A review of video surveillance systems

O Elharrouss, N Almaadeed, S Al-Maadeed - Journal of Visual …, 2021 - Elsevier
Automated surveillance systems observe the environment utilizing cameras. The observed
scenario is then analysed using motion detection, crowd behaviour, individual behaviour …

Analysis of multi-dimensional Industrial IoT (IIoT) data in Edge-Fog-Cloud based architectural frameworks: A survey on current state and research challenges

R Kumar, N Agrawal - Journal of Industrial Information Integration, 2023 - Elsevier
Cloud computing is changing the traditional ways of computing using its different forms and
architectural types such as Edge and Fog computing. These computing frameworks are the …

Foundations and evolution of modern computing paradigms: Cloud, iot, edge, and fog

M De Donno, K Tange, N Dragoni - IEEE access, 2019 - ieeexplore.ieee.org
In the last few years, Internet of Things, Cloud computing, Edge computing, and Fog
computing have gained a lot of attention in both industry and academia. However, a clear …

Enabling technologies for fog computing in healthcare IoT systems

AA Mutlag, MK Abd Ghani, N Arunkumar… - Future generation …, 2019 - Elsevier
Context: A fog computing architecture that is geographically distributed and to which a
variety of heterogeneous devices are ubiquitously connected at the end of a network in …

Fog/edge computing-based IoT (FECIoT): Architecture, applications, and research issues

B Omoniwa, R Hussain, MA Javed… - IEEE Internet of …, 2018 - ieeexplore.ieee.org
The Internet-of-Things (IoT) is the future of the Internet, where everything will be connected.
Studies have revealed that fog/edge computing-based services will play a major role in …

Unleashing the Potential of Digitalization in the Agri-Food Chain for Integrated Food Systems

C Krupitzer, A Stein - Annual Review of Food Science and …, 2023 - annualreviews.org
Digitalization transforms many industries, especially manufacturing, with new concepts such
as Industry 4.0 and the Industrial Internet of Things. However, information technology also …

Lightweight authenticated-encryption scheme for internet of things based on publish-subscribe communication

A Diro, H Reda, N Chilamkurti, A Mahmood… - IEEE …, 2020 - ieeexplore.ieee.org
The resource-constrained nature and large-scale adoption of Internet of Things (IoT) have a
significant challenge for securing IoT applications. This necessitates a robust and …

A comprehensive survey on the cooperation of fog computing paradigm-based IoT applications: layered architecture, real-time security issues, and solutions

M Burhan, H Alam, A Arsalan, RA Rehman… - IEEE …, 2023 - ieeexplore.ieee.org
The Internet of Things (IoT) can enable seamless communication between millions of
billions of objects. As IoT applications continue to grow, they face several challenges …

Resource management in a peer to peer cloud network for IoT

A Javadpour, G Wang, S Rezaei - Wireless Personal Communications, 2020 - Springer
Abstract Software-Defined Internet of Things (SDIoT) is defined as merging heterogeneous
objects in a form of interaction among physical and virtual entities. Large scale of data …

SGXAP: SGX-based authentication protocol in IoV-enabled fog computing

TY Wu, X Guo, YC Chen, S Kumari, CM Chen - Symmetry, 2022 - mdpi.com
With the maturity and popularization of the Internet of Things, we saw the emergence of the
Internet of Vehicles. This collects and processes real-time traffic information, alleviates traffic …