2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT) 2017
DOI: 10.1109/icieect.2017.7916578
|View full text |Cite
|
Sign up to set email alerts
|

Software reliability in the fog computing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…Failures of sensors, as the main adverse events in perception, are identified in three categories: noncompliance with the expected function (such as for battery power, latency, 45 ) sensor malfunction, and erroneous sensor information. 46 Mahmood and Seah also highlight three types of failures of sensor networks, including distortions due to multi-path propagation generates, radiated electromagnetic interference and the electromagnetic interference arising from different devices and processes. 47 Gawanmeh propose several measures for evaluating the failures of wireless body sensors, such as bit-error rate, signal to noise ratio, and packet loss, 48 while Arfaoui et al propose a two-level and adaptive anomaly approach to detect false alarms caused by faulty measurements in a wireless body area network.…”
Section: Hazard and Adverse Event Identificationmentioning
confidence: 99%
“…Failures of sensors, as the main adverse events in perception, are identified in three categories: noncompliance with the expected function (such as for battery power, latency, 45 ) sensor malfunction, and erroneous sensor information. 46 Mahmood and Seah also highlight three types of failures of sensor networks, including distortions due to multi-path propagation generates, radiated electromagnetic interference and the electromagnetic interference arising from different devices and processes. 47 Gawanmeh propose several measures for evaluating the failures of wireless body sensors, such as bit-error rate, signal to noise ratio, and packet loss, 48 while Arfaoui et al propose a two-level and adaptive anomaly approach to detect false alarms caused by faulty measurements in a wireless body area network.…”
Section: Hazard and Adverse Event Identificationmentioning
confidence: 99%
“…Due to being located outside of well-protected service providers network, Fog nodes may encounter additional security and trust issues [33]. Likewise, reliability and fault tolerance related challenges and solutions for Fog nodes are currently heavily researched [34], [35].…”
Section: Edge and Fog Computingmentioning
confidence: 99%
“…It extends services of the cloud to the end user and processed IoT generated data . Fog computing combines mobile cloud computing and mobile edge computing to support IoT applications [40]. Both edge and fog computing extend the services of cloud computing in proximity to the end user [41].Edge and fog computing is more interchangeable term but fog computing focus on infrastructure side while edge computing focus towards things [42].…”
Section: • Fog Computingmentioning
confidence: 99%