2020
DOI: 10.1109/access.2020.2977643
|View full text |Cite
|
Sign up to set email alerts
|

Sensing Cloud Computing in Internet of Things: A Novel Data Scheduling Optimization Algorithm

Abstract: In order to addressing the issues of data matching deviation and load imbalance during the data scheduling process of the Internet of Things, Sensing Cloud Computing in IoT: A Novel Data Scheduling Optimization (SCC-DSO) Algorithm is proposed in this paper. First, according to the processing capacity of the IoT working node, a data placement algorithm is designed to reasonably place the input data of the job. Second, the data scheduling queue is optimized based on the data block storage location information to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 46 publications
(36 reference statements)
0
2
0
Order By: Relevance
“…Nowadays, more and more artificial intelligence products are listed and integrated into people's life. In the near future, artificial intelligence technology will have a significant impact on human society and human production and life [1,2]. Seeing the rapid development of information industry and Internet in the past, most of the credit depends on the rapid development of integrated circuits.…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays, more and more artificial intelligence products are listed and integrated into people's life. In the near future, artificial intelligence technology will have a significant impact on human society and human production and life [1,2]. Seeing the rapid development of information industry and Internet in the past, most of the credit depends on the rapid development of integrated circuits.…”
Section: Introductionmentioning
confidence: 99%
“…IoT systems can be victimized due to certain prevalent vulnerabilities. An intrusion detection system (IDS) is one of the crucial components of the cybercrime investigation process [3]. An IDS model scrutinizes the system activities to predict and detect attack patterns and to monitor every user's behavior in order to prevent any kind of security violations.…”
Section: Introductionmentioning
confidence: 99%