Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9949464478602882
    Format: 1 online resource (269 p.)
    ISBN: 9781000811544 , 1000811549 , 9781003322931 , 100332293X , 9781000811513 , 1000811514
    Content: The book examines the enhancement of the performance of fog networks for real-world applications using nature-based optimization techniques. It looks at the challenges in cloud datacenter nodes and fog computing networks and provides solutions. It covers such issues as security, privacy, and power consumption.
    Note: Description based upon print version of record. , 5.5.1.3 Fitness Value Aware Resource Management , Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- Editors -- Contributors -- Chapter 1 Introduction to Optimization in Fog Computing -- 1.1 Introduction -- 1.2 Fog Computing Versus Cloud Computing -- 1.2.1 Benefits of Fog Computing -- 1.2.2 Edge Computing -- 1.2.3 Fog Computing Over 5G -- 1.3 Fog Computing System and Examples of Use -- 1.4 Optimization in Fog -- 1.5 Conclusions -- References -- Chapter 2 Open Issues and Challenges in Fog and Edge -- 2.1 Introduction -- 2.2 Issues With Fog -- 2.2.1 Open Issues -- 2.2.2 Optimization Issues , 2.3 Optimization in Various Layers of Fog Architecture -- 2.4 Security Issues in Fog -- References -- Chapter 3 Future Challenges in Fog and Edge Computing Applications -- 3.1 Introduction -- 3.2 Related Works -- 3.3 CC, Fog and Edge Computing -- 3.3.1 Fog Computing and Related Computing Paradigms -- 3.3.1.1 Differences Between Fog Computing and CC -- 3.3.1.2 Differences Between Fog and Edge Computing -- 3.4 System Architecture -- 3.5 Challenges and Solutions for Edge and Fog Computing -- 3.5.1 Scale -- 3.5.2 Control and Management -- 3.5.3 Data Accumulation -- 3.5.4 Backup , 3.5.5 Security and Accessibility -- 3.5.6 Latency -- 3.5.7 Distributed Computing -- 3.5.8 Network Bandwidth -- 3.6 Conclusions -- References -- Chapter 4 Geographic Information Systems-Based Modeling of Health Care Data and Its Optimization Using Various Approaches -- 4.1 Introduction -- 4.2 Various Material and Their Methodologies -- 4.2.1 Benefits of GIS -- 4.2.2 Various Classification of Health Data in GIS -- 4.2.3 Visualization -- 4.3 Overlay and Analysis in GIS -- 4.3.1 Buffer Zone Analysis in GIS -- 4.3.2 GIS-Based Network Analysis -- 4.3.3 Statistical Analysis in GIS -- 4.3.4 Query in GIS , 4.3.5 Web-Based GIS -- 4.4 GIS and Its Applications in Health Sciences -- 4.4.1 GIS and Epidemiology -- 4.4.2 Routes to Provide Services -- 4.4.3 Health Systems in Hospitals -- 4.4.4 Social Services -- 4.4.5 Customer Service -- 4.4.6 Site Selection -- 4.4.7 Managed Health Care -- 4.4.8 Resource Management -- 4.5 Requirements for Health Care Services -- 4.5.1 Analysis of Health Care Facilities -- 4.5.2 Access Measurement -- 4.5.3 Geographic Variations in Health Care -- 4.5.4 Health Care Delivery and GIS -- 4.5.5 Health Services Locations -- 4.6 Spatial Decision Support System , 4.6.1 GIS in Homeland Security -- 4.6.2 GIS in Indian Health Care -- 4.7 Conclusions -- 4.8 Future Directions -- References -- Chapter 5 Application of Optimization Techniques in Cloud Resource Management -- 5.1 Introduction -- 5.2 Related Works -- 5.3 Motivations for the Work -- 5.4 Optimization Techniques -- 5.4.1 Classifications of Resource Management Techniques in Cloud Computing -- 5.5 Resource Management Using Optimization Techniques -- 5.5.1 Resource Management Techniques Taxonomy Using Performance Metrics -- 5.5.1.1 Energy Aware Resource Management -- 5.5.1.2 SLA-Based Resource Management
    Additional Edition: Print version: Gupta, Punit Bio-Inspired Optimization in Fog and Edge Computing Environments Milton : Auerbach Publishers, Incorporated,c2022 ISBN 9781032262901
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages