rel="nofollow" href="#ulink_caf4820d-f90f-5326-a652-d046e0b2b63f">18.4 Simulation Design 18.5 Conclusions References 19 Fog Computing to Enable Geospatial Video Analytics for Disaster-incident Situational Awareness 19.1 Introduction 19.2 Computer Vision Application Case Studies and FCC Motivation 19.3 Geospatial Video Analytics Data Collection Using Edge Routing 19.4 Fog/Cloud Data Processing for Geospatial Video Analytics Consumption 19.5 Concluding Remarks References 20 An Insight into 5G Networks with Fog Computing 20.1 Introduction 20.2 Vision of 5G 20.3 Fog Computing with 5G Networks 20.4 Architecture of 5G 20.5 Technology and Methodology for 5G 20.6 Applications 20.7 Challenges 20.8 Conclusion References 21 Fog Computing for Bioinformatics Applications 21.1 Introduction 21.2 Cloud Computing 21.3 Cloud Computing Applications in Bioinformatics 21.4 Fog Computing 21.5 Fog Computing for Bioinformatics Applications 21.6 Conclusion References
6 Index
List of Tables
1 Chapter 2Table 2.1 Threat model for fog and edge computing [21].
2 Chapter 3Table 3.1 Memory and computational expensiveness of some of the most commonly...
3 Chapter 4Table 4.1 Caching schemes comparison.Table 4.2 Objectives-based comparison.
4 Chapter 5Table 5.1 State of the art research work timeline.Table 5.2 Authentication grid.Table 5.3 Authorization requirements in the Internet of Things.Table 5.4 Privacy requirements in the light of Internet of Things.
5 Chapter 6Table 6.1 Comparison between surveyed communication approaches.Table 6.2 Comparison between surveyed security and privacy approaches.Table 6.3 Comparison of the surveyed solution related to the Internet of Thin...Table 6.4 Comparison of the surveyed solution related to the data quality lay...Table 6.5 Comparison of the surveyed solution related to the cloudification l...Table 6.6 Comparison of the surveyed solution related to the analytics and de...
6 Chapter 7Table 7.1 Exemplar continuum computing science applications.Table 7.2 Twister2 components and status.
7 Chapter 10Table 10.1 Summary of symbols.
8 Chapter 12Table 12.1 Comparison of machine learningtechnologies [14].Table 12.2 Execution time (ms) for running DL models in three hardware platfo...Table 12.3 Classification of smart IoT devices according to their capacities ...
9 Chapter 13Table 13.1 Comparison of communication technologies for the SG [10–13].
10 Chapter 14Table 14.1 Simulation environmental parameters.Table 14.2 Comparison results of utility between heuristic and uEDA.
11 Chapter 15Table 15.1 Extracted features from sensor signals.Table 15.2 Energy consumption of various configurations, where computation is...Table 15.3 Accuracy of sensor localization.Table 15.4 The comparison between the accuracy of the regression on different...Table 15.5 Leave-one-subject-out cross validation test.Table 15.6 R2 values from linear regression on MET vs Ankle and Hip Accelerometer...Table 15.7 Comparing R2 values and error of linear regression on MET vs Ankle ...
12 Chapter 16Table 16.1 Comparison between centralized and distributed controller.
13 Chapter 17Table 17.1 Benchmarking of application classes.
14 Chapter 18Table 18.1 Results of the latency in the both architectures.Table 18.2 Log-transformed data for latency.Table 18.3 Results of the network usage in the both architectures.Table 18.4 Log-transformed data for network usage.
15 Chapter 20Table 20.1 Comparison of wireless technologies.Table 20.2 5G protocol stack.Table 20.3 Challenges of 5G.Table 20.4 Research projects on 5G.
16 Chapter 21Table 21.1 A summary of existing cloud computing based major bioinformatics a...Table 21.2 Comparison between the cloud computing and fog computing paradigms...
List of Illustrations
1 Chapter 1Figure 1.1 Land-vehicular fog computing examples. (See color plate section f...Figure 1.2 Maritime fog computing examples.Figure 1.3 UAV fog computing examples.Figure 1.4 UE fog computing examples. (See color plate section for the color...Figure 1.5 A taxonomy of non-functional requirements of mobile fog computing...Figure 1.6 Fog infrastructure service provider, fog service tenant, and tena...Figure 1.7 The three types of end-to-end networking.
2 Chapter 2Figure 2.1 Edge computing solution using an IoT and edge devices [12].Figure 2.2 An overview of edge computing architecture [16]. (See color plate...Figure 2.3 Fog computing a bridge between cloud and edge [20].Figure 2.4 Fog computing architecture [10]. (See color plate section for the...Figure 2.5 A wearable ECG sensor.Figure