2018
DOI: 10.1155/2018/7172045
|View full text |Cite
|
Sign up to set email alerts
|

Cloud/Fog Computing System Architecture and Key Technologies for South‐North Water Transfer Project Safety

Abstract: In view of the real-time and distributed features of Internet of Things (IoT) safety system in water conservancy engineering, this study proposed a new safety system architecture for water conservancy engineering based on cloud/fog computing and put forward a method of data reliability detection for the false alarm caused by false abnormal data from the bottom sensors. Designed for the South-North Water Transfer Project (SNWTP), the architecture integrated project safety, water quality safety, and human safety… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 11 publications
0
9
0
Order By: Relevance
“…Adopting fog computing is more comprehensive and flexible compare to other similar computing paradigm proposed by research community such as Cloudlets, cloud of things, mist computing and edge computing (Yousefpour et al, 2018). Before making any decision, future user of fog computing should identify the current problem with cloud computing (Fan et al, 2018). Therefore, they can proceed with exploring the adoption solution and effective design in order for them to identify suitable factors for adoption (Peng et al, 2018; Liu, Chan, Yang, & Niu, 2018) Despite the importance of this technology, there is limited study in the adoption, implementation and usage of the fog computing in organization (Alshamaila, Papagiannidis, & Li, 2013).…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…Adopting fog computing is more comprehensive and flexible compare to other similar computing paradigm proposed by research community such as Cloudlets, cloud of things, mist computing and edge computing (Yousefpour et al, 2018). Before making any decision, future user of fog computing should identify the current problem with cloud computing (Fan et al, 2018). Therefore, they can proceed with exploring the adoption solution and effective design in order for them to identify suitable factors for adoption (Peng et al, 2018; Liu, Chan, Yang, & Niu, 2018) Despite the importance of this technology, there is limited study in the adoption, implementation and usage of the fog computing in organization (Alshamaila, Papagiannidis, & Li, 2013).…”
Section: Literature Reviewmentioning
confidence: 99%
“…Consistency of data analysis performance must elevated if the data streams from devices handled in huge amount. Assessment on reliability outcome will help organisation to improve overall performance of data analysis (Ahamed et al, 2013;Fan et al, 2018;Lapin, 2014;Verba et al, 2019). In addition, to validate the identified dimensions, survey will be conducted between companies that adopted fog computing.The questionnaire constructed from literature review and modified to fit the context of fog computing adoption will be distributed through email to respondents within quarter of a year in order to increase the questionnaire response rate.…”
Section: Reliability Outcomementioning
confidence: 99%
“…It not only reduces the network delay for mobile users but also significantly reduces the link bandwidth backbone [9,10]. Although there are many advantages of fog computing, some security issues still need to be solved.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, when the number of users has increased dramatically, these users can obtain the service by visiting the contents of the cache in the fog servers so as to reduce network delay [8]. And it also significantly reduces the bandwidth of the backbone link load [9,10]. Unfortunately, the nodes in fog environment are close to the mobile users, and fog computing nodes are usually composed of devices with weak computing ability.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, unlike Clouds, Fog is close to the end-user and supports the distributed computing model. More information about Fog is available in [40,41]. Here we provide a comparison between Fog and Cloud.…”
Section: Radio Frequency Identification (Rfid) and Wireless Sensormentioning
confidence: 99%