{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T00:16:51Z","timestamp":1723076211092},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T00:00:00Z","timestamp":1721174400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T00:00:00Z","timestamp":1721174400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2024,8]]},"DOI":"10.1007\/s11277-024-11272-3","type":"journal-article","created":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T15:01:57Z","timestamp":1721228517000},"page":"1355-1374","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Impact of Resource Distribution on Performance of Fog Computing Infrastructure"],"prefix":"10.1007","volume":"137","author":[{"given":"Sara","family":"Jamil","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-8946-6170","authenticated-orcid":false,"given":"Rehan","family":"Qureshi","sequence":"additional","affiliation":[]},{"given":"Sohaib","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Osama","family":"Rehman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,17]]},"reference":[{"issue":"8","key":"11272_CR1","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MC.2016.245","volume":"49","author":"AV Dastjerdi","year":"2016","unstructured":"Dastjerdi, A. V., & Buyya, R. (2016). Fog computing: Helping the Internet of Things realize its potential. Computer, 49(8), 112\u2013116. https:\/\/doi.org\/10.1109\/MC.2016.245","journal-title":"Computer"},{"key":"11272_CR2","doi-asserted-by":"publisher","unstructured":"Naas, M. I., Boukhobza, J., Raipin Parvedy, P., Lemarchand, L. (2018) An extension to iFogSim to enable the design of data placement strategies. In 2018 IEEE 2nd International Conference on Fog and Edge Computing (ICFEC), Washington DC, pp. 1\u20138, https:\/\/doi.org\/10.1109\/CFEC.2018.8358724","DOI":"10.1109\/CFEC.2018.8358724"},{"key":"11272_CR3","doi-asserted-by":"publisher","unstructured":"Delfin, S., Sivasanker, N. P., Raj, N., Anand, A. (2019) Fog computing: A new era of cloud computing. In 2019 3rd International Conference on Computing Methodologies and Communication (ICCMC), Erode, India, pp. 1106\u20131111, https:\/\/doi.org\/10.1109\/ICCMC.2019.8819633","DOI":"10.1109\/ICCMC.2019.8819633"},{"key":"11272_CR4","doi-asserted-by":"publisher","unstructured":"IEEE Standard for Adoption of Open Fog Reference Architecture for Fog Computing. IEEE. https:\/\/doi.org\/10.1109\/IEEESTD.2018.8423800","DOI":"10.1109\/IEEESTD.2018.8423800"},{"issue":"9","key":"11272_CR5","doi-asserted-by":"publisher","first-page":"1730","DOI":"10.3390\/app9091730","volume":"9","author":"BM Nguyen","year":"2019","unstructured":"Nguyen, B. M., Thi Thanh Binh, H., The Anh, T., & Bao Son, D. (2019). Evolutionary algorithms to optimize task scheduling problem for the IoT based bag-of-tasks application in cloud-fog computing environment. Applied Sciences, 9(9), 1730. https:\/\/doi.org\/10.3390\/app9091730","journal-title":"Applied Sciences"},{"key":"11272_CR6","unstructured":"Gupta, H., Dastjerdi, A. V., Ghosh, S. K., & Buyya, R. (2019). iFogSim: A toolkit for modeling and simulation of resource management techniques in Internet of Things, edge and fog computing environments. Preprint arXiv:1606.02007 [cs], Jun 2016. Retrieved December 10, 2019, from http:\/\/arxiv.org\/abs\/1606.02007"},{"issue":"1","key":"11272_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10723-019-09491-1","volume":"18","author":"M Ghobaei-Arani","year":"2020","unstructured":"Ghobaei-Arani, M., Souri, A., & Rahmanian, A. A. (2020). Resource management approaches in fog computing: A comprehensive review. Journal of Grid Computing, 18(1), 1\u201342. https:\/\/doi.org\/10.1007\/s10723-019-09491-1","journal-title":"Journal of Grid Computing"},{"key":"11272_CR8","doi-asserted-by":"publisher","unstructured":"Jamil, B., Shojafar, M., Ahmed, I., Ullah, A., Munir, K., & Ijaz, H. (2020). A job scheduling algorithm for delay and performance optimization in fog computing. Concurrency Computation Practice Experience, 32, 7. https:\/\/doi.org\/10.1002\/cpe.5581","DOI":"10.1002\/cpe.5581"},{"key":"11272_CR9","doi-asserted-by":"publisher","unstructured":"Mahmud, R., & Buyya, R. (2019). Modeling and simulation of fog and edge computing environments using iFogSim toolkit. In Fog and Edge Computing (chap 17). https:\/\/doi.org\/10.1002\/9781119525080.ch17","DOI":"10.1002\/9781119525080.ch17"},{"key":"11272_CR10","doi-asserted-by":"publisher","unstructured":"Mostafa, Ghobaei-Arani Alireza, Souri Fatemeh, Safara Monire, Norouzi (2020). An efficient task scheduling approach using moth\u2010flame optimization algorithm for cyber\u2010physical system applications in fog computing Abstract Transactions on Emerging Telecommunications Technologies 31(2). https:\/\/doi.org\/10.1002\/ett.v31.210.1002\/ett.3770","DOI":"10.1002\/ett.v31.210.1002\/ett.3770"},{"key":"11272_CR11","doi-asserted-by":"publisher","unstructured":"Lindong Liu, Deyu Qi, Naqin Zhou, Yilin Wu (2018). A task scheduling algorithm based on classification mining in fog computing environment. Wireless Communications and Mobile Computing 20181-11. https:\/\/doi.org\/10.1155\/2018\/210234848","DOI":"10.1155\/2018\/210234848"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11272-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11277-024-11272-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-024-11272-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T08:30:14Z","timestamp":1723019414000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11277-024-11272-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,17]]},"references-count":11,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,8]]}},"alternative-id":["11272"],"URL":"https:\/\/doi.org\/10.1007\/s11277-024-11272-3","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2024,7,17]]},"assertion":[{"value":"28 March 2024","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 July 2024","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}