<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>CITI'</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Markov model of controlled load distribution in the edge- IoT subsystem⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Viacheslav Kovtun</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Yasniy</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Kovaliuk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ternopil Ivan Puluj National Technical University</institution>
          ,
          <addr-line>Ruska St, 56, Ternopil, 46001</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Vinnytsia National Technical University</institution>
          ,
          <addr-line>Khmelnytske shose, 95, Vinnytsia, 21021</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>3</volume>
      <fpage>11</fpage>
      <lpage>12</lpage>
      <abstract>
        <p>The article presents a hybrid Markov model of adaptive load distribution within edge-IoT subsystems operating under conditions of stochastic traffic and heterogeneous environments. The proposed approach formalises the set of admissible and critical system states and introduces a routing policy with a probabilistic guarantee of stabilisation within QoS-defined configurations. For the first time, an integral efficiency criterion is proposed, combining the probability of remaining in desirable states with the minimum probability of stabilisation under perturbations. The model enables the development of adaptive routing strategies that minimise servicing costs and enhance resilience against node degradation and traffic fluctuations. Experimental results demonstrate the superiority of the proposed approach over classical strategies (round-robin and random) in terms of average delay, resource utilisation, and the loss function. The model has practical relevance for 6G edge architectures, autonomous systems, eHealth, and critical IoT infrastructures.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;edge computing</kwd>
        <kwd>IoT</kwd>
        <kwd>load balancing</kwd>
        <kwd>Markov process</kwd>
        <kwd>adaptive routing</kwd>
        <kwd>QoS guarantee</kwd>
        <kwd>stochastic modelling</kwd>
        <kwd>network resilience 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Between 2024 and 2025, there has been an exponential increase in the number of IoT devices
connected to global telecommunication networks, particularly in the domains of logistics,
transport, healthcare, manufacturing, and smart cities [1, 2]. According to Statista, the number of
active IoT connections is expected to exceed 30 billion by the end of 2025, a substantial proportion
of which will operate based on edge computing architectures. This trend is driven by the need to
process data as close as possible to its source to minimise latency, conserve bandwidth, and reduce
energy consumption. Under such conditions, stable and adaptive management of computational
resources at edge nodes becomes a critical determinant of Quality of Service (QoS). Notably,
realworld incidents in the field of intelligent transport systems highlight the vulnerability of edge-IoT
subsystems to overload conditions [3]. For instance, during the CES-2024 festival in Las Vegas, the
smart traffic light system (relying on edge-level data processing from motion sensors) temporarily
lost stability due to an unforeseen surge in traffic, resulting in disruptions to urban infrastructure.
Such cases underscore the critical importance of dynamic request redistribution among edge nodes,
capable of adapting to sudden changes in both load and network topology. In military and
missioncritical security scenarios, such as autonomous reconnaissance systems, edge-IoT subsystems must
maintain QoS even in the event of partial network disconnection or node degradation. For this
reason, leading research institutions, including IEEE, 3GPP, and ITU, identify adaptive load
management at the edge level as one of the key challenges for future 6G networks. Nevertheless,
most existing models remain insensitive to the stochastic nature of traffic or fail to account for the
variable performance of nodes in heterogeneous environments. Consequently, against the
backdrop of rapidly evolving telecommunication infrastructures, increasingly stringent QoS
requirements, and energy constraints, the development of flexible and perturbation-resilient load
management models for edge-IoT subsystems is of paramount importance from both theoretical
and applied perspectives.</p>
      <p>Existing research in the field of load management within fog and edge-IoT environments
encompasses a wide range of approaches, which may be broadly categorised by methodology [4–
6]: heuristic and metaheuristic algorithms, probabilistic logics and game-theoretic strategies,
graph-based methods for load structuring, hybrid computational schemes, as well as stochastic
models based on Markov processes. Despite the increasing volume of publications in this area,
critical analysis reveals that none of these directions provides an adequate level of formalised
controllability required for the stable operation of heterogeneous edge-IoT systems with
guaranteed QoS levels.</p>
      <p>Most implemented solutions are based on stochastic or metaheuristic schemes [7–9], including
particle swarm algorithms, hill climbing, genetic algorithms, and iterative load-shedding methods.
These approaches are primarily aimed at reducing average service time, minimising latency, or
improving energy efficiency. They have shown favourable results in simulation environments and
constrained scenarios; however, nearly all are grounded in simplified models and do not provide a
formal description of the system's admissible state space or the probabilistic dynamics of
transitions between states. As a result, they lack guarantees of stabilisation within acceptable
boundaries, particularly under conditions of traffic variation or node degradation.</p>
      <p>Nowadays, a lot of problems in various fields of science and technology can be solved by means
of probabilistic methods [10, 11]. This is also true for the above-mentioned problem. Probabilistic
and fuzzy logic approaches [12–15] (including fuzzy rule-based controllers, fuzzy load-balancing
systems, and game-theoretic models utilising Shapley value-based resource allocation) enable the
implementation of adaptive local policies. These methods provide flexible responses to local
changes; however, they are predominantly focused on the micro-level and do not account for the
global dynamics of the system. The absence of a description of admissible and critical configuration
sets, along with the uncertainty of transition trajectories within the state space, limits their
applicability in systems characterised by high reliability requirements.</p>
      <p>Graph-based methods [16–18] (such as vertex-cut, dynamic partitioning, or hot data caching)
demonstrate computational efficiency in distributed networks with many nodes. However, their
implementation typically assumes a static graph structure and does not account for temporal
dynamics, which limits responsiveness to peak loads or partial infrastructure failures. As a result,
these methods do not ensure guaranteed system behaviour under real-time conditions.</p>
      <p>Hybrid approaches [19–21] (combinations of neural networks, caching algorithms, adaptive
routing, and heuristic planning) have demonstrated promising results in specific domains such as
smart city applications or eHealth. However, most of these models remain complex for
mathematical analysis, lack unified loss evaluation criteria, and are insufficiently interpretable for
safety-critical applications. Moreover, they rarely support structural modelling of system dynamics
at the level of the admissible state space.</p>
      <p>A separate category should be allocated to studies employing Markov Decision Processes (MDP)
[22–25], including partially observable models (POMDP), constrained Markov models (CMDP), and
even continuous-time variants (CTMDP). Some of these models, for instance, describe nodes as
two-state systems with the optimisation of offloading policies based on index evaluation. Others
apply reinforcement learning built upon CMDP to enable energy-efficient control while
maintaining QoS. Nevertheless, most such models are either too simplified to capture
multidimensional queuing behaviour or too complex for practical implementation (particularly in
cases where input data are unstable or limited). Consequently, they either fail to reflect the actual
heterogeneity of the system or exhibit limited applicability due to the necessity of training on
large-scale datasets.</p>
      <p>A common issue across all the examined classes of models is the absence of a unified efficiency
criterion that simultaneously accounts for temporal characteristics, probabilistic risks of
transitioning into critical states, deviation from target configurations, and the load on key nodes.
Existing optimisation strategies remain fragmented: one approach seeks to minimise delay, another
focuses on energy consumption, while a third targets the reduction of redirected requests. The lack
of an integrated metric of systemic efficiency precludes a comprehensive evaluation of control
quality and significantly complicates the synthesis of adaptive strategies.</p>
      <p>Another drawback of most existing approaches is that they are based on the assumption of
infrastructure homogeneity. In many models, nodes are treated as identical in their characteristics,
even though real-world edge-IoT networks exhibit significant heterogeneity (including mobility,
unstable power supply, and variability in cloud access). Under such conditions, disregarding this
non-uniformity results in inadequate routing decisions, increased risk of overload, or degradation
of QoS in the weaker nodes of the system.</p>
      <p>It is also worth emphasising that most of the described control systems are designed as offline
policies, relying on a priori knowledge of traffic patterns or user behaviour. Such approaches are
unsuitable for operation under real-time conditions, where continuous policy updates are required
based on the observed states of queues and nodes. The inability to reactively adapt to
environmental changes significantly undermines the system’s reliability under load.</p>
      <p>These shortcomings become particularly critical in domains where even short-term degradation
in service quality may lead to irreversible consequences (notably in autonomous transport, defence
sensor networks, eHealth infrastructure, or distributed energy systems). In such cases, approaches
are required that not only minimise average losses but also ensure, with probabilistic confidence,
that the system remains within admissible operational boundaries.</p>
      <p>This comprehensive analysis highlights the necessity of developing models that integrate a
structured stochastic foundation, adaptive routing, risk evaluation across a range of configurations,
and the capability to operate in real time within a heterogeneous environment. A model of this
kind should not only capture average service efficiency but also ensure controllable system
behaviour by employing formalised loss criteria aligned with the target objectives of QoS assurance
in critical IoT architectures.</p>
      <p>The object of the study is the process of adaptive load distribution in an edge-IoT subsystem,
considering the stochastic nature of traffic and the heterogeneity of resources.</p>
      <p>The subject of the study is a Markov model with controllable routing policies, which describes
the state dynamics of the edge-IoT subsystem under conditions of variable load, critical
configurations, and adaptive response to perturbations.</p>
      <p>The aim of the study is to develop a mathematically grounded stochastic model for adaptive
control of request distribution in edge-IoT subsystems, ensuring system stabilisation within
QoScontrolled configurations and the minimisation of integral costs.</p>
      <p>To achieve this aim, the following research objectives were set and addressed:
– To formalise the space of admissible and critical states of the edge-IoT subsystem, considering
node heterogeneity and QoS parameters;</p>
      <p>– To construct an adaptive Markov model for load control based on transitions between
configurations with varying levels of performance;</p>
      <p>– To define integral metrics of control efficiency that combine the probability of remaining in
admissible states with the risk of degradation;</p>
      <p>– To develop algorithms for generating hybrid routing policies capable of ensuring guaranteed
stability even under traffic fluctuations;</p>
      <p>– To conduct simulation analysis and comparison with classical approaches (round-robin and
random distribution), evaluating delay, resource utilisation, and losses.</p>
      <p>The main contribution of this study lies in the development of a formalised Markov model for
adaptive load control in edge-IoT subsystems, which integrates the system’s stochastic dynamics
with a hybrid service structure and enables the subsystem to be maintained within QoS-defined
configurations. The proposed approach ensures not only the minimisation of service costs but also
a high probability of avoiding critical states, even under variable traffic conditions, structural
heterogeneity, and partial resource degradation. Unlike classical models, it allows for the
quantitative incorporation of risks associated with transitions to critical configurations, supports
the modelling of phase dynamics of stabilisation, and enables the construction of adaptive routing
strategies with a guaranteed level of efficiency, as confirmed by the results of simulation analysis.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Models and methods</title>
      <sec id="sec-2-1">
        <title>2.1. Formalisation of the State Space and Criteria for Optimal Load Distribution in the Edge-IoT Subsystem</title>
        <p>The focus of this study is the formalisation of a model for controlled load distribution within an
edge-IoT subsystem. The subsystem consists of a set of edge computing nodes
,
denotes the total number of edge nodes, and
is the
corresponding index set. Each edge node</p>
        <p>is modelled as an M/M/1 queueing system [26], with a
service rate , which represents the average number of requests processed by the node per
unit of time.</p>
        <p>The management of request flows between edge nodes is carried out according to a routing
policy defined by a probabilistic transition matrix
,
. The matrix
is a
square matrix of dimension
, where each element
represents the probability
that a request from node
will be forwarded to node
, or processed locally (in the case of
).</p>
        <p>The current state of the subsystem at a discrete time
is described by a queue vector
, where</p>
        <p>denotes the number of requests awaiting processing at a
given edge node at time , and the vector characterises the overall load configuration
of the entire edge-IoT subsystem at time . The set of all admissible subsystem states is denoted by
. Its cardinality is indicated as
, and the set of indices corresponding to the
admissible states is referred to as</p>
        <p>To formalise the desired</p>
        <p>.
functional state
of the</p>
        <p>subsystem, a target vector
denotes the desired number of requests at
edge node , corresponding to an ideal (balanced) load distribution. The vector may be
defined in accordance with the selected objective, such as minimisation of delay, energy
consumption, or uniformity of processing.</p>
        <p>The quality of each admissible state
,
, is evaluated using a cost function</p>
        <p>is a weighting coefficient that accounts for node priority, processing
cost, or energy consumption constraints. The function serves as an aggregated metric of
load or service cost for the entire subsystem in the state indexed by .</p>
        <p>The objective of the edge-IoT subsystem's operation is to reach a state in which the costs are
minimised:</p>
        <p>In addition to optimising the average load, it is also essential to evaluate boundary scenarios
related to system overload. For this purpose, a maximum cost function
introduced, where</p>
        <p>
          denotes the value of the cost function (
          <xref ref-type="bibr" rid="ref1">1</xref>
          ) for the configuration
which the value of is the highest among all possible configurations. This approach enables
the assessment of the most critical state of the subsystem and is of key importance in the design of
QoS threshold mechanisms or protective mechanisms of the edge controller.
        </p>
        <p>To construct load control policies in an edge-IoT subsystem, it is necessary to define subsets of
subsystem state configurations that satisfy specific criteria of proximity to the target load
distribution. Let denote the set of states considered admissible in terms of QoS, that is, those
in which the load on each edge node remains within a controlled deviation from the target value.
Let represent the set of undesirable states, in which the subsystem operates with
efficiency reduced relative to the optimum. The number of elements in the defined sets is denoted
as
,</p>
        <p>, respectively.</p>
        <p>The proximity of each admissible state
to the target vector
is evaluated using
normalised tolerance thresholds. To this end, a tolerance vector
defines the maximum permissible deviation of the queue at edge node
from
the corresponding target value
:
. The deviation threshold
for node</p>
        <p>may be interpreted as an overload allowance or buffer depth within QoS
constraints. Accordingly, the set
constitutes a Euclidean neighbourhood of the vector
with a
radius defined by the vector , and includes all admissible configurations in which the overload at
no edge node exceeds the critical level.</p>
        <p>
          Let denote the set of deterministic actions within the defined control policy, where each
action regulates the selection of request redirection probabilities between the nodes of the edge-IoT
subsystem. For each state
, a routing strategy is selected in the form of a vector
(
          <xref ref-type="bibr" rid="ref2">2</xref>
          )
is
in
,
which
belongs
to
the
space
of
probability
distributions
state to state
dimensions.
        </p>
        <p>, where</p>
        <p>represents the probability of transitioning from
under the selected control action, and
is the standard simplex in</p>
        <p>Thus, a control strategy in the edge-IoT subsystem is defined as a mapping ,
according to which each subsystem state is associated with a probability distribution over
subsequent states. Let</p>
        <p>denote the set of such strategies that guarantee the subsystem</p>
        <p>Let</p>
        <sec id="sec-2-1-1">
          <title>For each</title>
          <p>denote the set of configuration indices belonging to the domain</p>
          <p>is considered, representing the probability of reaching</p>
          <p>Formally, the task of synthesising a control policy consists in determining a mapping
that ensures the reachability of the set from any initial state of the subsystem, guarantees that
the subsequent evolution of the subsystem remains within the boundaries of , and either
minimises the cost function on average or ensures its boundedness. This formulation
enables the problem to be formalised within the framework of a Markov process with a variable
policy.</p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>2.2. Hybrid Markov Model of the Edge-IoT Subsystem with Adaptive Routing</title>
      </sec>
      <sec id="sec-2-3">
        <title>Policies</title>
        <p>
          Within the formalised model of controlled load distribution, which describes the behaviour of the
edge-IoT subsystem as a stochastic process over the set of admissible configurations, it is essential
to examine the conditions for guaranteed stabilisation of the subsystem within the target set .
Despite the existence of policies that restrict transition probabilities to undesirable states in
accordance with condition (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ), the Markovian nature of the dynamics necessitates additional
justification of stability in the presence of perturbations or random overloads.
configuration from any admissible state, as well as the vector
the guaranteed service intensity at the corresponding edge nodes in these states.
, which reflects
        </p>
        <p>To quantitatively assess the stability of the edge-IoT subsystem, a value is introduced,
representing the lower bound of the probabilistic guarantee of stabilisation. It is defined as the
minimum among the values
for all
:
remains within admissible states. This implies that, under
subsystem within the set :
, all transitions must keep the</p>
        <p>
          From a practical implementation perspective, the value serves as a parameter used as a lower
bound in constructing a control strategy that not only minimises the cost function according to
criterion (
          <xref ref-type="bibr" rid="ref2">2</xref>
          ) but also ensures that the subsystem remains within admissible boundaries even in the
presence of traffic fluctuations or partial degradation of computational resources. Incorporating the
parameter as a dynamic indicator of the processing capacity of edge nodes enables the model to
reflect scenarios in which the subsystem must operate under conditions of priority-driven resource
reallocation, loss of channel capacity, or reduced energy autonomy at certain nodes. It is the
combination of stochastic information regarding the likelihood of reaching configurations from the
set , together with guarantees of local service availability, that allows a transition from static
approaches to the construction of adaptive policies aimed at ensuring the stable operation of the
edge-IoT subsystem within the set .
        </p>
        <p>The further development of the model requires consideration of the hybrid nature of the service
environment, in which edge nodes operate with dynamically varying service intensities under</p>
        <p>
          (
          <xref ref-type="bibr" rid="ref3">3</xref>
          )
(
          <xref ref-type="bibr" rid="ref4">4</xref>
          )
stochastic traffic distribution. For each node
        </p>
        <p>, we consider an extended approximation of the
guaranteed service intensity in a degraded state
. In this context, the configuration of the
edge-IoT subsystem in each state
is described by a vector
denotes the number of queued requests at node
in state .</p>
        <p>Additionally, two auxiliary quantities are introduced:
and
where represents an adjusted characteristic of the dynamic processing reserve aligned with
routing paths. To compute this value, the quantity is used, denoting the number of edge
nodes in the subsystem, along with the routing coefficients
, which describe the
probability that a request processed at node
will be redirected to node
. Accordingly, the
value</p>
        <p>is calculated as
identified with</p>
        <p>is the processing intensity at edge node
On the basis of
and
, we introduce a hybrid estimate of service intensity
, which equals
if
holds, and
in all other cases. Similarly, the parameter
is defined,
constructed on the basis of</p>
        <p>. These parameters will subsequently be used to construct the
generator of the hybrid Markov process
, where for each pair of states
corresponding to configurations
and
, the matrix
element is given by
, and the diagonal elements are defined as
. Here, the
function equals 1 if the corresponding component is greater than zero, and 0 otherwise.</p>
        <p>The temporal dynamics of the edge-IoT subsystem operation are characterised by the transition
probability matrix
. For each
, an indicator vector
is constructed, in which
a unit value corresponds only to the component
. The probability of reaching this state by
time is given as , where is the unit vector representing the initial state of
the subsystem, and the hybrid cost function is defined by expression
,
,
, a stationary distribution
is considered, which satisfies the
normalisation condition and the Kolmogorov equations using the matrix .</p>
        <p>The analysis of the behaviour of the controlled load distribution policy in the edge-IoT
subsystem concludes with the examination of the probability of remaining within the admissible
set of configurations , previously defined as those corresponding to an acceptable deviation from
the target state. In the context of the stochastic model, this probability is appropriately considered
an integral indicator of the effectiveness of the constructed routing policy. Let
denote the
total stationary probability that the subsystem resides in any state
. This value is computed
as the sum of stationary probabilities
over all indices
corresponding to configurations : . The value may be interpreted as a
load management quality indicator, as it reflects the proportion of time the edge-IoT subsystem
spends, on average, in admissible states.</p>
        <p>To enhance the adaptability of the policy under conditions of high traffic variability, a refined
criterion is introduced, according to which a generalised efficiency function
is defined.</p>
        <p>
          Here, , as described by formula (
          <xref ref-type="bibr" rid="ref4">4</xref>
          ), characterises the lower bound of the probabilistic guarantee
of reaching an admissible state, while the product is regarded as an integral
controllability criterion of the edge-IoT subsystem, accounting for both its current structure and
probabilistic risks. This value may serve as an objective function in optimisation tasks related to
routing and the identification of overloaded segments within the subsystem.
        </p>
        <p>In cases where the assumptions regarding input flow intensities do not conform to a Poisson
distribution, the model can be generalised by incorporating empirically obtained state transition
frequencies or by computing numerically based on simulation results. In this way, even
within a heterogeneous environment characterised by irregular topology and dynamically varying
resource availability, the Markov model presented in this section enables the formulation of a
stable balancing policy with a minimal probability of QoS degradation.</p>
        <p>Given the hybrid nature of the edge-IoT subsystem and the set of reduced-performance states
, it is important not only to determine the integral efficiency metric (see ), but also to construct
localised evaluations of the cost function, which enable the individualisation of routing strategies
according to the criticality of each specific performance degradation scenario.</p>
        <p>
          For each index corresponding to a specific reduced-performance state , a
value is defined, representing the expected losses of the subsystem associated with entering
that state. This value generalises the cost function , previously introduced in formula (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ), by
incorporating the local transition structure, recovery probabilities, and the residual time spent
within the degraded region.
        </p>
        <p>Formally, the function</p>
        <p>
          may incorporate both the individual values of service intensities
and the geometric characteristics of the distance from the target state . In this case, the model
assumes that more distant states entail higher losses, all other conditions being equal. Within the
framework of hybrid analysis, these values can be computed either individually for each edge node
or in aggregate form, using weight coefficients that reflect QoS-related priorities. The resulting
value
formula
is then used to refine the integral efficiency criterion by replacing the general value
in
with the corresponding localised value that models a specific risk:
,
(
          <xref ref-type="bibr" rid="ref6">6</xref>
          )
where is a weighting coefficient representing the significance of scenario in the
overall assessment of subsystem controllability. These coefficients may be determined based on the
criticality of resources in the corresponding state or empirically, according to the likelihood of the
respective configuration occurring due to typical disturbances (e.g., overload within an IoT
subsegment with limited communication bandwidth).
        </p>
        <p>To deepen the analysis of the dynamics of the edge-IoT subsystem under variable load
conditions, we consider an alternative to the model previously presented in the section. This
alternative model is based on a Markov process generator constructed using refined service
probabilities and updated routing mechanisms. Such a refined model is capable of capturing
threshold-based or reactive behaviour of the subsystem, in which edge nodes switch to an altered
mode of operation upon reaching local overload conditions.</p>
        <p>Let
and</p>
        <p>is the set of indices corresponding to admissible state configurations,</p>
        <p>is the set of indices of edge nodes in the subsystem. We formalise the general</p>
        <p>, whose elements are defined by expressions
where
denotes the hybrid service intensity at node
under the scenario indexed by
,
,
,
,
.</p>
        <p>
          (
          <xref ref-type="bibr" rid="ref7">7</xref>
          )
(
          <xref ref-type="bibr" rid="ref8">8</xref>
          )
(
          <xref ref-type="bibr" rid="ref9">9</xref>
          )
(
          <xref ref-type="bibr" rid="ref10">10</xref>
          )
,
        </p>
        <p>,
,
,
and</p>
        <p>represents the adapted routing in state</p>
        <p>The transition matrix in this case takes the form and enables the evaluation
of subsystem behaviour under the corresponding crisis regime. For the purpose of analysing the
probability of reaching a critical state
at time , an indicator vector
is introduced,
where if , and 0 otherwise. Using
specified scenario is defined by expression
, the probability function for reaching the
where
denotes the number of requests at node
,
represents the service
intensity at node
, and
is the routing probability from node
to node
. The
function quals 1 if holds, and 0 otherwise.</p>
        <p>The transition probability matrix in this model is defined by the classical matrix exponential of
the generator</p>
        <p>, which describes the temporal evolution of the subsystem under the
new service structure. The constructed matrix
can be used for comparative analysis with other
generators, in particular , which incorporated hybrid parameters.</p>
        <p>
          To specify the behaviour of the edge-IoT subsystem under particular crisis scenarios, we
introduce a specialised generator matrix
incorporating hybrid service intensities as given in
, defined analogously to (
          <xref ref-type="bibr" rid="ref7">7</xref>
          ) and (
          <xref ref-type="bibr" rid="ref8">8</xref>
          ), but
where is the unit vector corresponding to the initial state.
        </p>
        <p>
          The combined construction enables, on the one hand, the modelling of reactive dynamics (via
), and on the other – the specification of the crisis scenario through , integrating both aspects
into the formulation of cost functions and efficiency criteria, in particular (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) and (
          <xref ref-type="bibr" rid="ref6">6</xref>
          ).
        </p>
        <p>The refined model enables the specification of loss estimates and performance characteristics of
the edge-IoT subsystem under stochastic dynamics. Based on the previously formulated probability
function of reaching a critical state, we formalise a generalised cost function that accounts for both
the temporal aspect of the expected response and the risk of delay in transitioning to an admissible
configuration. Let</p>
        <p>denote the probability function of reaching a degraded state indexed by
before time , and</p>
        <p>be the fixed guaranteed response time threshold. Then the
which reflects the average temporal contribution to losses under the condition that the
subsystem responds within the allowed interval, as well as a penalty for exceeding the admissible
threshold.</p>
      </sec>
      <sec id="sec-2-4">
        <title>2.3. Evaluation of Control Efficiency and QoS Indicators in the Edge-IoT</title>
      </sec>
      <sec id="sec-2-5">
        <title>Subsystem</title>
        <p>
          Considering the Markovian structure of admissible and critical states, the expected number of
requests at an edge node in the stationary mode is described by an integral convolution over all
admissible configurations, as expressed in
(
          <xref ref-type="bibr" rid="ref14">14</xref>
          )
expected losses within scenario
are defined by expression
,
where denotes the number of requests at node in configuration , and represents
the probability of the subsystem residing in this configuration under stationary conditions.
Accordingly, each estimate (
          <xref ref-type="bibr" rid="ref13">13</xref>
          ) accounts for both the admissible domain and the set of states
with reduced performance .
        </p>
        <p>The probability that exactly
requests are present at the edge node
is defined by expression
which ensures the correct aggregation of the probability distribution over the hyperplane of
configurations with a fixed level of local load. In this case, the queue is not considered in isolation
but within the context of the global state of the subsystem as a whole.</p>
        <p>The estimate of the average effective arrival rate of requests to the edge node
all states of the subsystem, is formulated as in
, considering
where is an indicator of the presence of requests at node in state , and denotes
the service rate of requests under normal operating conditions. If the edge-IoT subsystem is in a
critical state , it is advisable to use the hybrid rate instead of , defined over the
corresponding segment. This approach enables the incorporation of reactive changes in the service
depending on the current state.</p>
        <p>The average time a request spends at the edge node, which reflects the relationship between the
load and the service rate, is given by the expression</p>
        <p>
          This represents a generalisation of Little’s law for a Markovian system with a set of controlled
and degraded configurations. Expression (
          <xref ref-type="bibr" rid="ref16">16</xref>
          ) retains its interpretation as a characteristic of request
delay at the level of an individual node but incorporates a global account of system states.
        </p>
        <p>Finally, the load coefficient of the edge node is defined by the expression
paths. In cases where
parameters.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Results and Discussion</title>
      <p>is known, the coefficient
may be refined by incorporating hybrid load
which reflects the expected proportion of time during which the edge node operates in
service mode. This value serves as a key QoS indicator within the edge-IoT subsystem employing
hybrid routing, as it enables the identification of nodes prone to overload or delays along routing
To verify the effectiveness of the proposed hybrid Markov model of controlled load distribution in
the edge-IoT subsystem, a computer simulation was carried out using the MATLAB R2023a
environment. A subsystem consisting of four edge nodes was modelled, each represented by a
classical M/M/1 queueing system enhanced with mechanisms for adaptive regulation of service
intensity under varying load conditions. The incoming traffic flows were characterised by
parameters approximating an exponential distribution, with an average intensity ,
which allowed for the consideration of different operational modes, including overload, partial
resource degradation, and changes in topological availability.</p>
      <p>The generation of the set of admissible states of the subsystem was carried out by iterating over
all queue vectors</p>
      <p>that satisfied the condition of Euclidean proximity to the target vector
, with an accuracy defined by the deviation
. This approach enabled
the construction of the set</p>
      <p>, consisting of 81 elements, which was further divided into the set of
admissible states
and the critical subset
, in accordance with the individual tolerance
vectors
. Each edge node was assigned an individual service rate
, which varied
within the bounds of and reflected the heterogeneous performance of devices in scenarios
characterised by energy or computational constraints.</p>
      <p>To model the probabilistic dynamics of transitions, a stochastic routing matrix
was
employed, in which each element represented the proportion of requests redirected from node to
node . These coefficients were selected to ensure, on average, a balanced load within the
permissible deviation. Based on the obtained parameters, a Markov process generator
was
constructed, where for each pair of states</p>
      <p>, the transition matrix elements were numerically
computed using formulas that incorporated a hybrid estimate of the local intensity
. In critical
states from the set
, this estimate was modified by accounting for the dynamic parameters
and
, which reflected both the actual queue length and the structural routing, formally expressed as</p>
      <p>
        The computation of the matrix exponential , which describes the temporal evolution
of the probabilities of the system being in a given state, was performed using the expm function
from the MATLAB Symbolic Math Toolbox, as numerical stability was of critical importance for
the validation of policies under varying parameters
. The indicator function for reaching
each of the critical states was implemented by constructing a vector , in which only a single
component assumed the value 1. The calculation of the hybrid cost function was carried out in
accordance with expression (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) via numerical integration using the integral function, which
ensured high-precision approximation of the result at small values of .
      </p>
      <p>The stationary distribution</p>
      <p>was obtained as the solution to the system of Kolmogorov
equations, supplemented by the normalisation condition . The solution was computed
using the linsolve function from the MATLAB Linear Algebra Toolbox, with the Rectangular
option enabled to handle a system with a degenerate extended dimension. The integral probability
of the system remaining in admissible states was calculated by summing the components of
the stationary distribution corresponding to the indices belonging to the set . Finally, the
generalised performance criterion was computed as the product , providing a
quantitative interpretation of the stability and quality of the routing policy, taking into account the
potential loss of QoS due to perturbations or non-uniformity of incoming traffic.</p>
      <p>Based on the constructed model, an experimental study of the dynamics of the edge-IoT
subsystem was conducted over the time interval , during which the subsystem evolved
according to a Markov process with an adaptive routing policy. The key indicator of dynamic
behaviour was the generalised performance criterion , which reflects the integral
probability of the subsystem remaining within admissible configurations, taking into account a
guaranteed stabilisation threshold. The value
was computed as the sum of the components
of vector , where denotes the unit vector of the initial state.</p>
      <p>To compare the effectiveness of the adaptive model, two baseline strategies were also simulated
– round-robin redirection and random request distribution. In the former case, each request was
sequentially redirected to the next node, with a fixed transition probability, ensuring uniform load
distribution but failing to account for the current queue states. In the latter case, a fully stochastic
principle was implemented, whereby routes were selected randomly without consideration of the
load history.</p>
      <p>Fig. 1 presents the results of computing the criterion for the three considered approaches.
The adaptive strategy exhibits a stable increase in performance from the early stages of the
simulation, reaching the value
already at
, and approaching the asymptotic level
. This indicates the rapid entry of the edge-IoT subsystem into the stability zone and a
high reliability in maintaining QoS. In contrast, the round-robin policy proved inertial – its
value increased more slowly, approaching only 0.85. The random redirection strategy was the least
effective: due to excessive transition dispersion, the subsystem spent a considerable portion of time
in configurations from the set , leading to a significant degradation in QoS.</p>
      <p>Transitioning from the dynamic assessment of subsystem stabilisation to a quantitative
comparison of control strategies, the focus now shifts to the experimental results, which illustrate
how different routing policies affect key performance indicators, in particular the average queueing
delay, resource utilisation level, and the value of the cost function.</p>
      <p>The queueing delay was calculated by recording the arrival time of each request and registering
the completion time of its service at the corresponding edge node. The average value was
computed over the time interval , within which the simulation was conducted. The
utilisation coefficient was defined as the ratio of the total server busy time to the overall
observation time, with values aggregated across all nodes of the edge-IoT subsystem. The cost
function</p>
      <p>was computed for each subsystem configuration as a weighted sum of queue
lengths, taking into account the weighting coefficients
admissible states.
, and subsequently averaged over all</p>
      <p>The results are presented as three comparative diagrams shown in Fig. 2. The first diagram
demonstrates that the average queueing delay under the adaptive strategy is approximately 1.2
seconds, whereas for the round-robin and random approaches, these values reach 2.3 and 3.7
seconds, respectively. This difference indicates a more efficient load balancing within the set of
permissible states, achieved through dynamic routing. The second diagram illustrates that adaptive
control leads to an average edge node utilisation of 92%, while the baseline policies show lower
performance – 85% and 78%, respectively. This metric is particularly significant in the context of
energy consumption, as it reflects the effective use of available computational resources without
excessive idle time.</p>
      <p>Finally, the third diagram compares the values of the cost function . The adaptive strategy
reduces the average value to 4.5 arbitrary units, whereas the round-robin and random strategies
yield values of 6.2 and 8.1, respectively. This confirms the capability of the adaptively controlled
subsystem to maintain the load configuration closer to the optimal one, which was formalised in
the model section by the vector and the set . It is worth noting that all the values presented
were computed in the MATLAB environment using scripts based on the functions mean, sum, find,
and accumarray, which enabled efficient aggregation of simulation results across many
configurations.</p>
      <p>The analysis of the experimental results enables the formulation of several conceptual and
applied conclusions regarding the efficiency of various routing approaches in edge-IoT subsystems.
The adaptive policy, developed based on a Markovian model that accounts for the current state of
the subsystem and admissibility criteria, demonstrated a clear advantage over classical schemes –
both in terms of integral metrics and the phase dynamics of state transitions.</p>
      <p>Firstly, consistently lower delay values alongside a high node utilisation ratio indicate the
ability of the adaptive model to balance the load effectively, avoiding both overload and inefficient
resource idleness. This directly influences the level of QoS, which remains stable even under
varying traffic conditions. Secondly, the reduction in the average value of the cost function
suggests that the adaptively managed subsystem operates closer to the target load distribution,
thereby minimising internal losses related to routing, energy consumption, and processing time.</p>
      <p>The phase analysis further confirmed that the adaptive strategy not only enables the attainment
of a stable operating regime but also does so more rapidly and with smaller fluctuations compared
to round-robin or random routing. Given the set of admissible configurations introduced in the
model, the adaptive policy ensures not only the reachability of the desired state but also sustained
operation within it for a significant period, thereby providing long-term stability of the edge-IoT
subsystem.</p>
      <p>From an applied perspective, the proposed model can be implemented as a foundation for the
development of control mechanisms in real-world edge-IoT subsystems, particularly within the
context of distributed intelligence in 6G networks. Its advantages are especially evident in
scenarios characterised by unpredictable traffic fluctuations, dynamic topology, or partial resource
unavailability. Moreover, the formalised efficiency criteria (in particular, the integral metric
) can be adapted to systems with alternative types of constraints or priorities, thereby
broadening the applicability of the proposed approach.
In modern edge-IoT subsystems, which combine high input traffic dynamics, structural
heterogeneity of nodes, and strict requirements for maintaining stable service quality, there arises a
need for the development of formalised models capable of ensuring real-time load controllability.
The motivation for this study stems from the necessity to design an adaptive model that, on the
one hand, reflects the stochastic nature of subsystem behaviour and, on the other, provides
mathematically grounded system stabilisation within admissible bounds, even under conditions of
disturbances and partial resource degradation.</p>
      <p>The scientific novelty of the present work lies in the development of a hybrid Markovian model
for controlled load distribution in edge-IoT subsystems, which for the first time integrates a
structured set of admissible states with parameterised transition probabilities between them,
formalised through the generator of a stochastic process incorporating adaptive routing. Unlike
existing analogues, this model introduces an integral efficiency criterion that combines the
probability of the system residing in QoS-defined states with an estimate of the guaranteed
stabilisation time, while also accounting for localised losses incurred upon entering critical
configurations. Additionally, a mechanism is proposed for constructing a routed policy that not
only minimises the average service cost but also ensures subsystem resilience to fluctuations in
traffic, topology structure, and node performance. This fundamentally distinguishes the approach
from heuristic or metaheuristic algorithms that lack a clearly defined spatial dynamic of the
system.</p>
      <p>The practical value of the developed model lies in its potential implementation as a foundation
for designing control mechanisms within distributed edge-IoT architectures, particularly in
scenarios where service continuity is critical – for instance, in autonomous transport systems,
eHealth applications, defence-oriented sensor networks, and energy-autonomous microsystems.
The integral controllability metric, formulated as the product of the stabilisation probability and
the stationary probability of remaining within the admissible states, can serve as a universal
criterion for load optimisation in the design of adaptive controllers operating in environments with
partially observable parameters.</p>
      <p>The synthesis of the computer simulation results confirmed the effectiveness of the proposed
strategy in comparison with classical approaches: the average delay was reduced by nearly a factor
of three, resource utilisation was increased to 92%, and the cost function was lowered to 4.5 a.u.
The adaptive strategy demonstrates rapid convergence to the stability zone and maintains QoS
even under conditions of intensive load disturbances, which substantiates its practical reliability in
real-world environments.</p>
      <p>Future research may be directed towards extending the model to support multicluster IoT
architectures with dynamic topology, incorporating non-Poisson traffic sources, applying
reinforcement learning models to develop reactive policies, and analysing subsystem behaviour
under attack scenarios or deliberate performance degradation. These directions open the prospect
for developing robust and interpretable solutions applicable across a broad range of mission-critical
applications in the field of intelligent distributed computing.</p>
    </sec>
    <sec id="sec-4">
      <title>Acknowledgements</title>
      <p>The authors are grateful to all colleagues and institutions that contributed to the research and
made it possible to publish its results.</p>
    </sec>
    <sec id="sec-5">
      <title>Declaration on Generative AI</title>
      <sec id="sec-5-1">
        <title>The authors have not employed any Generative AI tools.</title>
        <p>[17] Jiang, Z., Li, J., Hu, Q., Meng, W., Pedrycz, W., and Su, Z., Scalable Graph-Aware Edge
Representation Learning for Wireless IoT Intrusion Detection, IEEE Internet of Things Journal
2024 26955–26969. doi:10.1109/jiot.2024.3397364.
[18] Lu, Z., Chang, Z., He, M., and Song, L., Zero-Shot Traffic Identification with Attribute and</p>
        <p>Graph-Based Representations for Edge Computing, Sensors 2025 545. doi:10.3390/s25020545.
[19] Christalin Nelson, S., Singh, R. K., and Prakash, G. L., Hybrid deep learning model based on
Intelligent Microbat Routing (IMR) and Popularity Content Caching (PCC) for an effective
caching and routing in vehicular edge networks, Computers and Electrical Engineering 2022
108353. doi:10.1016/j.compeleceng.2022.108353.
[20] Alwakeel, A. M., Enhancing IoT performance in wireless and mobile networks through named
data networking (NDN) and edge computing integration, Computer Networks 2025 111267.
doi:10.1016/j.comnet.2025.111267.
[21] Jiang, W., Han, H., Zhang, Y., Wang, J., He, M., Gu, W., Mu, J., and Cheng, X., Graph Neural
Networks for Routing Optimization: Challenges and Opportunities, Sustainability 2024 9239.
doi:10.3390/su16219239.
[22] Heidari, A., Jamali, M. A. J., Navimipour, N. J., and Akbarpour, S., A QoS-Aware Technique for
Computation Offloading in IoT-Edge Platforms Using a Convolutional Neural Network and
Markov Decision Process, IT Professional 2023 24–39. doi:10.1109/mitp.2022.3217886.
[23] Kalnoor, G., and S, G., Markov Decision Process based Model for Performance Analysis an
Intrusion Detection System in IoT Networks, Journal of Telecommunictions and Information
Technology 2021 42–49. doi:10.26636/jtit.2021.151221.
[24] Sahu, D., Nidhi, Chaturvedi, R., Prakash, S., Yang, T., Rathore, R. S., Wang, L., Tahir, S., and
Bakhsh, S. T., Revolutionizing load harmony in edge computing networks with probabilistic
cellular automata and Markov decision processes, Scientific Reports 2025.
doi:10.1038/s41598025-88197-9.
[25] Chen, W., Chen, Y., and Liu, J., Service migration for mobile edge computing based on partially
observable Markov decision processes, Computers and Electrical Engineering 2023 108552.
doi:10.1016/j.compeleceng.2022.108552.
[26] Skirelis, J., and Navakauskas, D., Edge computing in IoT: Preliminary results on modeling and
performance analysis, 2017 5th IEEE Workshop on Advances in Information, Electronic and
Electrical Engineering (AIEEE) 2017 1–4. doi:10.1109/aieee.2017.8270555.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Al-Sarawi</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Anbar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abdullah</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          , and Al Hawari,
          <string-name>
            <surname>A. B.</surname>
          </string-name>
          ,
          <source>Internet of Things Market Analysis Forecasts</source>
          ,
          <fpage>2020</fpage>
          -
          <lpage>2030</lpage>
          ,
          <source>2020 Fourth World Conference on Smart Trends in Systems, Security and Sustainability (WorldS4)</source>
          2020
          <fpage>449</fpage>
          -
          <lpage>453</lpage>
          . doi:
          <volume>10</volume>
          .1109/worlds450073.
          <year>2020</year>
          .
          <volume>9210375</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Zaman</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Puryear</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abdelwahed</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Zohrabi</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <article-title>A Review of IoT-Based Smart City Development</article-title>
          and Management, Smart Cities 2024
          <fpage>1462</fpage>
          -
          <lpage>1501</lpage>
          . doi:
          <volume>10</volume>
          .3390/smartcities7030061.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Cao</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meng</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          ,
          <source>An Overview on Edge Computing Research, IEEE Access</source>
          <year>2020</year>
          85714-
          <fpage>85728</fpage>
          . doi:
          <volume>10</volume>
          .1109/access.
          <year>2020</year>
          .
          <volume>2991734</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Laroui</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nour</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Moungla</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cherif</surname>
            ,
            <given-names>M. A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Afifi</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Guizani</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <article-title>Edge and fog computing for IoT: A survey on current research activities &amp; future directions</article-title>
          ,
          <source>Computer Communications</source>
          <year>2021</year>
          210-
          <fpage>231</fpage>
          . doi:
          <volume>10</volume>
          .1016/j.comcom.
          <year>2021</year>
          .
          <volume>09</volume>
          .003.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Lone</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Sofi</surname>
            ,
            <given-names>S. A.</given-names>
          </string-name>
          ,
          <article-title>A review on offloading in fog-based Internet of Things: Architecture, machine learning approaches</article-title>
          , and open issues,
          <source>High-Confidence Computing</source>
          <year>2023</year>
          100124. doi:
          <volume>10</volume>
          .1016/j.hcc.
          <year>2023</year>
          .
          <volume>100124</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Mehmood</surname>
            ,
            <given-names>M. Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oad</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abrar</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Munir</surname>
            ,
            <given-names>H. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hasan</surname>
            ,
            <given-names>S. F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Muqeet</surname>
          </string-name>
          , H. A. ul, and
          <string-name>
            <surname>Golilarz</surname>
            ,
            <given-names>N. A.</given-names>
          </string-name>
          ,
          <article-title>Edge Computing for IoT-Enabled Smart Grid</article-title>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Lombardi</surname>
          </string-name>
          (Ed.),
          <source>Security and Communication Networks</source>
          <volume>2021</volume>
          <fpage>1</fpage>
          -
          <lpage>16</lpage>
          . doi:
          <volume>10</volume>
          .1155/
          <year>2021</year>
          /5524025.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Apat</surname>
            ,
            <given-names>H. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sahoo</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goswami</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Barik</surname>
            ,
            <given-names>R. K.</given-names>
          </string-name>
          ,
          <article-title>A hybrid meta-heuristic algorithm for multi-objective IoT service placement in fog computing environments</article-title>
          ,
          <source>Decision Analytics Journal</source>
          <year>2024</year>
          100379. doi:
          <volume>10</volume>
          .1016/j.dajour.
          <year>2023</year>
          .
          <volume>100379</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Latip</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Aminu</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hanafi</surname>
            ,
            <given-names>Z. M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kamarudin</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Gabi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <article-title>Metaheuristic task offloading approaches for minimization of energy consumption on edge computing: a systematic review</article-title>
          ,
          <source>Discover Internet of Things</source>
          <year>2024</year>
          . doi:
          <volume>10</volume>
          .1007/s43926-024-00089-y.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Kiani</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Seyyedabbasi</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          , Metaheuristic Algorithms in IoT: Optimized Edge Node Localization,
          <source>Studies in Computational Intelligence</source>
          <volume>2022</volume>
          <fpage>19</fpage>
          -
          <lpage>39</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -16832-
          <issue>1</issue>
          _
          <fpage>2</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Lebovka</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petryk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tatochenko</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          and
          <string-name>
            <surname>Vygornitskii</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <article-title>Two-stage random sequential adsorption of discorectangles and disks on a two-dimensional surface</article-title>
          ,
          <source>Physical Review E</source>
          <year>2023</year>
          108,
          <issue>024109</issue>
          . doi:
          <volume>10</volume>
          .1103/PhysRevE.108.024109
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Lebovka</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Petryk</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vorobiev</surname>
            ,
            <given-names>E</given-names>
          </string-name>
          , Monte Carlo simulation
          <article-title>of dead-end diafiltration of bidispersed particle suspensions</article-title>
          ,
          <source>Physical Review E</source>
          <year>2022</year>
          106 064610. doi:
          <volume>10</volume>
          .1103/PhysRevE.106.064610
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Bhardwaj</surname>
            ,
            <given-names>K. K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Banyal</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sharma</surname>
            ,
            <given-names>D. K.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Al-Numay</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <article-title>Internet of things based smart city design using fog computing and fuzzy logic</article-title>
          ,
          <source>Sustainable Cities and Society</source>
          <year>2022</year>
          103712. doi:
          <volume>10</volume>
          .1016/j.scs.
          <year>2022</year>
          .
          <volume>103712</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Shi</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chu</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ji</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Ning</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <article-title>A Fuzzy-Based Mobile Edge Architecture for LatencySensitive</article-title>
          and
          <string-name>
            <surname>Heavy-Task</surname>
            <given-names>Applications</given-names>
          </string-name>
          ,
          <year>Symmetry 2022</year>
          1667. doi:
          <volume>10</volume>
          .3390/sym14081667.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Abdulazeez</surname>
            ,
            <given-names>D. H.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Askar</surname>
            ,
            <given-names>S. K.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>A Novel</given-names>
            <surname>Offloading</surname>
          </string-name>
          <article-title>Mechanism Leveraging Fuzzy Logic and Deep Reinforcement Learning to Improve IoT Application Performance in a Three-Layer Architecture Within the Fog-Cloud Environment</article-title>
          ,
          <source>IEEE Access</source>
          <year>2024</year>
          39936-
          <fpage>39952</fpage>
          . doi:
          <volume>10</volume>
          .1109/access.
          <year>2024</year>
          .
          <volume>3376670</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Qafzezi</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bylykbashi</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ampririt</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ikeda</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matsuo</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Barolli</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <article-title>An Intelligent Approach for Cloud-Fog-Edge Computing SDN-VANETs Based on Fuzzy Logic: Effect of Different Parameters on Coordination and Management of Resources</article-title>
          ,
          <year>Sensors 2022</year>
          878. doi:
          <volume>10</volume>
          .3390/s22030878.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Soleimanikia</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bushehrian</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Mahmoodi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>A Novel</given-names>
            <surname>Graph-Based Energy</surname>
          </string-name>
          Efficient Sensor Selection Scheme in Edge Computing,
          <source>2023 International Conference on Smart Applications, Communications and Networking (SmartNets)</source>
          2023
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/smartnets58706.
          <year>2023</year>
          .
          <volume>10216179</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>