Low-altitude unmanned aerial vehicles-based internet of things services: Comprehensive survey and future perspectives

NH Motlagh, T Taleb, O Arouk - IEEE Internet of Things Journal, 2016 - ieeexplore.ieee.org
Recently, unmanned aerial vehicles (UAVs), or drones, have attracted a lot of attention,
since they represent a new potential market. Along with the maturity of the technology and …

Power consumption analysis, measurement, management, and issues: A state-of-the-art review of smartphone battery and energy usage

PKD Pramanik, N Sinhababu, B Mukherjee… - ieee …, 2019 - ieeexplore.ieee.org
The advancement and popularity of smartphones have made it an essential and all-purpose
device. But lack of advancement in battery technology has held back its optimum potential …

P-SEP: A prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks

PGV Naranjo, M Shojafar, H Mostafaei… - The Journal of …, 2017 - Springer
Energy efficiency is one of the main issues that will drive the design of fog-supported
wireless sensor networks (WSNs). Indeed, the behavior of such networks becomes very …

Mobile cloud computing: Challenges and future research directions

TH Noor, S Zeadally, A Alfazi, QZ Sheng - Journal of Network and …, 2018 - Elsevier
Mobile cloud computing promises several benefits such as extra battery life and storage,
scalability, and reliability. However, there are still challenges that must be addressed in …

Server placement in mobile cloud computing: A comprehensive survey for edge computing, fog computing and cloudlet

A Asghari, MK Sohrabi - Computer Science Review, 2024 - Elsevier
The growing technology of the fifth generation (5G) of mobile telecommunications has led to
the special attention of cloud service providers (CSPs) to mobile cloud computing (MCC) …

Network forensics: Review, taxonomy, and open challenges

S Khan, A Gani, AWA Wahab, M Shiraz… - Journal of Network and …, 2016 - Elsevier
In recent years, a number of network forensics techniques have been proposed to
investigate the increasing number of cybercrimes. Network forensics techniques assist in …

Robust computation offloading and resource scheduling in cloudlet-based mobile cloud computing

M Chen, S Guo, K Liu, X Liao… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Mobile cloud computing (MCC) as an emerging computing paradigm enables mobile
devices to offload their computation tasks to nearby resource-rich cloudlets so as to augment …

An efficient and secured framework for mobile cloud computing

IA Elgendy, WZ Zhang, CY Liu… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Smartphone devices are widely used in our daily lives. However, these devices exhibit
limitations, such as short battery lifetime, limited computation power, small memory size and …

Cloud log forensics: Foundations, state of the art, and future directions

S Khan, A Gani, AWA Wahab, MA Bagiwa… - ACM Computing …, 2016 - dl.acm.org
Cloud log forensics (CLF) mitigates the investigation process by identifying the malicious
behavior of attackers through profound cloud log analysis. However, the accessibility …

Scheduling algorithms for heterogeneous cloud environment: main resource load balancing algorithm and time balancing algorithm

W Lin, G Peng, X Bian, S Xu, V Chang, Y Li - Journal of Grid Computing, 2019 - Springer
Cloud computing and Internet of Things (IoT) are two of the most important technologies that
have significantly changed human's life. However, with the growing prevalence of Cloud-IoT …