- a
- access control threatsâ 442â443
- active optical networks (AONs)â353
- actuation capacityâ 199
- actuatorsâ 171â172, 194
- adaptive traffic signal control (ATSC) approachâ 325
- advanced beamâforming technologyâ 520
- advanced code technologyâ 519
- advanced driverâassistance systems (ADAS)â
- Advanced Message Queuing Protocol (AMQP)â 160, 162
- Advanced Metering Infrastructure (AMI)â 349
- agentâbased modelâ 187
- aggregatedâproofâbased hierarchical authentication (APHA)â 115
- air gappingâ 169
- AlexNetâ 329
- Amazon Echoâ 67
- AmazonWeb Services (AWS)â 139
- analogâtoâdigital converter (ADC)â 72
- analytics and decisionâmaking
- architectural modelâ 157â158
- comparisons of surveyed solutionsâ 197â198
- taxonomyâ 183â184
- data analyticsâ 184â186
- decisionâmakingâ 186â189
- Apache NiFi open source frameworkâ 336
- application contextâ 24â25
- application programming interface (API)â 226
- application protocolsâ 160
- Array of Things (AoT)â 225
- artificial intelligence (AI)âaugmented geographic routing approachâ 478
- artificial intelligence (AI) chipsetsâ 68
- artificial neural network (ANN)â 324, 325
- Aston, Kevinâ 311
- asymmetric DSLâ353
- attractive repulsive greedy forwarding (ARGF) algorithmâ 488
- attractive repulsive pressure greedy forwarding (ARPGF) algorithmâ 488, 490
- attributeâbased access control (ABAC)â 114
- augmented reality (AR)â 10
- authenticationâ 109â113
- authentication threatsâ 442
- authorizationâ 113â117, 125â129
- automatic repeat request (ARQ)â 162
- autonomous driving classâ 436
- autonomous navigation classâ 436
- autonomous vehicles (AVs)â 459
- autonomous vehicular networks (AVNs)â 460
- cloudâbased architecture for communicationâ 461
- fogâbased architecture for communicationâ 462, 463
- hypothesis formulationâ 463â464
- simulation design
- hypothesis testingâ 467â469
- resultsâ 464â467
-
- b
- backhaul data transferâ5G, 512
- Basic Linear Algebra Subroutines (BLAS)â225
- beam division multiple access (BDMA)â516, 517
- Big Dataâ312
- analyticsâ185
- IoT
- ambiguityâ317
- descriptionâ315
- featuresâ316
- inconsistencyâ317
- interoperability characteristicsâ317
- quality characteristicsâ317
- redundancyâ317
- stream applicationsâ318â319
- temporarinessâ316
- uncertaintyâ317
- valueâ316
- variabilityâ316
- varietyâ316
- velocityâ316
- veracityâ316
- volumeâ316
- binary offloadingâ231
- bioinformaticsâ529
- cloud computing applicationsâ533â537
- fog computing for
- complex biological organisms, understanding ofâ540
- quality of serviceâ539
- real-time microorganism detection systemâ541â543
- Infrastructure as a Service
- Bionimbusâ535
- Cloud BioLinuxâ536â537
- CloVRâ535â536
- OpenStackâ535
- Platform as a Serviceâ535
- Software as a Service
- CloudAlignerâ534
- CloudBurstâ534
- Cloud4SNPâ534
- Crossbowâ534
- FX toolâ534
- Myrnaâ534
- PeakRangerâ534
- STORMSeq toolâ533â534
- Variant Annotation Toolâ534
- BioLinux platformâ536â537
- Bluetoothâ354
- Bluetooth Low Energy (BLE)â160
- BOLO Vehicle Tracking Algorithmâ178
- broadband passive optical network (BPON)â353
- broker nodeâ297
- Business Area Networks (BANs)â350
- c
- cache allocation approachesâ 91â93
- CacheWeightâ 93
- caching
- cache allocation approachesâ 91â93
- data allocation approachesâ 93â100
- and fog computingâ 81â82
- capabilityâbased access control (CapBAC)â 115
- CaptureVideo (CV)â 336
- CCN see contentâcentric networking (CCN)
- cellular communicationsâ 354
- classificationâ 320
- client mobilityâ 82
- closeâtoâtheâedge methodâ 188
- CloudAlignerâ 534
- CloudBurstâ 534
- cloud computingâ 355, 459â460
- definitionâ 513
- delivery modelsâ 532â533
- descriptionâ 531
- environmentâ 140
- vs. fog computingâ 538
- issuesâ 530â531
- meritsâ 530
- service modelsâ 532
- variationsâ 431
- cloudâfogâIoT architectureâ 143
- cloudification
- architectural modelâ 157
- storageâ 196â197
- taxonomy
- storageâ 182â183
- virtualizationâ 179â182
- virtualizationâ 195â196
- cloud layerâ 293â294
- cloudletsâ 10, 44, 446
- CloudManâ 535
- Cloud of Sensors (CoS)â 320
- Cloud4SNPâ 534
- Cloud Virtual Resource (CloVR)â 535â536
- ClusterFS file systemâ 535
- clusteringâ 320
- cognitive radio (CR)
- 5Gâ 512â513
- smart gridâ 354
- combinedâtype communication (CTC)â 515, 516
- communication
- architectural modelâ 154â155
- cellularâ 354
- comparisons of surveyed solutionsâ 189â191
- efficient fogâcloudâ 199â200
- failuresâ 442
- lowâlatencyâ 190â191
- nearâfieldâ 110
- opticalâ353
- privacyâ 118
- taxonomyâ 159â165
- lowâlatencyâ 163â164
- mobilityâ 164â165
- reliabilityâ 162â163
- standardizationâ 160â161
- vehicleâtoâdeviceâ
- vehicleâtoâinfrastructureâ
- vehicleâtoâvehicleâ
- communication technologies
- 4Gâ 5G standards, 16â17
- IEEE 802.11â 15â16
- LPWAN, other mediumâand longârange technologiesâ 18
- WPAN, shortârange technologiesâ 17â18
- communicationâtoâcomputation ratio (CCR)â375, 382
- complex event processing (CEP)â 321
- computational intelligence (CI)
- deep learningâ 326â328
- descriptionâ 319
- goal ofâ 322
- machine learningâ 322â326
- computational selfâawarenessâ255
- computer vision applications
- 3D scene reconstruction from LIDAR scansâ 480â482
- object trackingâ 482â483
- patient tracking with face recognition case studyâ 478â480
- computing continuum
- goalâoriented approach
- building blocks and enabling technologiesâ 224â228
- goalâoriented annotations for intensional specificationâ 221â222
- mapping and runâtime systemâ 222â224
- motivating continuum exampleâ 219â221
- research philosophyâ 217â219
- schematicâ 216â217
- computing/node failuresâ 442
- conditional privacyâpreserving authentication with access linkability (CPAL) modelâ 119
- confidentiality, integrity, and availability (CIA) triad modelâ 59
- Constrained Application Protocol (CoAP)â 160, 162, 163, 165, 538â539
- constrained battery life of edge devicesâ 71â72
- constraintsâ 441â442
- contentâcentric networking (CCN)
- caching
- allocation approachesâ 91â93
- data allocation approachesâ 93â100
- and fog computingâ 81â82
- mobility managementâ 82
- classification ofâ 83
- direct exchange for location updateâ 84
- interest forwardingâ 85
- mobility with indirection pointâ 84â85
- proxyâbased mobility managementâ 85
- query to the rendezvous for location updateâ 84
- serverâside mobilityâ 84
- tunnelâbased redirectionâ 86â87
- user mobilityâ 83â84
- research directionsâ 81
- router componentsâ 80
- security inâ 88â90
- DOS attack riskâ 90
- risks due to cachingâ 90
- security modelâ 91
- content delivery network (CDN)â 183
- content mobilityâ 82
- contextâawarenessâ 23â25
- application contextâ 24â25
- endâtoâend contextâ 24
- mobility contextâ 23â24
- server contextâ 23
- Control and Provisioning of Wireless Access Point (CAPWAP) protocolâ 418
- convolutional neural network (CNN)â 327, 328, 330
- cooperative CRNsâ 512â513
- cooperative distributed systems (CDS) modelâ 119
- cooperative driving classâ 435
- cooperative perception classâ 435
- cooperative safety classâ 435
- costâeffective caching (CEC) algorithmâ 97
- Crossbowâ 534
- crossâlayer cooperative caching strategyâ 96
- crossâlink detection protocol (CLDP)â 485
- d
- data aggregationâ 174, 177â179, 195
- data allocation approachesâ 93â100
- data analyticsâ 168
- data collectors (DCs)â 335
- data discoveryâ 171
- data discrepancy in realâworld settingsâ 70â71
- Data Distribution Service (DDS)â 160, 163
- data encryptionâ 166
- data filteringâ 174, 176â177, 195
- data flow execution for big dataâ 226â228
- data fusionâ 177
- data homogenizationâ 174
- data miningâ 171
- data normalizationâ 173â175, 195
- data prioritization techniquesâ 176
- data privacyâ 448â449
- data qualityâ 150â151
- architectural modelâ 156â157
- comparisons of surveyed solutionsâ 194â195
- taxonomy
- classificationâ 173
- data aggregationâ 177â179
- data filteringâ 176â177
- data normalizationâ 174â175
- data replication, FNsâ272â273
- data serializationâ 174
- data stream mining
- classificationâ 320
- clusteringâ 320
- descriptionâ 320
- outlier and anomaly detectionâ 321
- regressionâ 320â321
- data stream processing
- data stream miningâ 320â321
- information fusion
- highâlevel fusionâ 320
- lowâlevel fusionâ 319
- mediumâlevel fusionâ 319
- multilevel fusionâ 320
- decision tree algorithmâ 324
- dedicated shortârange communications (DSRC)â 18
- DeepEarâ 329
- Deep Keyword Spotting (KWS)â 329
- deep learning (DL)â 68, 326â328
- deep neural networks (DNNs)â 326â327
- constrained battery life of edge devicesâ 71â72
- data discrepancy in realâworld settingsâ 70â71
- heterogeneity in computing unitsâ 73
- heterogeneity in sensor dataâ 72â73
- memory and computational expensiveness ofâ 68â70
- multitenancy of deep learning tasksâ 73â75
- offloading to nearby edgesâ 75â76
- onâdevice trainingâ 76
- Delaunay triangulation (DT) graphsâ 485
- delayâcritical fogâbased vehicular applications
- autonomous driving classâ 436
- autonomous navigation classâ 436
- communication taskâ 436
- cooperative driving classâ 435
- cooperative perception classâ 435
- cooperative safety classâ 435
- directed acyclic flow graph of taskâ 436
- execution taskâ 436
- obstacle detectionâ 434, 435
- timeliness guarantees
- benchmarkingâ 437â440
- computational resource and data managementâ 444â448
- coping with perturbationâ 443â449
- descriptionâ 436
- firm realâtime applicationâ 437
- hard realâtime applicationâ 437
- network resource managementâ 443
- resource monitoringâ 440
- RT communicationâ 440â441
- scheduling tasksâ 440
- soft realâtime applicationâ 437
- timeliness perturbations
- access control threatsâ 442â443
- authentication threatsâ 442
- communication failuresâ 442
- computing/node failuresâ 442
- constraintsâ 441â442
- heterogeneityâ 442
- intrusion threatsâ 443
- message lossâ 442
- mobilityâ 441â442
- network disconnection/link disruptionâ 442
- privacy threatsâ 443
- delay minimization without replication
- complexity reductionâ277â278
- minâcost flow formulationâ276â277
- problem formulationâ275â276
- delay minimization with replication
- greedy solution in multiple requestsâ280â282
- hardness proofâ279
- rounding approach in multiple requestsâ282â284
- single request in line topologyâ279â280
- delayâtolerant fog computingâ 432â433
- delayâtolerant networking (DTN)â
- denialâofâservice (DoS) attacksâ 168
- depthwise separable convolutionsâ 333
- DetectFaces (DF)â 336
- device layerâ 294
- device privacyâ 118
- deviceâtoâfog (D2F)â 22
- digital subscriber line (DSL)â353
- disasterâincident situational awareness, geospatial video analytics for see geospatial video analytics
- discretionary access control (DAC)â 114
- distanceâbased forwarding (DBF) protocolâ 10
- distributed capabilitiesâbased access control model (DCapBAC)â 115
- distributed data learning process, advantagesâ 334
- distribution management system (DMS)
- descriptionâ 356
- feederâbased communication schemeâ 358â366
- functions used inâ 357
- distribution system operator (DSO)â 358
- distribution system state estimation (DSSE)â 357
- Dockerâ 180
- DOS attack riskâ 90
- downward information updatingâ278
- duplicate detection techniquesâ 176
- duplicate name prefix detection (DND)â 86
- dynamic adaptive streaming (DAS) technologyâ 100
- dynamic ad hoc wireless network (DAWN)â 507
- dynamic fog service for next generation mobile applicationsâ 10
-
- e
- earliest deadline first (EDF) methodâ379
- EDA see estimation of distribution algorithm (EDA)
- edgeâasâaâservice (EaaS)â 146
- edgeâcloudâ 44
- edge computingâ , , 44â45, 313
- architectureâ 46â47
- network managementâ 61
- resource managementâ 57â58
- security and privacyâ 58â61
- use casesâ 50â51
- smart homeâ 52â54
- wearable ECG sensorâ 51â52
- edge device running edge operating system (edgeOS)â 53
- edge devicesâ 67
- constrained battery life ofâ 71â72
- edge ecosystemâ 59
- Edge Meshâ 341
- EdgeSGDâ 335
- efficient distributed data processingâ 200
- efficient fogâcloud communicationsâ 199â200
- EFTF (earliest finish time first) ruleâ376
- EH mobile users (MUs)â232
- electrical power gridâ 347
- electrocardiogram (ECG)â245â246
- electromyography (EMG)â246
- Electronic Data Processing (EDP)â 108
- elliptic curve cryptography (ECC)â 112
- encoding and decoding methodâ376
- endâdevice heterogeneityâ 21â22
- endpoint identifiers (EIDs)â 164
- endâtoâend contextâ 24
- endâtoâend network heterogeneityâ 22â23
- endâtoâend securityâ 30
- energy consumption vs. latencyâ238â239
- energy costâ 27
- energy harvesting (EH)âenabled Internet of Things
- computation offloadingâ 231
- future research challengesâ240â241
- system modelâ232â233
- computation modelâ233â235
- energy harvesting modelâ235â238
- tradeoffs in EH fog systems
- energy consumption vs. latencyâ238â239
- execution delay vs. task dropping costâ239â240
- energy harvesting model
- stochastic processâ235â236
- wireless power transferâ236â238
- energy management system (EMS)â 356
- energy optimization algorithmsâ255â258
- Eoulsan frameworkâ 535
- error detection mechanismsâ 176
- estimation of distribution algorithm (EDA)
- basic procedure ofâ372
- complex scheduling problemsâ373
- earliest deadline first methodâ379
- encoding and decoding methodâ376
- heuristic vs. uEDA methodâ381â382
- local search methodâ378
- modified heuristic methodâ378, 379
- probability model and initializationâ377
- pâvaluesâ381
- relative percentage deviation (RPD) valueâ381
- shortest processing time first methodâ379
- shortest tâlevel task first methodâ379
- simulation environmental parametersâ379, 380
- testing environment settingâ379
- uEDA schemeâ377â378
- updating and sampling methodâ377â378
- Ethernet passive optical network (EPON)â353
- European Telecommunication Standards Institute (ETSI)â 147
- eventâ(ESS) and timeâstepped simulation (TSS)â 295
- evolutionary/genetic algorithmsâ 187
- evolved packet core (EPC) caching techniquesâ 524
- execution delay vs. task dropping costâ239â240
- execution time, of hardware platformsâ 329, 330
-
- f
- fault toleranceâ 448
- in SDNâbased wireless mesh networksâ 424
- federated intelligent transportationâ 10
- feederâbased communication scheme, for DMS
- advantageâ 359
- Big Data calculationsâ 359
- measurementsâ 358, 359
- preconditions for deploymentâ 358
- realâtime simulation Using MATLAB and ThingSpeakâ 359â366
- schematic illustrationâ 358
- 5Gâ 505
- cellular architectureâ 508â510
- cloudâbased architectureâ 513â514
- cognitive radioâ 512â513
- deviceâcentric architecture reviewâ 506
- deviceâtoâdevice communicationâ 510
- energy efficiencyâ 510â511
- evolutionary viewâ 507
- fog computing, need forâ 508
- in health careâ 521
- heterogeneous network design and supportâ 507
- IEEE802.11â 507
- issues/challengesâ 507, 522â524
- logistic and trackingâ 521
- machineâtoâmachine communicationâ 507
- massive multipleâinput multipleâoutputâ 507
- M2Mâ 519â520
- personal usageâ 521
- protocol stackâ 509, 510
- research projects onâ 523
- revolutionary viewâ 507
- seamless user experienceâ 507
- in smart grid technologyâ 521
- technology and methodologyâ 514
- beam division multiple accessâ 516, 517
- flexible duplexâ 518
- HetNetâ 515â516, 520
- mixed bandwidth data pathâ 516, 518
- multibeamâbased communication systemâ 520
- multipleâinput multipleâoutputâ 518â519
- software defined networkingâ 520â521
- wireless virtualizationâ 516
- testâdriven design transmissionâ 518
- twoâtier architectureâ 512
- virtualized homeâ 522
- 5G standardsâ 16â17
- fixedâband nonâsharing (FBâNS) algorithmâ 422, 423
- flat namesâ 88
- floatingâpoint operations (FLOPs)â 69
- flowâbased programming (FSB)â 336
- FNs see Fog Networks (FNs)
- fog abstraction layerâ 49
- fogâassisted runtime energy management, wearable sensorsâ253â254
- computational selfâawarenessâ255
- energy optimization algorithmsâ255â258
- MDP strategyâ259â263
- myopic strategyâ258
- fog computingâ 47â49, 312â313 see also edge computing
- architectureâ 49â50
- architecture for bioinformatics sequencing dataâ 538, 539
- authenticationâ 109â113, 124â125
- authorizationâ 113â117, 125â129
- benefit ofâ 460
- for bioinformatics applications
- complex biological organisms, understanding ofâ 540
- quality of serviceâ 539
- realâtime microorganism detection systemâ 541â543
- cachingâ 81â82
- vs. cloud computingâ 538
- fogâenabled infrastructuresâ 105â106
- generic fog enabled IoT environmentâ 105â106
- for geospatial video analyticsâ 474â475
- Internet of Things security phenomenonâ 105, 107
- network managementâ 61
- privacyâ 117â119
- purpose ofâ 537
- resource managementâ 57â58
- security and privacyâ 58â61
- smart citiesâ 105â106
- trust in IoTâ 107â109
- use cases
- smart pipeline monitoring systemâ 55â57
- smart traffic light systemâ 54â55
- fog execution modelâ234â235
- fog layerâ 294
- fog moving close to sensors/actuatorsâ 188
- FogNetSim++
- architectureâ 296â298
- cloud layerâ 293â294
- device layerâ 294
- fog layerâ 294
- FogNetSim++ installationâ 300
- modeling and simulationâ 294â295
- OMNeT++ installationâ 298â299
- sample fog simulationâ 300â305
- Fog Networks (FNs)
- challengesâ274â275
- data replicationâ272â273
- delay minimization without replication
- complexity reductionâ277â278
- minâcost flow formulationâ276â277
- problem formulationâ275â276
- delay minimization with replication
- greedy solution in multiple requestsâ280â282
- hardness proofâ279
- rounding approach in multiple requestsâ282â284
- single request in line topologyâ279â280
- illustration ofâ269â270
- longâterm and shortâterm placementâ272
- multiple data placement with budget problemâ270, 274
- network modelâ273
- performance evaluation
- algorithm comparisonâ286â287
- experimental settingâ285â286
- results with and without data replicationâ288â289
- trace analysisâ287â288
- trace informationâ285
- fog node selectionâ 444, 446
- fog service orchestration layerâ 49â50
- fog simulatorsâ 295
- fogâtoâcloud (F2C)â 23
- fogâtoâfog (F2F)â 22â23
- followâme cloud (FMC)â 145
- followâme fog (FMF) frameworkâ 443
- forest fire detectionâ
- forward collision warning (FCW)â
- 4Gâ 505
- 4G standardsâ 16â17
- functionâcentric fog/cloud computing (FCC) paradigm
- challengesâ 476â477
- illustrative example ofâ 475
- FX toolâ 534
-
- g
- Galaxy cloudâ 535
- generalized dominating setâbased caching (GDSC)â 92
- generic fog enabled IoT environmentâ 105â106
- geoâdistributed IoT devicesâ 43
- geographic routing approach
- AIâaugmented implementationâ 487â490
- artificial intelligence relevanceâ 486â487
- challengesâ 484â486
- geoâsocial networks (GSNs)â 82
- geospatial video analytics
- computer vision applications
- 3D scene reconstruction from LIDAR scansâ 480â482
- object trackingâ 482â483
- patient tracking with face recognition case studyâ 478â480
- data collection using edge routingâ 484â490
- fog computing forâ 474â475
- geoâdistributed latencyâsensitive SFC challengesâ 491â492
- imagery data processingâ 473â474
- metapathâbased composite variable approachâ 492â495
- metapathâbased SFC orchestration implementationâ 495â496
- wideâarea motion imagery (see wideâarea motion imagery (WAMI))
- gigabit passive optical network (GPON)â353
- global positioning system (GPS) sensorâ 72
- goalâoriented approach, computing continuum
- annotations for intensional specificationâ 221â222
- building blocks and enabling technologiesâ 224â228
- mapping and runâtime systemâ 222â224
- motivating continuum exampleâ 219â221
- Google Latitudeâ 82
- GoogleNestâ 67
- Google Protocol Buffersâ 174
- gravity pressure greedy forwarding (GPGF) protocolâ 485
- greedy distributed spanning tree routing (GDSTR) protocolâ 485
- greedy perimeter stateless routing (GPSR)â 485
- greedy solution in multiple requestsâ280â282
- grey relational analysis (GRA)â 96
-
- h
- health care, 5G inâ 521
- heterogeneityâ 442
- in computing unitsâ 73
- in sensor dataâ 72â73
- heterogeneous network (HetNet)â 515â516, 520
- heterogeneous physical resourcesâ 49
- heterogeneous signcryption (HSC) schemeâ 116
- hidden Markov modelâ 187
- hierarchical data aggregationâ 178
- hierarchical data analyticsâ 185
- hierarchical/humanfriendly namesâ 88
- highâperformance computing (HPC)â 215
- HodrickâPrescott filterâ 177
- Home Area Networks (HANs)â 350
- host card emulation (HCE)â 110
- humanâfacing applicationsâ371
- humanâtype communication (HTC)â 515
- hybrid cloudâ 533
- hypervisorâ 496
- hypervisor virtualization methodâ 181
- hypothesis transfer learning (HTL)â 334
-
- i
- ideal nearest replica routing (iNRR)â 95
- identity authentication and capabilityâbased access control (IACAC)â 115
- identityâbased cryptography (IBC)â 112
- IEEE 802.11â 15â16
- IEEE 802.15.4â 160
- iFogSimâ 460, 462, 464, 470
- inductive transfer learning approachâ388
- Industrial Area Networks (IANs)â 350
- information centric network (ICN)â 183
- infrastructural fog (iFog)âassisted mobile applicationâ
- infrastructural mobile fog computing
- forest fire detectionâ
- land vehicular fogâ â10
- marine data acquisitionâ â8
- marine fogâ 11
- mobile ambient assisted livingâ
- road crash avoidanceâ
- unmanned aerial vehicular fogâ 12â13
- user equipmentâbased fogâ 13â15
- Infrastructure as a Service (IaaS)â , 532
- bioinformatics tools
- Bionimbusâ 535
- Cloud BioLinuxâ 536â537
- CloVRâ 535â536
- OpenStackâ 535
- infrastructure protocolsâ 160
- Intel Edisonâ 329
- intelligent, multiversion librariesâ 225â226
- intelligent systems, IoT
- accuracy vs. energy consumptionâ 340
- lack of complete training data setâ 340
- security and privacyâ 341
- interest forwardingâ 85
- interference managementâ 5G, 512
- Internet of Drones (IoD)â
- Internet of Medical Things (IoMT)â
- Internet of Things (IoT)â , 311, 371
- architectural model
- analytics and decisionâmakingâ 157â158
- cloudificationâ 157
- communicationâ 154â155
- data qualityâ 156â157
- security and privacyâ 156
- case studiesâ 152â154
- challengesâ 198, 312
- comparisons of surveyed solutions
- actuatorsâ 194
- analytics and decisionâmaking layerâ 197â198
- cloudificationâ 195â197
- communicationâ 189â191
- data qualityâ 194â195
- security and privacyâ 191â193
- sensorsâ 193â194
- data challenges in three dimensions (see Big Data; data stream processing)
- data qualityâ 150â151
- data typesâ 315
- definitionsâ 142â144
- intelligent systems
- accuracy vs. energy consumptionâ 340
- lack of complete training data setâ 340
- security and privacyâ 341
- interoperabilityâ 149
- locationâawarenessâ 152
- mobilityâ 152
- motivationsâ 144â148
- realâtime responsivenessâ 149â150
- recommended research directionsâ 198â200
- scalabilityâ 148â149
- security and privacyâ 151â152
- security phenomenonâ 105, 107
- sensorsâ 330
- taxonomyâ 158â159
- analytics and decisionâmaking layerâ 183â189
- cloudificationâ 179â183
- communicationâ 159â165
- data qualityâ 173â179
- Internet of Thingsâ 170â172
- security and privacy layerâ 165â170
- threeâtier architectureâ 313
- twoâtier cloud assistedâ 313
- Internet of Vehicles (IoVs)â
- Internet service provider (ISP)â 83
- interoperabilityâ 149
- interworking of different fog localitiesâ 200
- intrusion detectionâ 168
- intrusion threatsâ 443
- IoTâbased remote health monitoring applicationâ251
- IoTâbased smart traffic infrastructureâ
- IoT intelligent systems
- accuracy vs. energy consumptionâ 340
- lack of complete training data setâ 340
- security and privacyâ 341
- Iowa Quantified (IQ) projectâ 225
- iteration updating (IU) algorithmâ287
- iterative feature transformation (IFT)â389
-
- k
- keyâpolicy attributeâbased encryption (KPâABE) schemeâ 119
- Kâmeansâ 324
- Kânearest neighbors (KNN)â 324
-
- l
- land vehicular fog computing (LVâFog)â , â10, 31â32
- latency constraintsâ 48
- leave a copy down (LCD) policyâ 95
- leave a copy everywhere (LCE) policyâ 95
- LIDAR scansâ 3D scene reconstruction, 480â482
- likelihood of features tracking (LoFT) frameworkâ 482, 483
- linear EH modelâ237â238
- linear predictive coding (LPC) algorithmâ 178
- LinuX Containers (LXC)â 180
- load balancing of request and trafficâ 28â29
- load flow (LF)â 357
- local execution modelâ234
- locationâawareness methodâ 152, 188
- location privacyâ 449
- locationâtemporal access control (LTAC)â 115
- location update, direct exchange forâ 84
- Locator/ID Separation Protocol (LISP)â 160
- LoRaWANâ 355
- lowâlatencyâ 163â164
- communicationâ 190â191
- low power wide area networks (LPWANs)â 18, 355
- lowârate wireless personnel area networks (LRâWPAN)â 416
- Lyapunov optimization frameworkâ240
-
- m
- machine learning (ML)â 312, 314
- artificial neural networkâ 324, 325
- definedâ 322
- on fog devices, challenges for runningâ 328â334
- incremental learning algorithmsâ 325
- Kânearest neighborsâ 324
- NaĂŻve Bayes algorithmâ 324
- reinforcement learningâ 323, 325
- supervised learningâ 322, 325
- unsupervised learningâ 323
- machineâtoâmachine applicationsâ371
- machineâtype communication (MTC)â 515â516
- mandatory access control (MAC)â 162
- manâinâtheâmiddle (MiM) attacksâ 170
- marine data acquisitionâ â8
- marine fogâ 11
- Markov decision process (MDP) theoryâ250
- massive MIMOâ 519
- media access control (MAC)â 10
- message lossâ 442
- Message Queuing Telemetry Transport (MQTT)â 160, 297, 538
- metabolic equivalent of task (MET)â385
- descriptionâ386
- estimation error parameterâ401
- exergaming experiment
- data collectionâ394â395
- reconfigurable designâ403, 404
- gold standard computationâ386â387
- R2 correlation coefficient of regression modelâ401
- reconfigurable estimation systemâ392â394
- reliable calculation
- energy consumptionâ397
- locationâindependent MET estimation modelsâ390, 391
- sensor localizationâ390â392, 398â401
- sensorâbased estimationâ387â388
- transfer learning approachâ388â389, 404, 405
- treadmill experiment
- data collectionâ395â396
- reconfigurable designâ402â403
- unreliability mitigationâ388
- value estimationâ392, 398â399
- metabolic equivalent of task estimation systems (MES)â386
- metalinksâ 492, 493
- metapathâbased composite variable approachâ 492â495
- metapathâbased SFC orchestration implementationâ 495â496
- control applicationsâ 495â496
- SDN and hypervisorâ 496
- simple coordination layerâ 495, 496
- metapath composite variable approachâ 478
- metapathsâ 493
- metropolitan vehicleâbased cloudletâ 10
- minâcost (MC) algorithmâ287
- minâcost flow formulationâ276â277
- minâvolume (MV) algorithmâ286
- mixture of Gaussians (MOG)approachâ 482
- mobile ad hoc networkâ
- mobile ad hoc wireless networks (MANETs)â 476, 484
- mobile ambient assisted living (AAL)â
- mobile base station (MBS)â 511â514
- mobile cloud computing (MCC)â , 44
- mobile edge computing (MEC)â 44
- mobile fog computing (MFC)
- challengesâ 32
- in land vehicular fog computingâ 31â32
- in unmanned aerial vehicular fog computingâ 32â33
- in user equipmentâbased fog computingâ 33
- communication technologies
- 4Gâ 5G standards, 16â17
- IEEE 802.11â 15â16
- LPWAN, other mediumâand longârange technologiesâ 18
- WPAN, shortârange technologiesâ 17â18
- decisionâ 450
- general challenges
- autonomous runtime adjustment and rapid redeploymentâ 34
- scalable resource management of fog providersâ 35
- scheduling of fog applicationsâ 34â35
- testbed toolâ 33â34
- infrastructural
- forest fire detectionâ
- land vehicular fogâ â10
- marine data acquisitionâ â8
- marine fogâ 11
- mobile ambient assisted livingâ
- road crash avoidanceâ
- unmanned aerial vehicular fogâ 12â13
- user equipmentâbased fogâ 13â15
- network managementâ 450
- nonfunctional requirementsâ 18â20
- contextâawarenessâ 23â25
- endâdevice heterogeneityâ 21â22
- endâtoâend network heterogeneityâ 22â23
- providerâ 27â29
- securityâ 29â31
- severe heterogeneityâ 21
- tenantsâ 25â27
- and related modelsâ â6
- resource consumptionâ 450
- resource managementâ 449
- resource monitoringâ 450
- resource provisioningâ 450
- virtualizationâ 450
- mobile fog node (mFog)âassisted applicationâ
- mobile Internet of Things (MIoT)â , 152
- MobileNetâ 333
- mobile vehicular cloudlets (MVCs)â 10
- mobilityâ 152, 191, 441â442
- contextâ 23â24
- with indirection pointâ 84â85
- management in CNNâ 82
- classification ofâ 83
- direct exchange for location updateâ 84
- interest forwardingâ 85
- mobility with indirection pointâ 84â85
- proxyâbased mobility managementâ 85
- query to the rendezvous for location updateâ 84
- serverâside mobilityâ 84
- tunnelâbased redirectionâ 86â87
- user mobilityâ 83â84
- model compression techniqueâ 69
- motivating continuum exampleâ 219â221
- MQ Telemetry Transport (MQTT)â 162
- multiâaccess (mobile) edge computing (MEC)â
- multibeamâbased communication systemâ 520
- multilayer feedâforward neural networkâ 324, 325
- multilevel organizationâ 199
- multiple data placement with budget problem (MDBP)â270, 274
- multipleâinput multipleâoutput (MIMO)â 518â519
- multitenancy fog service provider discoveryâ 28
- multitenancy of deep learning tasksâ 73â75
- multivariate Gaussian modelâ 187
- Myriad VPUâ 333
- Myrnaâ 534
-
- n
- NaĂŻve Bayes (NB) algorithmâ 324
- nameâbased trust and security approachâ 90
- name resolutionâ 88
- NBâIoTâ 355
- nearâfield communication (NFC)â 110
- Neighborhood Area Networks (NANs)â 350
- NetInf naming schemeâ 89
- network bandwidth constraintsâ 48
- network disconnection/link disruptionâ 442
- network edge geographic routing challengesâ 484â486
- network function virtualization (NFV)â 61
- network mobilityâ 82
- network securityâ 449
- network topology processing (NTP)â 357
- Neural Compute Stick (NCS)â 333
- neural networks methodsâ 187, 188
- nextâgeneration sequencingâ 529, 530
- nodeâbased mutual authentication schemeâ 112
- node specializationâ 199
- noncooperative CRNsâ 513
- nonâfixed band nonâsharing (NFBâNS) algorithmâ 422â423
- nonâfixedâband sharing (NFBâS) algorithmâ 423
- nonlinear EH modelâ238
- nonorthogonal multiple access (NOMA)â232
- Nvidia Tegra K1â 329
- o
- OAuth protocolâ 116
- object tracking, in WAMI
- 3C pipeline needsâ 482â483
- large function processingâ 483
- small function processingâ 483
- observability analysis (OA)â 357
- Olympusâ 320
- omics sequencesâ 529
- OMNeT++ installationâ 298â299
- onâdevice trainingâ 76
- online analytical processing (OLAP)â 417
- online transaction processing (OTLP)â 417
- Open Edge Computing Consortiumâ 146
- OpenFlow switchâ 414â415
- OpenFog Computing Consortiumâ 147
- OpenMV kitâ 331â332
- OpenStack++â 181
- Open Standard for Public Transportation (OSPT)â 110
- OpenVINO toolkitâ 333
- operation managementâ 28â29
- optical communicationsâ353
- outlier and anomaly detectionâ 321
- Oxford Nanopore MinIoN deviceâ 541, 542
-
- p
- Panacea's Cloud patient triage status trackingâ 478â480
- parameter pruning approachâ 69
- partial offloadingâ 231
- passive optical networks (PONs)â353
- pattern detectionâ 168
- PeakRangerâ 534
- pharmacogenomicsâ 530
- photoplethysmogram (PPG)â245
- photoplethysmography (PPG)â247
- physical actuatorsâ 172
- physical securityâ 30
- physical sensorsâ 171
- physical unclonable functions (PUF)â 109
- Pigiâ 174
- Platform as a Service (PaaS)â , 532
- bioinformatics platformsâ 535
- populationâbased incremental learning (PBIL)â377
- portable edge computersâ 44
- power gridsâ 347
- power line communications (PLC)â 350, 353
- predictorâclass probabilityâ 324
- privacyâ 60
- communicationâ 118
- dataâ 448â449
- deviceâ 118
- fog computingâ 117â119
- locationâ 449
- processingâ 118â119
- and security, IoT intelligent systemsâ 341
- storageâ 118
- threatsâ 443, 448
- usageâ 449
- privacyâaware DCapBAC mechanismâ 116
- privacy preserved data mining (PPDM)â 119
- private cloudâ 533
- ProbCacheâ 93
- processing privacyâ 118â119
- providerâ 27â29
- proxyâbased mobility managementâ 85
- public cloudâ 532
- publicâkey infrastructure (PKI)â 109, 169
- publish/subscribe techniqueâ 162
- q
- Qualcomm Snapdragon 800â 329
- quality of experience (QoE)
- measurementâ375
- videoâstreaming servicesâ 100
- quality of service (QoS)â 18, 21, 27, 162, 187, 373
- query language for RDF (SPARQL)â 222
-
- r
- radio access network (RAN)â 147
- caching techniquesâ 524
- radioâfrequency identification (RFID)â 113, 317
- radio frequency identification (RFID) tagsâ 521
- random (RD) algorithmâ286
- random oracle modelâ 112
- Raspberry Piâ 332
- Raspberry Pi 3â 333, 334
- realâtime microorganism detection system
- bacteria identificationâ 541
- base callingâ 541, 543
- metagenomics approachâ 543
- Oxford Nanopore MinIoN deviceâ 541, 542
- realâtime responsivenessâ 149â150
- RecogniseFaces (RF)â 336
- recurrent neural networks (RNNs)â 73
- reference semantic models (RSMs)â 175
- regressionâ 320â321
- reinforcement learningâ 323, 325
- reliabilityâ 190
- resilient distributed datasets (RDDs)â 227
- resource allocationâ 446
- resource constrained devicesâ 48
- resource consumptionâ 446
- resource description framework (RDF)â 120, 222
- resource discovery techniquesâ 165
- restricted Boltzmann machine (RBM)â 72
- road crash avoidanceâ
- roadsideâunit controller (RSUC)â 181
- Rock64â 333, 334
- rod side Cloudlet (RSC)â 446
- roleâbased access control (RBAC)â 115
- rounding (RO) algorithmâ287
- rounding approach in multiple requestsâ282â284
- routing locators (RLOCs)â 164
- routing mechanismsâ 164
- Rule Markup Language (RuleML)â 120
- runtime fog server discoveryâ 28
-
- s
- safety data aggregationâ 178
- sample fog simulationâ 300â305
- sandboxesâ 168
- satellite communicationsâ 354
- scalabilityâ 148â149
- scale per sensorâ 144
- science/public policy problemâ 219
- secure socket layer (SSL)/transport layer security (TLS)â 168
- securityâ 29â31
- in contentâcentric networkingâ 88â90
- DOS attack riskâ 90
- risks due to cachingâ 90
- security modelâ 91
- monitoring and managementâ 30â31
- tokenâ 169
- security and privacy layerâ 151â152, 191â193
- architectural modelâ 156
- taxonomy
- privacyâ 169â170
- safetyâ 166
- securityâ 166â169
- selfâassembly caching (SAC) schemeâ 96
- semantic technologiesâ 317
- SemanticWebRules Language (SWRL)â 120
- Sensor and Actuator Networks (SANETs)â 350
- sensorsâ 171, 193â194
- server allocation, server scheduling, and server migrationâ 29
- server base station (SBS)â 511â513
- server contextâ 23
- server discoverability and connectivityâ 28
- serverâside mobilityâ 84
- service function chaining (SFC)â 477
- optimalityâ 491
- practical and nearâoptimal SFC composition approachâ 491â492
- reliabilityâ 491
- service level agreements (SLAs)â 450, 531
- access controlâ 451
- authenticationâ 451
- intrusion detectionâ 451
- privacy preservingâ 451
- severe heterogeneityâ 21
- SG see smart grid (SG)
- shortest processing time first (SPF) methodâ379
- shortest tâlevel task first (STF) methodâ379
- SigFoxâ 355
- single nucleotide polymorphism (SNP)â 530, 534
- single request in line topologyâ279â280
- Single Shot MultiBox Detector (SSD)â 333
- small data analyticsâ 185
- smart buildingâ 153â154
- smart connected vehicle (SCV)â 153
- smart grid (SG)â 347
- cognitive radioâ 354
- communication infrastructureâ 349â350
- effectivenessâ 355
- fogâbased architectureâ 355â356
- frameworksâ 153
- 5G inâ 521
- goal ofâ 349
- IoTâ 355
- smart metering applicationsâ 355
- Smart Utilities Networksâ 354
- systemsâ 175
- vs. traditional gridâ 348
- TV White Spacesâ 355
- wired communication technologiesâ 350â353
- wireless communication technologiesâ353â354
- smart homeâ 52â54
- smart IoT systems
- device classificationâ 330, 331
- issue in developingâ 341
- smart pipeline monitoring systemâ 55â57
- SmartSensor infrastructureâ 315
- smart traffic light (STL) systemâ 54â55, 153
- Smart Utilities Networks (SUNs)â 354
- Software as a Service (SaaS)â , 532
- bioinformatics tools
- CloudAlignerâ 534
- CloudBurstâ 534
- Cloud4SNPâ 534
- Crossbowâ 534
- FX toolâ 534
- Myrnaâ 534
- PeakRangerâ 534
- STORMSeq toolâ 533â534
- Variant Annotation Toolâ 534
- softwareâdefined networking (SDN)â 11, 61, 181, 496
- access points, management ofâ 418
- advantagesâ 419
- aim ofâ 411
- architecture ofâ 411, 412
- assistive agentâ 418
- challengesâ 419
- clean state modelâ 419
- event processingâ 417
- evolutionary modelâ 419
- in fog computingâ 419â421
- 5Gâ 520â521
- in mobile wireless networksâ 413
- OpenFlowâbased communication protocolâ 413
- Open Network Foundation categorizationâ 411â412
- research worksâ 416â419
- in wireless mesh networks
- architecture ofâ 421, 422
- benefits ofâ 423â424
- challengesâ 421
- fault toleranceâ 424
- fixedâband nonâsharing algorithmâ 422, 423
- nonâfixed band nonâsharing algorithmâ 422â423
- nonâfixedâband sharing algorithmâ 423
- in wireless sensor networks
- architectureâ 425â426
- challengesâ 424â425
- home networksâ 426
- Sensor OpenFlowâ 426
- software defined wireless networks (SDWN)â 426â427
- specification languagesâ 174
- spectrum holeâ 513
- standardizationâ 190
- stateâofâtheâart DNN modelsâ 69
- storage privacyâ 118
- STORMSeq toolâ 533â534
- supervised learningâ 322, 325
- supervisory control and data acquisition (SCADA) systemâ 347, 354, 357
- support vector machine (SVM) algorithmâ 324, 389
- symmetric DSLâ353
-
- t
- tardinessâ373
- task migration/offloadingâ 446
- threat indexâ 112
- 3D scene reconstruction from LIDAR scansâ 480â482
- threeâtier IoT system architectureâ374
- time division multiple access (TDMA)â232
- timeâseries dataâ 318
- TimesInâ 93
- topology of Fog devicesâ 337
- tradeoffs in EH fog systems
- energy consumption vs. latencyâ238â239
- execution delay vs. task dropping costâ239â240
- transductive transfer learning approachâ388
- trust
- in IoTâ 107â109
- management and multitenancy securityâ 31
- through web semanticsâ 120, 122â123
- trusted third party (TTP)â 116
- tunnelâbased redirection (TBR)â 86â87
- Twister2 environmentâ 226â227
- Twister:Netâ 226
- twoâfactor authenticationâ 110
- twoâpartyâbased EAKA protocolâ 112
- twoâphase eventâmonitoring and dataâgathering (TPEG)â 447
- twoâtier cloud assisted IoTâ 313
-
- u
- Universal Plug and Play (UPnP)â 160
- unmanned aerial vehicular fog computing (UAVâFog)â , 12â13, 32â33
- unsupervised learningâ 323
- unsupervised transfer learning approachâ388
- upward information collectionâ278
- usage privacyâ 449
- userâaccess controlâ 168
- user authenticationâ 108, 169
- userâbehaviorâdriven CCN cachingâ 96
- user equipmentâbased fog computing (UEâfog)â , 33
- content deliveryâ 14â15
- crowd sensingâ 15
- healthcareâ 13â14
- user mobilityâ 83â84
- user nodeâ 297â298
- utility centersâ 350
-
- v
- Variant Annotation Tool (VAT)â 534
- vehicleâtoâdevice (V2D) communicationâ
- vehicleâtoâInfrastructure (V2I) communicationâ
- vehicleâtoâvehicle (V2V) communicationâ
- vehicular adâhoc network (VANET) computingâ , 433
- vehicular fog computing (VFC)â , 433
- vehicular opportunistic computation offloadingâ 10
- video processing, multilevel data fusion forâ 338, 339
- virtual actuatorsâ 172
- virtualized homeâ 522
- virtual private networks (VPNs)â 459
- virtual realityâ 10
- virtual sensorsâ 171
- VoltâVar Optimization (VVO)â 357
-
- w
- wearable sensors
- design challengesâ250â251
- ECG sensorâ 51â52
- filterâbased techniquesâ248
- fogâassisted runtime energy managementâ253â254
- computational selfâawarenessâ255
- energy optimization algorithmsâ255â258
- MDP strategyâ259â263
- myopic strategyâ258
- healthcare IoT paradigmâ245
- Internet of Thingsâ245
- IoT system architectureâ251â253
- Markov decision process theoryâ250
- multiple access controlâ249
- peak detection algorithmâ248
- photoplethysmographyâ247
- power spectral densityâ248
- remote health monitoringâ247
- sleep schedulingâ249
- SpO2 calculationâ248â249
- web ontology language (OWL)â 120, 222
- web semantics and trust managementâ 120â123
- Wide Area Measurement Systems (WAMS)â 349
- wideâarea motion imagery (WAMI)â 474
- object tracking
- 3C pipeline needsâ 482â483
- large function processingâ 483
- small function processingâ 483
- wide area networks (WANs)â 350
- WiâFiâ 354
- WiMAXâ 354
- wind farmâ 153
- wired communication technologies, for SG
- digital subscriber lineâ353
- optical communicationsâ353
- power line communicationsâ 350, 353
- wireless access in vehicular environments (WAVEs)â 16
- wireless body area network (WBAN)â249
- wireless communication technologies, for SG
- Bluetoothâ 354
- cellular communicationsâ 354
- satellite communicationsâ 354
- WiâFiâ 354
- WiMAXâ 354
- ZigBeeâ353â354
- wireless mesh networks (WMN), SDN in
- architecture ofâ 421, 422
- benefits ofâ 423â424
- challengesâ 421
- fault toleranceâ 424
- fixedâband nonâsharing algorithmâ 422, 423
- nonâfixed band nonâsharing algorithmâ 422â423
- nonâfixedâband sharing algorithmâ 423
- wireless personal area network (WPAN)â 17â18, 160
- wireless power transfer (WPT)â232
- wireless sensor networks (WSNs)â 116, 315
- SDN in
- architectureâ 425â426
- challengesâ 424â425
- home networksâ 426
- Sensor OpenFlowâ 426
- wireless technologies
- wireless virtualizationâ 516
- Worldwide Interoperability for Microwave Access (WiMAX)â 354
- World Wide Web Consortium's (W3C's) specificationâ 222
-
- y
- Yelpâ 82
-
- z
- ZeroâKnowledge Authentication Protocolâ 113
- ZigBeeâ 160, 161, 353â354
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.