scholarly journals Dynamic Fault Tolerance Aware Scheduling for Healthcare System on Fog Computing

2021 ◽  
pp. 308-318
Author(s):  
Hadeel T. Rajab ◽  
Manal F. Younis

 Internet of Things (IoT) contributes to improve the quality of life as it supports many applications, especially healthcare systems. Data generated from IoT devices is sent to the Cloud Computing (CC) for processing and storage, despite the latency caused by the distance. Because of the revolution in IoT devices, data sent to CC has been increasing. As a result, another problem added to the latency was increasing congestion on the cloud network. Fog Computing (FC) was used to solve these problems because of its proximity to IoT devices, while filtering data is sent to the CC. FC is a middle layer located between IoT devices and the CC layer. Due to the massive data generated by IoT devices on FC, Dynamic Weighted Round Robin (DWRR) algorithm was used, which represents a load balancing (LB) algorithm that is applied to schedule and distributes data among fog servers by reading CPU and memory values of these servers in order to improve system performance. The results proved that DWRR algorithm provides high throughput which reaches 3290 req/sec at 919 users. A lot of research is concerned with distribution of workload by using LB techniques without paying much attention to Fault Tolerance (FT), which implies that the system continues to operate even when fault occurs. Therefore, we proposed a replication FT technique called primary-backup replication based on dynamic checkpoint interval on FC. Checkpoint was used to replicate new data from a primary server to a backup server dynamically by monitoring CPU values of primary fog server, so that checkpoint occurs only when the CPU value is larger than 0.2 to reduce overhead. The results showed that the execution time of data filtering process on the FC with a dynamic checkpoint is less than the time spent in the case of the static checkpoint that is independent on the CPU status.

Author(s):  
Sejal Atit Bhavsar ◽  
Kirit J Modi

Fog computing is a paradigm that extends cloud computing services to the edge of the network. Fog computing provides data, storage, compute and application services to end users. The distinguishing characteristics of fog computing are its proximity to the end users. The application services are hosted on network edges like on routers, switches, etc. The goal of fog computing is to improve the efficiency and reduce the amount of data that needs to be transported to cloud for analysis, processing and storage. Due to heterogeneous characteristics of fog computing, there are some issues, i.e. security, fault tolerance, resource scheduling and allocation. To better understand fault tolerance, we highlighted the basic concepts of fault tolerance by understanding different fault tolerance techniques i.e. Reactive, Proactive and the hybrid. In addition to the fault tolerance, how to balance resource utilization and security in fog computing are also discussed here. Furthermore, to overcome platform level issues of fog computing, Hybrid fault tolerance model using resource management and security is presented by us.


Author(s):  
Sejal Atit Bhavsar ◽  
Kirit J Modi

Fog computing is a paradigm that extends cloud computing services to the edge of the network. Fog computing provides data, storage, compute and application services to end users. The distinguishing characteristics of fog computing are its proximity to the end users. The application services are hosted on network edges like on routers, switches, etc. The goal of fog computing is to improve the efficiency and reduce the amount of data that needs to be transported to cloud for analysis, processing and storage. Due to heterogeneous characteristics of fog computing, there are some issues, i.e. security, fault tolerance, resource scheduling and allocation. To better understand fault tolerance, we highlighted the basic concepts of fault tolerance by understanding different fault tolerance techniques i.e. Reactive, Proactive and the hybrid. In addition to the fault tolerance, how to balance resource utilization and security in fog computing are also discussed here. Furthermore, to overcome platform level issues of fog computing, Hybrid fault tolerance model using resource management and security is presented by us.


Foods ◽  
2021 ◽  
Vol 10 (7) ◽  
pp. 1537
Author(s):  
Danuta Jaworska ◽  
Elżbieta Rosiak ◽  
Eliza Kostyra ◽  
Katarzyna Jaszczyk ◽  
Monika Wroniszewska ◽  
...  

The study aimed to assess the effect of herbal additions with antioxidant properties (pepper, thyme and oregano) on the microbiological and oxidative stability as well as the sensory quality of minced poultry meat. Meatballs treatments without additives and treatments with the addition of three types of spices in two forms—dry spices and industrial extracts were examined. Popular seasoning additives of oregano (Origanum vulgare), thyme (Thymus vulgaris) and black pepper (Piper nigrum) at 0.3% of dry herbal or 0.003% as industrial extract were added to minced meat. The microbiological, chemical and sensory tests were performed at specified times and storage temperature. Based on the studied criteria, products maintained constant and adequate quality by up to 10 days while stored in 4 °C. In the case of all tested samples, the overall sensory quality began to deteriorate after 10 days of storage. The preservative role of herbs and extracts in meat products during processing and storage was observed. Oregano and black pepper in both forms maintained good microbial quality and showed their inhibitory effects on the growth of psychrotrophic bacteria. It was observed that dried herbs revealed a stronger antioxidant effect than additives in the form of extracts. The studied dried herbs played an antioxidant, antimicrobial and preservative role in meat products during processing and storage.


2021 ◽  
Author(s):  
Hamed Hasibi ◽  
Saeed Sedighian Kashi

Fog computing brings cloud capabilities closer to the Internet of Things (IoT) devices. IoT devices generate a tremendous amount of stream data towards the cloud via hierarchical fog nodes. To process data streams, many Stream Processing Engines (SPEs) have been developed. Without the fog layer, the stream query processing executes on the cloud, which forwards much traffic toward the cloud. When a hierarchical fog layer is available, a complex query can be divided into simple queries to run on fog nodes by using distributed stream processing. In this paper, we propose an approach to assign stream queries to fog nodes using container technology. We name this approach Stream Queries Placement in Fog (SQPF). Our goal is to minimize end-to-end delay to achieve a better quality of service. At first, in the emulation step, we make docker container instances from SPEs and evaluate their processing delay and throughput under different resource configurations and queries with varying input rates. Then in the placement step, we assign queries among fog nodes by using a genetic algorithm. The practical approach used in SQPF achieves a near-the-best assignment based on the lowest application deadline in real scenarios, and evaluation results are evidence of this goal.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Driss Ousaaid ◽  
Hamada Imtara ◽  
Hassan Laaroussi ◽  
Badiaa Lyoussi ◽  
Ilham Elarabi

Vinegar is a natural product rich in bioactive compounds such as phenols, flavonoids, and organic acids. Several factors affect the quality of vinegars such as apple origin, environmental conditions, production methods, processing, and storage conditions. We investigated the quality of apple vinegars as well as their physicochemical properties and the antioxidant and antibacterial activities of vinegars collected from different areas in Morocco. For physicochemical properties, the outcomes showed the following values: pH (3.18–3.83), electrical conductivity (2.11–2.90), acidity (0.24–5.6), Brix (3.25–6), and density (1.0123–1.0233). The polyphenols content of samples was 68.91 mg AG/100 mL in sample S6 as the minimum value and 147.54 mg AG/100 mL in sample S2 as the maximum value. The best ability to scavenge the DPPH radical was observed in sample S3 (IC50 = 0.45 ± 0.013 µL/mL). Sample S2 showed moderate antibacterial effect against microorganisms tested with MICs ranging from 0.78 µL/mL to 1.125 µL/mL and with a diameter of inhibition ranging from 15.65 mm to 27.65 mm. In addition, a strong correlation was observed between the antibacterial activity of vinegars and physicochemical parameters (pH and total acidity). These outcomes have shown that our vinegar samples are an excellent source of bioactive compounds with potent antioxidant and antibacterial potentials.


Author(s):  
Naureen Naqvi ◽  
Sabih Ur Rehman ◽  
Zahidul Islam

Recent technological advancements have given rise to the concept of hyper-connected smart cities being adopted around the world. These cities aspire to achieve better outcomes for citizens by improving the quality of service delivery, information sharing, and creating a sustainable environment. A smart city comprises of a network of interconnected devices also known as IoT (Internet of Things), which captures data and transmits it to a platform for analysis. This data covers a variety of information produced in large volumes also known as Big Data. From data capture to processing and storage, there are several stages where a breach in security and privacy could result in catastrophic impacts. Presently there is a gap in the centralization of knowledge to implement smart city services with a secure architecture. To bridge this gap, we present a framework that highlights challenges within the smart city applications and synthesizes the techniques feasible to solve them. Additionally, we analyze the impact of a potential breach on smart city applications and state-of-the-art architectures available. Furthermore, we identify the stakeholders who may have an interest in learning about the relationships between the significant aspects of a smart city. We demonstrate these relationships through force-directed network diagrams. They will help raise the awareness amongst the stakeholders for planning the development of a smart city. To complement our framework, we designed web-based interactive resources that are available from http://ausdigitech.com/smartcity/.


Antioxidants ◽  
2020 ◽  
Vol 9 (9) ◽  
pp. 815 ◽  
Author(s):  
Paulo E. S. Munekata ◽  
Beatriz Gullón ◽  
Mirian Pateiro ◽  
Igor Tomasevic ◽  
Ruben Domínguez ◽  
...  

The use of synthetic antioxidants in the food industry has raised important questions about the effects of prolonged consumption on human health. On top of that, the consumption of meat products has been changing due to the awareness generated by health-related organizations. In this sense, exploring strategies to develop and produce healthier meat products has become a paramount concern. Several studies explored the composition of several seeds to characterize and explore the compounds with antioxidant activity, which are mainly composed of polyphenols. The use of antioxidant extracts in meat products has shown important results to delay the oxidative reactions in meat products derived from the processing and storage of meat products. Moreover, these extracts can also replace synthetic antioxidants and preserve the quality of meat products. Therefore, the aims of this review are first, to present the sources and compounds with antioxidant activity in seeds, and second, to discuss their protective effect against oxidative reactions in meat products.


2017 ◽  
Vol 27 (03n04) ◽  
pp. 1750010 ◽  
Author(s):  
Amedeo Sapio ◽  
Mario Baldi ◽  
Fulvio Risso ◽  
Narendra Anand ◽  
Antonio Nucci

Traffic capture and analysis is key to many domains including network management, security and network forensics. Traditionally, it is performed by a dedicated device accessing traffic at a specific point within the network through a link tap or a port of a node mirroring packets. This approach is problematic because the dedicated device must be equipped with a large amount of computation and storage resources to store and analyze packets. Alternatively, in order to achieve scalability, analysis can be performed by a cluster of hosts. However, this is normally located at a remote location with respect to the observation point, hence requiring to move across the network a large volume of captured traffic. To address this problem, this paper presents an algorithm to distribute the task of capturing, processing and storing packets traversing a network across multiple packet forwarding nodes (e.g., IP routers). Essentially, our solution allows individual nodes on the path of a flow to operate on subsets of packets of that flow in a completely distributed and decentralized manner. The algorithm ensures that each packet is processed by n nodes, where n can be set to 1 to minimize overhead or to a higher value to achieve redundancy. Nodes create a distributed index that enables efficient retrieval of packets they store (e.g., for forensics applications). Finally, the basic principles of the presented solution can also be applied, with minimal changes, to the distributed execution of generic tasks on data flowing through a network of nodes with processing and storage capabilities. This has applications in various fields ranging from Fog Computing, to microservice architectures and the Internet of Things.


Sign in / Sign up

Export Citation Format

Share Document