Open-source projects for edge computing

Book chapter


Khan, M., Al-Dulaimy, A., Khoshkholghi, A. and Taheri, J. 2020. Open-source projects for edge computing. in: Taheri, J. and Deng, S. (ed.) Edge Computing: Models, technologies and applications The Institution of Engineering and Technology (IET). pp. 265-290
Chapter titleOpen-source projects for edge computing
AuthorsKhan, M., Al-Dulaimy, A., Khoshkholghi, A. and Taheri, J.
Abstract

In this chapter, the author covered an overview to the EC technologies as well as a scope classification to its entire paradigm. The author also reviewed the state-of-the-art reference architectures and standardization, as well as top ten open-source projects and platforms in EC. Moreover, the author mentioned open issues and challenges in the EC paradigm and discussed them in detail.

Sustainable Development Goals9 Industry, innovation and infrastructure
Middlesex University ThemeCreativity, Culture & Enterprise
Page range265-290
Book titleEdge Computing: Models, technologies and applications
EditorsTaheri, J. and Deng, S.
PublisherThe Institution of Engineering and Technology (IET)
SeriesIET Computing series
ISBN
Hardcover9781785619403
Electronic9781785619410
Copyright Year2020
Publication dates
Print26 Jun 2020
Online03 Jul 2024
Publication process dates
Accepted10 Jun 2020
Deposited27 Nov 2025
Output statusPublished
Digital Object Identifier (DOI)https://doi.org/10.1049/pbpc033e_ch13
Scopus EID2-s2.0-85117989616
Related Output
Has metadatahttps://publons.com/wos-op/publon/42571192/
Is part ofhttps://doi.org/10.1049/PBPC033E
LanguageEnglish
Permalink -

https://repository.mdx.ac.uk/item/yzzzx

  • 20
    total views
  • 0
    total downloads
  • 4
    views this month
  • 0
    downloads this month

Export as

Related outputs

Signature-based security analysis and detection of IoT threats in advanced message queuing protocol
Hashimyar, M.E., Aiash, M., Khoshkholghi, A. and Nalli, G. 2025. Signature-based security analysis and detection of IoT threats in advanced message queuing protocol. Network. 5 (1). https://doi.org/10.3390/network5010005
Dissecting the hype: a study of WallStreetBets’ sentiment and network correlation on financial markets
Wang, K, Wong, B, Khoshkholghi, A., Shah, P., Naha, R, Mahanti, A and Kim, J 2024. Dissecting the hype: a study of WallStreetBets’ sentiment and network correlation on financial markets. 38th International Conference on Advanced Information Networking and Applications. Kitakyushu, Japan 17 - 19 Apr 2024 Springer. pp. 263-273 https://doi.org/10.1007/978-3-031-57853-3_22
Analyzing land cover and land use changes using remote sensing techniques: a temporal analysis of climate change detection with Google Earth engine
Afzal, M., Ali, K., Kasi, M., Rehman, M., Khoshkholghi, A., Haq, B. and Shah, S. 2023. Analyzing land cover and land use changes using remote sensing techniques: a temporal analysis of climate change detection with Google Earth engine. IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications. Exeter, United Kingdom 01 - 03 Nov 2023 IEEE. pp. 2018-2023 https://doi.org/10.1109/TrustCom60117.2023.00277
A novel scheduling algorithm for improved performance of multi-objective safety-critical wireless sensor networks using long short-term memory
Al-Nader, I., Lasebae, A., Raheem, R. and Khoshkholghi, A. 2023. A novel scheduling algorithm for improved performance of multi-objective safety-critical wireless sensor networks using long short-term memory. Electronics. 12 (23). https://doi.org/10.3390/electronics12234766
Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications
Chowdhury, A., Isalm, M., Kaisar, S., Naha, R., Khoshkholghi, A., Aiash, M. and Khoda, M.E. 2023. Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications. IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications. Exeter, United Kingdom 01 - 03 Nov 2023 IEEE. pp. 2216-2221
Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain
Edris, E., Aiash, M., Khoshkholghi, A., Naha, R., Chowdhury, A. and Loo, J. 2023. Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things. 24. https://doi.org/10.1016/j.iot.2023.100913
IoT-based emergency vehicle services in intelligent transportation system
Chowdhury, A., Kaisar, S., Khoda, M., Naha, R., Khoshkholghi, A. and Aiash, M. 2023. IoT-based emergency vehicle services in intelligent transportation system. Sensors. 23 (11). https://doi.org/10.3390/s23115324
Efficient design for smart environment using Raspberry Pi with Blockchain and IoT (BRIoT)
Ponugumati, S., Ali, K., Lasebae, A., Zahoor, Z., Kiyani, A., Khoshkholghi, A. and Maddu, L. 2023. Efficient design for smart environment using Raspberry Pi with Blockchain and IoT (BRIoT). CCGridW: 4th Workshop on Secure IoT, Edge and Cloud Systems (SioTEC) 2023. Bangalore, India 01 - 04 May 2023 IEEE. pp. 75-80 https://doi.org/10.1109/CCGridW59191.2023.00026
Information fusion-based cybersecurity threat detection for intelligent transportation system
Chowdhury, A., Naha, R., Kaisar, S., Khoshkholghi, A., Ali, K. and Galletta, A. 2023. Information fusion-based cybersecurity threat detection for intelligent transportation system. CCGridW: 4th Workshop on Secure IoT, Edge and Cloud Systems (SioTEC) 2023. Bangalore, India 01 - 04 May 2023 IEEE. pp. 96-103 https://doi.org/10.1109/CCGridW59191.2023.00029
Federated learning for performance prediction in multi-operator environments
Lan, X., Taghia, J., Moradi, F., Khoshkholghi, A., Listo Zec, E., Mogren, O., Mahmoodi, T. and Johnsson, A. 2023. Federated learning for performance prediction in multi-operator environments. ITU Journal on Future and Evolving Technologies. 4 (1), pp. 166-177. https://doi.org/10.52953/PFYZ9165
xURLLC in 6G with meshed RAN
Khoshkholghi, A., Mahmoodi, T., Pal, S., Chopra, S., Tendulkar, M. and Sarka, S. 2022. xURLLC in 6G with meshed RAN. ITU Journal on Future and Evolving Technologies. 3 (3), pp. 612-622. https://doi.org/10.52953/JTPE9471
Edge intelligence for service function chain deployment in NFV-enabled networks
Khoshkholghi, A. and Mahmoodi, T. 2022. Edge intelligence for service function chain deployment in NFV-enabled networks. Computer Networks. 219. https://doi.org/10.1016/j.comnet.2022.109451
IntOpt: in-band network telemetry optimization framework to monitor network slices using P4
Bhamare, D., Kassler, A., Vestin, J., Khoshkholghi, A., Taheri, J., Mahmoodi, T., Ohlen, P. and Curescu, C. 2022. IntOpt: in-band network telemetry optimization framework to monitor network slices using P4. Computer Networks. 216. https://doi.org/10.1016/j.comnet.2022.109214
Optimal application deployment in resource constrained distributed edges
Deng, S., Xiang, Z., Taheri, J., Khoshkholghi, A., Yin, J., Zomaya, A.Y. and Dustdar, S. 2021. Optimal application deployment in resource constrained distributed edges. IEEE Transactions on Mobile Computing. 20 (5), pp. 1907-1923. https://doi.org/10.1109/TMC.2020.2970698
Resource allocation models in/for edge computing
Khoshkholghi, A., Khan, M., Sharma, Y. and Taheri, J. 2020. Resource allocation models in/for edge computing. in: Edge Computing: Models, technologies and applications The Institution of Engineering and Technology (IET). pp. 125-146
Networking models and protocols for/on edge computing
Sharma, Y., Khoshkholghi, A. and Taheri, J. 2020. Networking models and protocols for/on edge computing. in: Taheri, J. and Deng, S. (ed.) Edge Computing: Models, technologies and applications The Institution of Engineering and Technology (IET). pp. 77-95
A performance modelling approach for SLA-aware resource recommendation in cloud native network functions
Khan, M.G., Taheri, J., Khoshkholghi, M.A., Kassler, A., Cartwright, C., Darula, M. and Deng, S. 2020. A performance modelling approach for SLA-aware resource recommendation in cloud native network functions. 6th IEEE NetSoft 2020. Virtual Conference (originally planned for Ghent, Belgium, Belgium) 29 Jun - 03 Jul 2020 IEEE. pp. 292-300 https://doi.org/10.1109/NetSoft48620.2020.9165482
Service function chain placement for joint cost and latency optimization
Khoshkholghi, A., Khan, M.G., Noghani, K.A., Taheri, J., Bhamare, D., Kassler, A., Xiang, Z., Deng, S. and Yang, X. 2020. Service function chain placement for joint cost and latency optimization. Mobile Networks and Applications. 25 (6), pp. 2191-2205. https://doi.org/10.1007/s11036-020-01661-w
Optimized service chain placement using genetic algorithm
Khoshkholghi, M.A., Taheri, J., Bhamare, D. and Kassler, A. 2019. Optimized service chain placement using genetic algorithm. 2019 IEEE Conference on Network Softwarization (NetSoft). Paris, France 24 - 28 Jun 2019 IEEE. https://doi.org/10.1109/netsoft.2019.8806644
IntOpt: in-band network telemetry optimization for NFV service chain monitoring
Bhamare, D., Kassler, A., Vestin, J., Khoshkholghi, M.A. and Taheri, J. 2019. IntOpt: in-band network telemetry optimization for NFV service chain monitoring. 2019 IEEE International Conference on Communications (ICC). Shanghai, China 20 - 24 May 2019 IEEE. https://doi.org/10.1109/ICC.2019.8761722
Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers
Khoshkholghi, M.A., Derahman, M.N., Abdullah, A., Subramaniam, S. and Othman, M. 2017. Energy-efficient algorithms for dynamic virtual machine consolidation in cloud data centers. IEEE Access. 5, pp. 10709-10722. https://doi.org/10.1109/ACCESS.2017.2711043