<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>International Journal of Innovative Technology and Exploring
Engineering</journal-title>
      </journal-title-group>
      <issn pub-type="ppub">2278-3075</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Comparative Study of various Cloud Algorithms using Edge Cloud SIM</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Ishita Arora</string-name>
          <email>ishitaaaroraaa@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>S. Beski Prabaharan</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Chitkara University</institution>
          ,
          <addr-line>Punjab</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Galgotias University</institution>
          ,
          <addr-line>Greater Noida</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2019</year>
      </pub-date>
      <volume>9</volume>
      <issue>1</issue>
      <fpage>179</fpage>
      <lpage>187</lpage>
      <abstract>
        <p>Cloud computing is the on-demand availability of computer resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. It has various challenges, to solve the challenges, new technology is introduced by transferring the cloud into an edge server. For making massive changes such as reduced latency into the current system of cloud computing by introducing the latest automation. And this is time that we know which will be the most effective algorithm as there are quite a few of them are currently being studied. So as to find an algorithm that works the best for offloading different tasks. There are already many simulators that can simulate network activity at various levels comminute. Starting with current simulators, a significant programming effort is required to create a simulation tool that meets all requirements. Designing a new edge computing tool, on the other hand, will provide several technological challenges. A new simulator tool called EdgeCloudSim is particularly intended for edge computing frameworks to help overcome these hurdles. It satisfies the demand for edge computing, which is dependent on both computational and networking factors. There are numerous aspects to estimate. Edge computing using EdgeCloudSim. In this paper will be observing different algorithms already present to find the best approach for future use in the study of Edge Cloud Computing and for pr actical uses ACI'22: Workshop on Advances in Computation Intelligence, its Concepts &amp; Applications at ISIC 2022, May 17-19, Savannah, United States</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Edge computing covers a broad spectrum of concepts. The purpose of edge computing is getting
assistance in offloading tasks from a neighboring edge server in close vicinity to the client for time
sensitive activities and mobile computing, edge computing offers a clear benefit. Accomplishing the
whole task or some proportion of the task on the edge server will be remarkable precedence for the
resource-restricted mobile devices.
Whereas, edge computing also provides little transmission delay as the clients do not have to enter
WAN (Wide Area Network). New Schemes are being devised by the researches in the edge computing
for the execution of the innovative approaches in the field of edge -cloud computing with technical
characteristics that are important as a result, the researchershad to employ a realistic cloud environment
to test their methods. However, owing to the constraints, using a genuine cloud environment would not
be an efficient or cost-effective solution. Edge cloud can potentially be used in the field of edge
computing to examine each and every diverse kind of issue. And this solution of the problems can be
done in any timeframe. Changing the position where the task needs to be offloaded will make reduced
time for the task which is it can narrow thetime scale because the edge server does this work. Estimating
the innovative design within a broad timeframe can be done using EdgeCloudSim.
IT (Information Technology) section has grown well in recent years. As the resources are extremely
afar from the IoT (Internet of Things) devices. Data that is supposed to be exported to cloud should be
in real time if not will further increase the latency. But so as to resolve the limitations of the cloud
computing a new paradigm has come into the scene which is edge computing which further p rovides
transportation of data in real-time with storage capabilities at the edge computing network which is on
close proximity to the IoT devices. Due to decrease in the latency gaps, the offloading tasks can be
completed in real-time and edge server also provides better streaming services such as Amazon Prime
as they are bandwidth-intensive.</p>
      <p>Fuzzy Logic (FL) is a method devised to reason the assigning of the offloading task to a particular
server as it has human reasoning in it. Fuzzy logic further dea ls with numerous input and output
variables. The basic idea behind the extraction of the problem to a certain level so that it can be
recognized is what fuzzy logic does Fuzzy logic is modeled in such a way that it can indistinct all the
details which are more relevant. Therefore, for a multi-objective optimization problem with multiple
parameters, this is the most suitable method. It is often effortlessly accepting the conditions of the
system providing flexibility to the system.</p>
      <p>In this paper will we go through all the cloud computing algorithms which provide as an effective
solution. We will be comparing the algorithm on different basis to extract the best algorithm for future
use while choosing the best simulators for this survey.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Literature Survey</title>
      <p>In the following subgroups, studies are run on task offloading in Edge -Cloud computing, Workload
Orchestrator, the applications are served in edge or cloud simulations already in use where the way on
how real time access of the services can be provided, the effectiveness of fuzzy logic are reviewed and
discussed.</p>
      <p>
        Due to the increasing admiration of this paradigm many simulators are being introduced [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
Computational models are provided for the unrealistic cloud surroundings by the simulators. CloudSim
[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], GreenCloud [3], and iCanCloud [
        <xref ref-type="bibr" rid="ref3">4</xref>
        ] are three prominent cloud simulators. CloudSim was created
with Infrastructure-as-a-Service cloud computing environments in mind [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. It allows you to simulate
cloud components such as data centers, hosts, and virtual machines. Edge computing situations are
distinct from traditional computing scenarios as these tasks do not need much time. Mobile devices
offload tasks to the sting server, which are often handled at sub-second periods. Because the jobs are so
little, generating a new VM for each request is inefficient. Green Cloud is an extension of NS2[3].
GreenCloud can implement the whole TCP/IP protocol reference model because it is an extension of
NS2. Implementing the complete TCP/IP protocol reference model allows the energy modeling on
network switches and connections. However, this adds cost to the system in terms of memory use and,
as a result, simulation time, which is an impediment for GreenCloud.
The primary goals of iCanCloud are performance and scalability, in order to allow simultaneous
simulation runs. It provides simulation of the computational elements of virtualized cloud systems,
much as the other simulators. Edge computing solutions feature different user characteristics and hence
topological properties in comparison with cloud systems. Cloud computer simulations address mobility,
but users of such computing systems are mobile. In these simulations, the end -to-end transmission
latency is generally regarded as a static number. But the connection between mobile users and therefore
edge devices require wireless interfaces which require further network modeling. In addition, when
considering IoT devices, apps used in edge computing also have different features.
Wang et al. [
        <xref ref-type="bibr" rid="ref13">14</xref>
        ] proposed in his work about the computational and communications are intended only
for all the homogeneous resources [
        <xref ref-type="bibr" rid="ref14">15</xref>
        ], presented a method which aims to decrease the communication
and computational delays which can be done as we migrate the VM to an unloaded server.
A priority-based facility that precedence according to the limit is constructed by Azizi [
        <xref ref-type="bibr" rid="ref15">16</xref>
        ] which is
why nearest deadlines should be scheduled first. Their assessment does not justify the problem when
the system is working on many IoT devices with the help of different resources. This work basically
considers computational and communication demands. Sonmez et al. [
        <xref ref-type="bibr" rid="ref11">12</xref>
        ] this proposal includes Fuzzy
logic, as it focuses more on the delay factor and on needs for computing and communication. In this
approach, task offloading will potentially target the latency-sensitive applications whereas this does not
include resource heterogeneity. Roy et al. [
        <xref ref-type="bibr" rid="ref17">18</xref>
        ] this method is aimed at lowering latency and load
balancing across several edge nodes during execution. It proposed strategy resource heterogeneity is
taken into account as it helps allocate tasks to an appropriate edge node according to the need of the
tasks. In the last several years, there is much attention it was given to resource heterogeneity. Nan et al.
[
        <xref ref-type="bibr" rid="ref16">17</xref>
        ] Lyapunov techniques have been proposed that assure the accessibility of the edge resources and
thereby guarantee that the job is processed restricted. Whereas, this proposed technique doesnot include
the impacts from the latency-sensitive applications. But it solves all the problems the algorithm aims to
do as it reduces the cost for renting the cloud services by using edge resources.
Orchestration is a new concept in edge computing that is overly broad of a concept that has been
compromised on several levels. An edge orchestrator will certainly also be used to serve a limited scope.
Hegyi et al. proposed the method of solving the application deployment problem on the edge using
application orchestration. [
        <xref ref-type="bibr" rid="ref4">5</xref>
        ]. Karagiannis et al. In this system the edge cloud o rchestrator decide which
edge server should be given which application [
        <xref ref-type="bibr" rid="ref5">6</xref>
        ]. This system takes into consideration some
parameters such as network latency or remote server capabilities. And the workload orchestration is
one that potentially decides where the task will take place [
        <xref ref-type="bibr" rid="ref6">7</xref>
        ].
      </p>
      <p>
        Hosseini et al. [
        <xref ref-type="bibr" rid="ref8">9</xref>
        ] proposed a method in which they used the fuzzy logic approach as it helps get the
average of the parameters. Moreover, the offloading ratio is calculated using the 2 parameters which
are link delay and Signal-to –Noice Ratio (SNR). It operates on different layers as it also focuses on
different decisions. Fuzzy logic is one of the most effective methods. Rathore et al. Used fuzzy sets to
make an algorithm for security service [
        <xref ref-type="bibr" rid="ref9">10</xref>
        ]. Uses of Fuzzy logic gain th e trust of the vehicle for the
vehicular ad-hoc networks. [
        <xref ref-type="bibr" rid="ref10">11</xref>
        ]. in the last few years, fuzzy logic and workload orchestrator has been
studied. Flores et al. approached a fuzzy-based approach used for code offloading which basically
means that this approach uses fuzzy logic to decide whether offloading of the task should be done on a
mobile device or the cloud server. [
        <xref ref-type="bibr" rid="ref7">8</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Edge Cloud Sim</title>
      <p>A modular architecture will be provided by EdgeCloudSim which will potentially provide support to
Model mobility Wi-Fi, WAN, and equipment. EgdeCloudSim has five main accessible modules - Core,
Network, Load Generator, Mobility and Edge Orchestration. The Individual module accommodates
default implementation which can effortlessly be expanded that will essentially help at prototyping fast
which may reduce a lot of effort.
1. Core Stimulation Module –in this module, the original file will load and perform th e edge
computing scenario.
2. The Edge Orchestrator Module - all the information collected by other modules are used in
this module, so as to decide where and how can we handle client requests.
3. The Networking Module - The basic working of this module is more likely to be a single
model server queue. The transmission delay in WAN and WLAN for both uploading and
downloading data is considerably handled in this module.
4. Modular mobility - Edge device locations and customers are all managed by this mobility
module. The focus of CloudSim is mostly using the concepts of traditional cloud framework
never considers mobility.
5. Load Generator Module - Generation of different tasks with the available configuration is
done in this module. According to Poisson distribution, the jobs are all created using the
active/idle model defined by generating pattern.</p>
      <p>The main function of a simulator is to compare each model's performance currently present takes into
account the several facets of the models. Three configuration files are used by EdgeCloudSim to reduce
the Programming work is reduced, and the model is more configurable. The first file employs key-value
pairs as parameters such as simulation time and device count. The second file describes about the
applications of XML descriptions in simulations. In the load generator model, the characteristics of the
applications are used. The third file- in the XML format the location of the edge data centers and
credentials of the edge devices are provided. EdgeCloudSim allows its users to use individual
simulators, which simplifies the setup and execution of experiments.</p>
    </sec>
    <sec id="sec-4">
      <title>3.1. Extensibility</title>
      <p>Extensibility allows developers an environment that can be customized according to the demands of the
users it also allows developers to change behavior without substituting the original code. When the
extensibility is low, it will become acquainted with the specificsof the current architecture. The creators
do not intend to utilize the currently accessible tool. EdgeCloudSim helps us to make new modules by
integrating them for their personnel use by factory patterns which essentially helps to combine the
components. As the figure 1, the concrete implementation is provided as the scenario factory class also
handles the creation logic.</p>
      <p>Personal modules about the simulator can be used. This class will be help in modelling our custom
modules.
In the single-tier architecture, theoffloading of the devices is only limited to the closest edge datacenter.
This further leads to congestion at the most attractive places (which means that a greater number of
users are present). That leads to more task failure in the failure of the single-tier architecture in places
with a greater number of users. Moreover, the service time keeps on increasing du e to the congestion
in that area. Because the various tasks may be offloaded to cloud servers, two -tier designs produce
better outcomes than single-tier structures. In this approach, a probabilistic method is introduced by
Sonmez et al., which is further used to decide offloading tasks which should be allocated to the cloud
servers. The edge orchestrator helps the two-tier architecture to route offloading activities to any of the
edge data centers in the network alike.</p>
    </sec>
    <sec id="sec-5">
      <title>4. Fuzzy Logic Concept</title>
    </sec>
    <sec id="sec-6">
      <title>4.1. Fuzzy Variables</title>
      <p>The inputs are defined by the fuzzy system This concept's inputs include virtual machine usage, task
length, the quantity of data to be transmitted for each job, and delay sensitivity.
1. WAN Bandwidth- The WAN Bandwidth is an essential indication when offloading work to
the cloud server.
2. Task Length- The length of the task influences the time required to complete it.
3. Delay Sensitivity of Task- Taking longer time to execute a task is a reason for delay
sensitivity.
4. VM Utilization- The information regarding the edge server's computational capacity at that
point of time is determined by the VM utilization figure.If the threshold utilization if the
number of edge servers exceeds the threshold level, the edge server is deem ed crowded.</p>
    </sec>
    <sec id="sec-7">
      <title>4.2. Fuzzification</title>
    </sec>
    <sec id="sec-8">
      <title>4.3. Fuzzy-Rule Base</title>
      <p>At this stage, the all the required values by the fuzzifier will be taken as numerical input from incoming
tasks. Then all the values will be assigned to the predefined linguistic variable function.
A set of fuzzy rules is built like human reasoning is present.All the possible situations of all the
applications and system congestion with a simple if -then rule. For defining the overall system
performance these rules play a particularly significant role. All the outputs of the Fuzzy Rule-Base are
further used in the fuzzification stage. The major goal of this is to provide low latency for applications
by reducing data transfer from IoT devices to the cloud and eliminating nodes.</p>
    </sec>
    <sec id="sec-9">
      <title>4.4. Defuzzification</title>
      <p>The process of conversion of fuzzy output to crisp value from the output from the inference engine.</p>
    </sec>
    <sec id="sec-10">
      <title>5. Comparison Between Different Approaches</title>
      <p>
        Somme et al. [
        <xref ref-type="bibr" rid="ref11">12</xref>
        ] proposed the process of offloading, consideration the application tasks requirements
and resource utilization. However, this approach uses homogeneous resources for determining where
the offloading task will take place local edge or the cloud. They used a two-stage fuzzy logic to reduce
the complexity of the operation.
Aldossary et al. [
        <xref ref-type="bibr" rid="ref12">13</xref>
        ] proposed an approach that considers the heterogeneity of resources. Furthermore,
the suggested technique assists the resource management inside the Edge -Cloud system in scheduling
offloading activities in order to reduce overall service time and increase the efficiency of Edge-Cloud
resources.
      </p>
    </sec>
    <sec id="sec-11">
      <title>6. Analysis</title>
      <p>We will be considering three aspects, in which we are going to analyze and get the most efficient
Cloud-Edge model for future proficiency. The three aspects are service time, average processing delay,
and average network delay. The processing duration of each task will be determined by the processing,
which might be one of the following: 1) the general service time at the local edge consists of WLAN
time and processing time. 2) WLAN time and processing time are considered to be Collaborative Edge
and general service time. 3) In the cloud, general service time includes WLAN/MAN/WAN time as
well as processing time. We take the average for all jobs in each scenario, which is supported by the
subsequent equation:</p>
      <p>Service Time=∑Tprocessing time + ∑Tnetwork time/No. Of Tasks
(1)
Since Service time is an important part of IoT offloading Tasks. In the figure below we made a
comparison of two different algorithms with no. of IoT devices. From the figure, we can evidently see
that till the time system is unloaded all the algorithms behave the same way.Whereas,when we increase
the no of IoT devices in the algorithm the Aldossary approach will be steady as compared to all the
Sonmez approach.</p>
      <p>(a) Service Time Graph</p>
      <p>(b) Network Time Graph
(c) Processing Time Graph
In Figure 2(a), it is observed that the results are differed with one another, when the system gets
overloaded. Both the algorithms do have the same service time before the system gets overloaded .
From the Figure 2(b), we can see that whenever the total number of IoT devicesis less than 1400. These
2 algorithms possessthe same processing time. However, the Aldossary approach maintains its stability
and surpasses the Sonmez approach.</p>
    </sec>
    <sec id="sec-12">
      <title>7. Limitation And Future Work</title>
      <p>Due to restricted amounts of time could not study more technologies coming in the edge computing
paradigm due to time constraints. As more and more tools are been developed so as to reduce the
limitations of the already developed models during offloading of a task to make it accessible for the
clients and put less pressure on the server for better performance. For the future would like to dig deep
in this ocean of knowledge and would like to take part in the development of new technologies.</p>
    </sec>
    <sec id="sec-13">
      <title>8. Conclusion</title>
      <p>As the trend of the new novel edge computing paradigm is increasing the need for a simulation tool that
can estimate the proposed architecture The researchers tend to do cost-cutting by using simulators due
to very high cost of using real cloud paradigm. EdgeCloudSim then addresses this demand as it offers
a Mobility Model, a Network Link Model, and an Edge Server Model for evaluating the proposed
approach by the researchers based on edge computing.</p>
      <p>Edge computing ensures that more complicated offloading activities are not performed on mobile
devices, which have limited storage space and battery life. The goal of Edge Cloud Computing is to
further increase the responsiveness of mobile devices using the microdata centers nearby. An Edge
Orchestrator approach is proposed by Sonmez to manage the edge resources and further increase the
performance of the application offloading tasks.</p>
      <p>From the survey in this paper, we can conclude that the approach proposed by Aldossary takes resource
heterogeneity into account whose main reason is to reducethe latency in performing the task. Moreover,
we compared the 2 approaches using the EdgeCloudSim, a simulation program, was used to compare
the two techniques in an edge-cloud context. From this, we can clearly see that we can Further use
Fuzzy Logic as it is can handle uncertainty in any system just by dealing with variables and which can
further be represented by if -then rules.
[3] Dzmitry Kliazovich · Pascal Bouvry · Samee Ullah Khan, et al. “GreenCloud: a packet-level
simulator of energy-aware cloud computing data centers”. J Supercomput DOI
10.1007/s11227010-0504-1</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Calheiros</surname>
            <given-names>RN</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ranjan</surname>
            <given-names>R</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beloglazov</surname>
            <given-names>A</given-names>
          </string-name>
          ,
          <string-name>
            <surname>De Rose</surname>
            <given-names>CAF</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Buyya</surname>
            <given-names>R.</given-names>
          </string-name>
          , “
          <article-title>CloudSim: a toolkit for simulation of cloud computing environmentsand evaluation of resource provisioning algorithms”</article-title>
          .
          <source>Softw Pract Exp</source>
          .
          <year>2011</year>
          ;
          <volume>41</volume>
          (
          <issue>1</issue>
          ):
          <fpage>23</fpage>
          -
          <lpage>50</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>James</given-names>
            <surname>Byrne</surname>
          </string-name>
          , Sergej Svorobej,
          <string-name>
            <surname>Konstantinos M. Giannoutakis</surname>
            , Dimitrios Tzovaras ,
            <given-names>P. J.</given-names>
          </string-name>
          <string-name>
            <surname>Byrne</surname>
          </string-name>
          ,
          <string-name>
            <surname>Per-Olov</surname>
            <given-names>Östberg</given-names>
          </string-name>
          , Anna Gourinovitch and
          <string-name>
            <given-names>Theo</given-names>
            <surname>Lynn</surname>
          </string-name>
          et al.,
          <article-title>“A review of cloud computing simulation platforms and related environments”</article-title>
          ,
          <source>Paper presented at: 7th International Conference on Cloud Computing and Services Science; 2017; Porto</source>
          , Portugal.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Alberto</given-names>
            <surname>Núñez</surname>
          </string-name>
          · Jose L.
          <string-name>
            <surname>Vázquez-Poletti · Agustin C. Caminero · Gabriel G. Castañé ·Jesus Carretero · Ignacio M. Llorente</surname>
          </string-name>
          , et al.,
          <article-title>“iCanCloud: a flexible and scalable cloud infrastructure simulator”</article-title>
          ,
          <string-name>
            <given-names>J Grid</given-names>
            <surname>Comput</surname>
          </string-name>
          .
          <year>2012</year>
          ;
          <volume>10</volume>
          (
          <issue>1</issue>
          ):
          <fpage>185</fpage>
          -
          <lpage>209</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Attila</given-names>
            <surname>Hegyi</surname>
          </string-name>
          , Hannu Flinck, Istvan Ketyko, Pekka Kuure, Csaba Nemes and
          <string-name>
            <given-names>Lajos</given-names>
            <surname>Pinter</surname>
          </string-name>
          ,et al. “
          <article-title>Application orchestration in mobile edge cloud: Placing of iot applications to the edge”</article-title>
          ,
          <source>in 2016 IEEE 1st International Workshops on Foundations and Applications of Self* Systems (FAS*W)</source>
          ,
          <source>Sept</source>
          <year>2016</year>
          , pp.
          <fpage>230</fpage>
          -
          <lpage>235</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Karagiannis</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Papageorgiou</surname>
          </string-name>
          , “
          <article-title>Network-integrated edge computing orchestrator for application placement</article-title>
          ,
          <source>” in 2017 13th International Conference on Network and Service Management (CNSM)</source>
          ,
          <year>Nov 2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>H.</given-names>
            <surname>Flores</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Su</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Kostakos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. Y.</given-names>
            <surname>Ding</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Nurmi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tarkoma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Hui</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          , et al. “
          <article-title>Largescale offloading in the internet of things”</article-title>
          ,
          <source>March</source>
          <year>2017</year>
          , pp.
          <fpage>479</fpage>
          -
          <lpage>484</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Huber</given-names>
            <surname>Flores</surname>
          </string-name>
          and
          <string-name>
            <given-names>Satish</given-names>
            <surname>Sriram</surname>
          </string-name>
          , et al., “
          <article-title>Adaptive code offloading for mobile cloud applications: Exploiting fuzzy sets and evidence-based learning”</article-title>
          ,
          <source>in Proceeding of the Fourth ACM Workshop on Mobile Cloud Computing and Services</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Hosseini</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kazeminia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mehrjoo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Barakati</surname>
          </string-name>
          , et al. “
          <source>Fuzzy logic based mobile data offloading”</source>
          ,
          <year>2015</year>
          , 23rd Iranian Conference on Electrical Engineering
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Shailendra</surname>
            <given-names>Rathore</given-names>
          </string-name>
          , Pradip Kumar Sharma, Arun Kumar Sangaiah and
          <string-name>
            <surname>James J. Park</surname>
          </string-name>
          et al.,
          <article-title>“A hesitant fuzzy based security approach for fog and mobile-edge computing”</article-title>
          , Digital Object Identifier :
          <volume>11</volume>
          .1109/ACCESS.
          <year>2017</year>
          .2774837
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Seyed</given-names>
            <surname>Ahmad</surname>
          </string-name>
          <string-name>
            <surname>Soleymani</surname>
          </string-name>
          , Abdul Hanan Abdullah, Mahdi Zareei, Mohammad Hossein Anisi, Cesar Vargas-Rosales,
          <article-title>Muhammad Khurram Khan</article-title>
          and
          <string-name>
            <given-names>Shidrokh</given-names>
            <surname>Goudarzi</surname>
          </string-name>
          , et al.,
          <article-title>“A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing”</article-title>
          ,
          <year>2017</year>
          ,
          <source>Digital Object Identifier</source>
          <volume>10</volume>
          .1109/ACCESS.
          <year>2017</year>
          .2733225
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Sonmez</surname>
            <given-names>Cagatay</given-names>
          </string-name>
          , Ozgovde Atay,
          <string-name>
            <given-names>Ersoy</given-names>
            <surname>Cem</surname>
          </string-name>
          , et al.,
          <article-title>“Fuzzy workload orchestration for edge computing”</article-title>
          ,
          <source>IEEE Transactions on Network and Service Management</source>
          (Volume:
          <volume>16</volume>
          , Issue: 2, June 2019), DOI: 10.1109/TNSM.
          <year>2019</year>
          .2901346
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Jaber</surname>
            <given-names>Almutairi &amp; Mohammad</given-names>
          </string-name>
          <string-name>
            <surname>Aldossary</surname>
          </string-name>
          , et al.,
          <article-title>“A novel approach for IoT tasks offloading in edge-cloud environments”</article-title>
          ,
          <source>J Cloud Comp</source>
          <volume>10</volume>
          ,
          <issue>28</issue>
          (
          <year>2021</year>
          ). https://doi.org/10.1186/s13677-021- 00243-9.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Wang</surname>
            <given-names>Shiqiang</given-names>
          </string-name>
          , Zafer Murtaza,
          <string-name>
            <surname>Leung</surname>
            <given-names>KK</given-names>
          </string-name>
          (
          <year>2017</year>
          ), et al., “
          <article-title>Online placement of multi-component applications in edge computing environments”</article-title>
          ,
          <source>IEEE Access</source>
          <volume>5</volume>
          :
          <fpage>2514</fpage>
          -
          <lpage>2533</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Tiago</given-names>
            <surname>Gama</surname>
          </string-name>
          <string-name>
            <surname>Rodrigues</surname>
          </string-name>
          , Katsuya Suto, Hiroki Nishiyama,
          <string-name>
            <given-names>Nei</given-names>
            <surname>Kato</surname>
          </string-name>
          , et al., “
          <article-title>Hybrid method for minimizing service delay in edge cloud computing through VM migration and transmission power control”</article-title>
          ,
          <source>IEEE Trans Comput</source>
          <volume>66</volume>
          (
          <issue>5</issue>
          ):
          <fpage>810</fpage>
          -
          <lpage>819</lpage>
          .
          <year>2019</year>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>Hiwa</given-names>
            <surname>Omer</surname>
          </string-name>
          <string-name>
            <given-names>Hassan</given-names>
            ,
            <surname>Sadoon</surname>
          </string-name>
          <string-name>
            <surname>Azizi1</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Mohammad</given-names>
            <surname>Shojafar</surname>
          </string-name>
          , et al.,
          <article-title>“ Priority, network and energyaware placement of IoT-based application services in fog-cloud environments”</article-title>
          ,
          <source>IET Communications</source>
          <volume>14</volume>
          (
          <issue>13</issue>
          ):
          <fpage>2117</fpage>
          -
          <lpage>2129</lpage>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Yucen</surname>
            <given-names>Nan</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Wei</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <surname>Wei Bao</surname>
          </string-name>
          , Flavia C. Delicato, Paulo F. Pires,
          <string-name>
            <given-names>Albert Y.</given-names>
            <surname>Zomaya</surname>
          </string-name>
          , et al., “
          <article-title>Costeffective processing for delay-sensitive applications in cloud of things systems”</article-title>
          , In: 2016 IEEE
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Deepsubhra</given-names>
            <surname>Guha</surname>
          </string-name>
          <string-name>
            <given-names>Roy</given-names>
            , Debashis De, Anwesha Mukherjee, Rajkumar
            <surname>Buyya</surname>
          </string-name>
          (
          <year>2017</year>
          ), et al., “
          <article-title>Application-aware cloudlet selection for computation offloading in multi-cloudlet environment”</article-title>
          ,
          <source>J Supercomput</source>
          <volume>73</volume>
          (
          <issue>4</issue>
          ):
          <fpage>1672</fpage>
          -
          <lpage>1690</lpage>
          , DOI 10.1007/s11227-016-1872-y.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Mandal</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Khan</surname>
            ,
            <given-names>D. A.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Jain</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          (
          <year>2021</year>
          ).
          <article-title>Cloud-based zero trust access control policy:an approach to support work-from-home driven by COVID-19 pandemic</article-title>
          . New Generation Computing,
          <volume>39</volume>
          (
          <issue>3</issue>
          ),
          <fpage>599</fpage>
          -
          <lpage>622</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>