserted-by":"publisher","unstructured":"Khumalo, N., Oyerinde, O., and Mfupe, L., Reinforcement learning-based computation resource allocation scheme for 5G fog-radio access network, 2020 Fifth Int. Conf. on Fog and Mobile Edge Computing (FMEC), Paris, 2020, IEEE, 2020, pp. 353\u2013355. https:\/\/doi.org\/10.1109\/fmec49853.2020.9144787","DOI":"10.1109\/fmec49853.2020.9144787"},{"key":"7712_CR12","doi-asserted-by":"publisher","first-page":"12555","DOI":"10.1109\/access.2023.3241881","volume":"11","author":"D.H. Abdulazeez","year":"2023","unstructured":"Abdulazeez, D.H. and Askar, Sh.K., Offloading mechanisms based on reinforcement learning and deep learning algorithms in the fog computing environment, IEEE Access, 2023, vol. 11, pp. 12555\u201312586. https:\/\/doi.org\/10.1109\/access.2023.3241881","journal-title":"IEEE Access"},{"key":"7712_CR13","doi-asserted-by":"publisher","unstructured":"Guevara, J.C., Torres, R.D.S., Bittencourt, L.F., and Da Fonseca, N.L.S., QoS-aware task scheduling based on reinforcement learning for the cloud-fog continuum, GLOBECOM 2022\u20132022 IEEE Global Communications Conf., Rio de Janeiro, 2022, IEEE, 2022, pp. 2328\u20132333. https:\/\/doi.org\/10.1109\/globecom48099.2022.10001644","DOI":"10.1109\/globecom48099.2022.10001644"},{"key":"7712_CR14","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1080\/17517575.2017.1304579","volume":"12","author":"S. Bitam","year":"2018","unstructured":"Bitam, S., Zeadally, Sh., and Mellouk, A., Fog computing job scheduling optimization based on bees swarm, Enterpr. Inf. Syst., 2018, vol. 12, no. 4, pp. 373\u2013397. https:\/\/doi.org\/10.1080\/17517575.2017.1304579","journal-title":"Enterpr. Inf. Syst."},{"key":"7712_CR15","doi-asserted-by":"publisher","unstructured":"Binh, H.T.T., Anh, T.T., Son, D.B., Duc, P.A., and Nguyen, B.M., An evolutionary algorithm for solving task scheduling problem in cloud-fog computing environment, Proc. Ninth Int. Symp. on Information and Communication Technology\u2013SoICT 2018, Danang City, Viet Nam, 2018, New York: Association for Computing Machinery, 2018, pp. 397\u2013404. https:\/\/doi.org\/10.1145\/3287921.3287984","DOI":"10.1145\/3287921.3287984"},{"key":"7712_CR16","doi-asserted-by":"publisher","first-page":"996","DOI":"10.1109\/tdsc.2017.2725953","volume":"16","author":"J. Shen","year":"2019","unstructured":"Shen, J., Zhou, T., He, D., Zhang, Yu., Sun, X., and Xiang, Ya., Block design-based key agreement for group data sharing in cloud computing, IEEE Trans. Dependable Secure Comput., 2019, vol. 16, no. 6, pp. 996\u20131010. https:\/\/doi.org\/10.1109\/tdsc.2017.2725953","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"7712_CR17","doi-asserted-by":"publisher","unstructured":"Sun, A., Gao, G., Ji, T., and Tu, X., One quantifiable security evaluation model for cloud computing platform, 2018 Sixth Int. Conf. on Advanced Cloud and Big Data (CBD), Lanzhou, China, 2018, IEEE, 2018, pp. 197\u2013201. https:\/\/doi.org\/10.1109\/cbd.2018.00043","DOI":"10.1109\/cbd.2018.00043"},{"key":"7712_CR18","doi-asserted-by":"publisher","unstructured":"Rabay\u2019a, A., Schleicher, E., and Graffi, K., Fog computing with P2P: Enhancing fog computing bandwidth for iot scenarios, 2019 Int. Conf. on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Atlanta, 2019, IEEE, 2019, pp. 82\u201389. https:\/\/doi.org\/10.1109\/ithings\/greencom\/cpscom\/smartdata.2019.00036","DOI":"10.1109\/ithings\/greencom\/cpscom\/smartdata.2019.00036"},{"key":"7712_CR19","doi-asserted-by":"publisher","unstructured":"Liu, Z., Yang, Ya., Chen, Yu., Li, K., Li, Z., and Luo, X., A multi-tier cost model for effective user scheduling in fog computing networks, IEEE INFOCOM 2019\u2013IEEE Conf. on Computer Communications Workshops (I-NFOCOM WKSHPS), Paris, 2019, IEEE, 2019, pp. 1\u20136. https:\/\/doi.org\/10.1109\/infcomw.2019.8845252","DOI":"10.1109\/infcomw.2019.8845252"},{"key":"7712_CR20","doi-asserted-by":"publisher","first-page":"1730","DOI":"10.3390\/app9091730","volume":"9","author":"B.M. Nguyen","year":"2019","unstructured":"Nguyen, B.M., Thi Thanh Binh, H., The Anh, T., and Bao Son, D., Evolutionary algorithms to optimize task scheduling problem for the IoT based bag-of-tasks application in cloud\u2013fog computing environment, Appl. Sci., 2019, vol. 9, no. 9, p. 1730. https:\/\/doi.org\/10.3390\/app9091730","journal-title":"Appl. Sci."},{"key":"7712_CR21","doi-asserted-by":"publisher","first-page":"1508","DOI":"10.1109\/comst.2019.2894727","volume":"21","author":"R. Yang","year":"2019","unstructured":"Yang, R., Yu, F.R., Si, P., Yang, Zh., and Zhang, Ya., Integrated blockchain and edge computing systems: A survey, some research issues and challenges, IEEE Commun. Surv. Tutorials, 2019, vol. 21, no. 2, pp. 1508\u20131532. https:\/\/doi.org\/10.1109\/comst.2019.2894727","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"7712_CR22","unstructured":"Interpretation of the three-year action plan for new data center development (2021-2023), China Informatization, 2021, no. 9, pp. 21\u201323."},{"key":"7712_CR23","first-page":"13","volume":"48","author":"M.X. Wu","year":"2022","unstructured":"Wu, M.X. and Yang, X.T., The five forces of computing model: a comprehensive approach to measuring computing power, J. Inf. Commun. Technol. Policy, 2022, vol. 48, no. 3, p. 13.","journal-title":"J. Inf. Commun. Technol. Policy"},{"key":"7712_CR24","first-page":"299","volume":"62","author":"F.T. Chen","year":"2022","unstructured":"Chen, F.T., Yang, L., and Jia, J.W., Cell pre-handover method based on entropy weight TOPSIS in 5G heterogeneous network, Telecom Technol., 2022, vol. 62, no. 3, pp. 299\u2013304.","journal-title":"Telecom Technol."},{"key":"7712_CR25","doi-asserted-by":"publisher","unstructured":"Tun, Kh.N. and Myat Paing, A.M., Resource aware placement of IoT devices in fog computing, 2020 Int. Conf. on Advanced Information Technologies (ICAIT), Yangon, Myanmar, 2020, IEEE, 2020, pp. 176\u2013181. https:\/\/doi.org\/10.1109\/icait51105.2020.9261787","DOI":"10.1109\/icait51105.2020.9261787"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700512.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411624700512","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411624700512.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:03:34Z","timestamp":1773612214000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411624700512"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["7712"],"URL":"https:\/\/doi.org\/10.3103\/s0146411624700512","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,8]]},"assertion":[{"value":"28 August 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 December 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 January 2024","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 August 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}