<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
<journal-title-group><journal-title>Informatica</journal-title></journal-title-group>
<issn pub-type="epub">1822-8844</issn><issn pub-type="ppub">0868-4952</issn><issn-l>0868-4952</issn-l>
<publisher>
<publisher-name>Vilnius University</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">INFOR525</article-id>
<article-id pub-id-type="doi">10.15388/23-INFOR525</article-id>
<article-categories><subj-group subj-group-type="heading">
<subject>Research Article</subject></subj-group></article-categories>
<title-group>
<article-title>Fog Computing in Healthcare: Systematic Review</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0001-8897-7366</contrib-id>
<name><surname>Navakauskas</surname><given-names>Dalius</given-names></name><email xlink:href="dalius.navakauskas@vilniustech.lt">dalius.navakauskas@vilniustech.lt</email><xref ref-type="aff" rid="j_infor525_aff_001"/><bio>
<p><bold>D. Navakauskas</bold> is a full professor in the Department of Electronic Systems and Vice-Rector for Science and Innovation at Vilnius Gediminas Technical University, Lithuania. He received his honour diploma of radio-electronics engineer in 1992, MSc in electronics degree in 1994, doctor of electrical and electronic engineering degree in 1999, passed habilitation procedure in informatics engineering in 2005, received professor title in 2008, all at Vilnius Gediminas Technical University. Prof. D. Navakauskas is a senior member of the IEEE, active member of IEEE Computational Intelligence and Signal Processing Societies, currently serves as an IEEE R8 PEAC member and IEEE Lithuania Section Treasurer. He has published more than 100 internationally reviewed papers, two monographs in the field of intelligent electronic systems and four textbooks for students. Main research interests include computational intelligence, signal and image processing, bioinformatics.</p></bio>
</contrib>
<contrib contrib-type="author">
<contrib-id contrib-id-type="orcid">https://orcid.org/0000-0003-3990-1992</contrib-id>
<name><surname>Kazlauskas</surname><given-names>Mantas</given-names></name><email xlink:href="mantas.kazlauskas@vilniustech.lt">mantas.kazlauskas@vilniustech.lt</email><xref ref-type="aff" rid="j_infor525_aff_001"/><xref ref-type="corresp" rid="cor1">∗</xref><bio>
<p><bold>M. Kazlauskas</bold> is a PhD student of electrical and electronic engineering in the Department of Electronic Systems at Vilnius Gediminas Technical University, Lithuania. He received diploma of computer science in 2017, MSc in computer engineering in 2020. M. Kazlauskas is a student member of the IEEE. Main research interests are computational intelligence, signal and image processing, informatics.</p></bio>
</contrib>
<aff id="j_infor525_aff_001">Department of Electronic Systems, <institution>Vilnius Gediminas Technical University</institution>, Plytinės 25, Vilnius LT-10105, <country>Lithuania</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>∗</label>Corresponding author.</corresp>
</author-notes>
<pub-date pub-type="ppub"><year>2023</year></pub-date><pub-date pub-type="epub"><day>15</day><month>9</month><year>2023</year></pub-date><volume>34</volume><issue>3</issue><fpage>577</fpage><lpage>602</lpage><history><date date-type="received"><month>1</month><year>2023</year></date><date date-type="accepted"><month>8</month><year>2023</year></date></history>
<permissions><copyright-statement>© 2023 Vilnius University</copyright-statement><copyright-year>2023</copyright-year>
<license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
<license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p></license></permissions>
<abstract>
<p>Healthcare has seen many advances in sensor technology, but with recent improvements in networks and the addition of the Internet of Things, it is even more promising. Current solutions to managing healthcare data with cloud computing may be unreliable at the most critical moments. High response latency, large volumes of data, and security are the main issues of this approach. The promising solution is fog computing, which offers an immediate response resistant to disconnections and ways to process big data using real-time analytics and artificial intelligence (AI). However, fog computing has not yet matured and there are still many challenges. This article presents for a computer scientist a systematic review of the literature on fog computing in healthcare. Articles published in six years are analysed from the service, software, hardware, information technologies and mobility with autonomy perspectives. The contribution of this study includes an analysis of recent trends, focus areas and benefits of the use of AI techniques in fog computing e-health applications.</p>
</abstract>
<kwd-group>
<label>Key words</label>
<kwd>fog computing</kwd>
<kwd>internet of things</kwd>
<kwd>healthcare</kwd>
<kwd>systematic review</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="j_infor525_s_001">
<label>1</label>
<title>Introduction</title>
<p>Healthcare is one of the most expensive industries because it is person-centred and requires individual evaluations by healthcare workers. Integrating new technologies based on individual evaluation for general and preventive healthcare can reduce costs and offer real-time evaluation. As the populations of many countries age, the health system is facing an increasing burden, so additional technological solutions that could increase the availability of healthcare services while maintaining the appropriate quality must be sought.</p>
<p>The popularity and availability of Internet of Things (IoT) devices opened new opportunities to expand medical care and services not only in medical facilities and hospitals, but also in the homes of patients. IoT devices reduce the number of healthcare personnel because real-time assessment can be done without the intervention of a healthcare professional. The digital transformation in e-health combines information gathering, processing, communication (health data transmission and networks), and management (Maki <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_068">2022</xref>) that are essential to healthcare delivery and depend on system hardware and software components that work with healthcare computing technologies.</p>
<p>Many current electronic healthcare systems are based on cloud computing to store and process large amounts of data created by edge devices. However, due to high latency, this approach alone may not be viable because of bandwidth limitations, latency issues and unpredictable network disruptions (Linthicum, <xref ref-type="bibr" rid="j_infor525_ref_066">2017</xref>). To address high latency, fog computing could be the right solution that addresses not only long response times but also bandwidth issues caused by the vast amounts of data sent by medical devices.</p>
<p>Rapid response, scalability, device variety, mobility, wireless access, real-time data analysis, emergency notifications, low power consumption, security and privacy with depersonalised data – all of this may be offered by fog computing, which began to develop in 2010 when CISCO telecommunications company workers spoke for the first time about it. Then, in 2011 and 2012, the first scientific works appeared on fog computing in connected vehicle architecture (Bonomi, <xref ref-type="bibr" rid="j_infor525_ref_027">2011</xref>) and fog computing role in IoT (Bonomi <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_028">2012</xref>). Since then, the fog computing term has been successfully established. Fog computing, in general, is computing and storage resources located near edge devices. Fog computing devices operate physically and function between edge devices and the cloud.</p>
<p>The goal of fog computing is to increase efficiency, performance, and reduce the amount of data sent to the cloud in which it must be processed, analysed, and stored (Al-Fuqaha <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_007">2015</xref>), also to reduce the data processing load on data centres and edge devices, which have limited resources. The data collected by the sensors are collected, processed and stored in a temporary database of the fog node device, rather than being transmitted to the cloud, thus avoiding mutual and network traffic data delays. Fog nodes are also known as gateways, and in addition to a simple network function, they have storage and processing capabilities. Such a fog node device can perform data preprocessing and part of the cloud computing processing close to the devices within the (IoT) ecosystem, thus enabling a faster response to events compared to the cloud.</p>
<p>The fast decision-making process is critical for e-health applications that transmit data for remote real-time processing over the network. The purpose of such programs is to actively monitor patients and processes, thus providing valuable information to enable conclusions. Long delay in such decision-making process, communication of emergency and giving timely treatment may be fatal. In such situations, fog computing facilitates a very fast and secure response by reducing the transmission of the network to the remote cloud (Kanani and Padole, <xref ref-type="bibr" rid="j_infor525_ref_054">2020</xref>).</p>
<p>Many of the current review articles focus on simply listing existing technologies, services, applications, and problems, thus not providing a deeper formal analysis from particularised viewpoints (cf. Section <xref rid="j_infor525_s_020">4</xref>). Our goal in this work is to summarise the technology concerning fog computing being applied and to identify promising directions for its use in healthcare. In this work, we will provide a systematic look at fog computing in healthcare by analysing scientific articles published in the last 6 years in chosen perspectives such as services, software, hardware, information technologies, and mobility with autonomy, and then we will look deeper into the area of currently booming AI techniques used in healthcare fog computing solutions.</p>
</sec>
<sec id="j_infor525_s_002" sec-type="methods">
<label>2</label>
<title>Methods</title>
<p>This systematic review of the literature provides a research overview of fog computing in healthcare. We verify and quantify the research evidence from the different perspectives chosen. The methods we applied to the systematic review of the literature were based on the following activities: 
<list>
<list-item id="j_infor525_li_001">
<label>1.</label>
<p>Research questions – formulation of research questions.</p>
</list-item>
<list-item id="j_infor525_li_002">
<label>2.</label>
<p>Search strategy – outlining the strategy and the libraries of scientific articles explored.</p>
</list-item>
<list-item id="j_infor525_li_003">
<label>3.</label>
<p>Selection of articles – explanation of the criteria for article selection.</p>
</list-item>
<list-item id="j_infor525_li_004">
<label>4.</label>
<p>Quality assessment – description of the quality assessment of the selected articles.</p>
</list-item>
<list-item id="j_infor525_li_005">
<label>5.</label>
<p>Distribution of articles – presentation of the chronological distribution of the studies.</p>
</list-item>
<list-item id="j_infor525_li_006">
<label>6.</label>
<p>Processing of results – description of the main methods used to process the results.</p>
</list-item>
</list> 
The process is performed according to the PRISMA workflow (Page <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_079">2021</xref>) shown in Fig. <xref rid="j_infor525_fig_001">1</xref> and is detailed in the following subsections.</p>
<fig id="j_infor525_fig_001">
<label>Fig. 1</label>
<caption>
<p>Systematic review workflow with PRISMA.</p>
</caption>
<graphic xlink:href="infor525_g001.jpg"/>
</fig>
<sec id="j_infor525_s_003">
<label>2.1</label>
<title>Research Questions</title>
<p>The formulation of the research questions is one of the first steps in a systematic review of articles. In this way, we try to perform a classification from chosen perspectives that are related to fog computing and healthcare. In line with <italic>the goal</italic> of this review, to provide a computer scientist with a detailed analysis of the latest research done on fog computing in e-health, we formulate the following research <italic>questions</italic>: 
<list>
<list-item id="j_infor525_li_007">
<label>Q1.</label>
<p>What are the recent trends and focus areas in fog computing e-health applications?</p>
</list-item>
<list-item id="j_infor525_li_008">
<label>Q2.</label>
<p>What are the benefits of using artificial intelligence (AI) techniques for fog computing in e-health?</p>
</list-item>
</list>
</p>
</sec>
<sec id="j_infor525_s_004">
<label>2.2</label>
<title>Search Strategy</title>
<p>The main objective of the search strategy was to find relevant work related to fog computing and healthcare. We had defined the scope of the search and keywords by selecting the most important words related to the topic of the investigation for broader results. The search strategy consisted of constructing keywords to query related work in the field of fog computing and healthcare. The keywords “fog” and “health” were used for the resulting search string to select articles.</p>
<p>The article search was performed by topic, including the title, abstract, and author keywords. We manually analysed the coverage of fog and healthcare information in terms of topic relevance and context. In the search phase, the articles were obtained from databases applying the created keywords using the Web of Science article search tool, which is maintained by Clarivate Analytics. The following are main full content electronic databases to which we had access: ACM Digital Library, Elsevier, Emerald Insight, Hindawi, IEEE Xplore, MDPI, SpringerLink, Tech Science Press, and Wiley Online Library.</p>
<p>To limit the scope of the search, the year range from 2017 to 2022 was set, and then all search results were manually filtered by selecting the article by hand.</p>
</sec>
<sec id="j_infor525_s_005">
<label>2.3</label>
<title>Selection of Articles</title>
<p>All articles that were not relevant to the topics of fog computing and healthcare were removed. The following exclusion criteria were used:</p>
<list>
<list-item id="j_infor525_li_009">
<label>•</label>
<p>The article does not address fog computing using “fog” or related acronyms.</p>
</list-item>
<list-item id="j_infor525_li_010">
<label>•</label>
<p>The article does not address healthcare using “health” or related acronyms.</p>
</list-item>
<list-item id="j_infor525_li_011">
<label>•</label>
<p>The article does not address AI (when answering the research question Q2).</p>
</list-item>
</list>
<p>Initially, articles that fall under search criteria were filtered by document type. These include, e.g. conference papers, journal articles, books, or book chapters. The articles were then filtered by year. Subsequently, articles whose title, abstract, or keywords did not mention fog computing and healthcare terms were excluded. Finally, if we were still not sure about the article, we carefully read it to ensure that what we are looking at is related to fog computing and healthcare. Finally, irrelevant articles were removed.</p>
</sec>
<sec id="j_infor525_s_006">
<label>2.4</label>
<title>Quality Assessment</title>
<p>The quality assessment criterion was chosen to verify that the article is a relevant study that is necessary to evaluate. We evaluate the selected articles considering the purpose of the investigation, contextualisation, literature review, related work, methodology, result, and conclusion according to the objectives and indication of future studies.</p>
<p>Quality assessment criteria used in the systematic review: 
<list>
<list-item id="j_infor525_li_012">
<label>•</label>
<p>The purpose of the research is clearly stated.</p>
</list-item>
<list-item id="j_infor525_li_013">
<label>•</label>
<p>The main contribution: original research, review, or analysis is present.</p>
</list-item>
<list-item id="j_infor525_li_014">
<label>•</label>
<p>The work has research results.</p>
</list-item>
<list-item id="j_infor525_li_015">
<label>•</label>
<p>The conclusions are related to the research objectives.</p>
</list-item>
</list>
</p>
</sec>
<sec id="j_infor525_s_007">
<label>2.5</label>
<title>Distribution of Articles</title>
<fig id="j_infor525_fig_002">
<label>Fig. 2</label>
<caption>
<p>Distribution of articles – number of relevant and irrelevant articles.</p>
</caption>
<graphic xlink:href="infor525_g002.jpg"/>
</fig>
<p>To structure the search results, we allocated articles by year to be able to see yearly trends. Figure <xref rid="j_infor525_fig_002">2</xref> shows the selection process and how the filtering process of the articles works. Before using the exclusion criteria, we found 1222 articles in the preliminary search, of which 848 (69%) articles were considered irrelevant (5 articles failed quality assessment). Therefore, the final selection was of 374 articles (31%) that were used to answer the research questions.</p>
</sec>
<sec id="j_infor525_s_008">
<label>2.6</label>
<title>Processing of Results</title>
<p>The processing results for the first research question Q1 included the identification of five perspectives and the allocation of found terms into these categories: services, software, hardware, information technologies, and mobility with autonomy. All article data in the tables were presented annually (2017–2022), while individual table rows, representing the number of articles that elaborate on the specific term, were sorted out according to the total number of such articles. Using the statistical significance level of 5% (term was considered not significant if it was below 5% of the sum of all used terms), we determined significant terms (in the context of perspective under the consideration) and in tables separated them from the rest by a line. Moreover, only for the significant terms, we determined the maximum uses of the terms in the period of our investigation and additionally in the tables outlined them with the grey background. In order to extract the main trend based on the number of articles that elaborate on particular significant terms, we presented the data graphically using the line fitting-to-data technique.</p>
<p>The processing results for the second research question Q2 included the identification of three perspectives and the allocation of found terms into these categories: computational intelligence, machine learning, and neural networks. For each perspective, all the data about the article was presented in two types of tables. The first-type tables summarise the total number of articles (published from 2017 to 2022), when individual table rows, representing the total number of articles that elaborate on the specific term (technique), were sorted in decreasing order. Using the statistical significance level of 5% (term is considered not significant if the number of its uses is below 5% of the total sum of all used terms), we determined significant terms (in the context of perspective under consideration) and in tables separated them from the rest by a line. Also, with the grey background in these tables, we outlined the best techniques, i.e. techniques for fog computing that scored the highest accuracy in e-health applications. The second-type tables present data on comparative research studies of techniques (in the context of perspective under consideration) listing achieved accuracy, e-health application, investigated and the best techniques. The table rows are sorted in the accuracy decreasing order and, for convenience, are additionally labelled by process type: classification (C), detection (D), identification (I), optimisation (O), prediction (P), and recognition (R). With the grey background in these tables, we also outlined the significant terms from the first-type tables.</p>
</sec>
</sec>
<sec id="j_infor525_s_009">
<label>3</label>
<title>Results</title>
<p>Here, the actual findings based on the methodology presented and structured according to the research questions raised are summarised. Their comparison with other reviews outcomes is given afterwards in the discussion section.</p>
<sec id="j_infor525_s_010">
<label>3.1</label>
<title>The Recent Trends and Focus Areas in Fog Computing E-Health Applications</title>
<p>The most important perspectives for the developers of fog computing e-health applications that we identified are services, software, hardware, information technologies, and mobility with autonomy. We have chosen services, software and information technologies perspectives to give insight to computer science specialists, while hardware and mobility with autonomy perspectives to give insight to computer engineers, because connectivity everywhere is becoming widely used and opens more ways to gather and process data. We present the results of the answer to the first research question in these five perspectives.</p>
<sec id="j_infor525_s_011">
<label>3.1.1</label>
<title>Services Perspective</title>
<p>In total, 14 most common terms that describe services in fog computing e-health applications were chosen and used to get a view of the first perspective. Table <xref rid="j_infor525_tab_001">1</xref> summarises the results on these terms appearing in a representative set of articles.</p>
<table-wrap id="j_infor525_tab_001">
<label>Table 1</label>
<caption>
<p>The number of articles that in 2017–2022 addressed a service in fog computing e-health applications.</p>
</caption>
<graphic xlink:href="infor525_g003.jpg"/>
</table-wrap>
<p>From the data in the table it becomes evident that there are only six significant service-related terms (distinguished from the rest by a horizontal line) in the literature on fog computing e-health applications: monitoring, framework, architecture, data security, alert generation and prediction. “Monitoring” is the term most frequently used in articles, with a number of uses up to three times as low as any other term considered. All significant terms use maximum numbers (marked with the grey background) that vary from 16 to 46 times and appeared in the last year.</p>
<fig id="j_infor525_fig_003">
<label>Fig. 3</label>
<caption>
<p>Total annual mentions of significant terms of services and their linear approximation.</p>
</caption>
<graphic xlink:href="infor525_g004.jpg"/>
</fig>
<p>The main trends of the use of significant terms are shown in Fig. <xref rid="j_infor525_fig_003">3</xref>. From the pictorial representation in the figure it is clear that all six significant terms are trending, i.e. their use during the years 2017–2022 is increasing. It is seen that five terms during the years 2020 and 2021 had a decrease, though their use in 2022 peaked.</p>
</sec>
<sec id="j_infor525_s_012">
<label>3.1.2</label>
<title>Software Perspective</title>
<p>Software is an important part of the fog computing of e-health that is responsible for network simulation and verification, application front-end, back-end operation, and the operating environment. In total, 21 most common terms describing software in fog computing e-health applications were chosen to gain a view of the second perspective. Table <xref rid="j_infor525_tab_002">2</xref> summarises the results on these terms appearing in a representative set of articles.</p>
<table-wrap id="j_infor525_tab_002">
<label>Table 2</label>
<caption>
<p>The number of articles that in 2017–2022 addressed a software in fog computing e-health applications.</p>
</caption>
<graphic xlink:href="infor525_g005.jpg"/>
</table-wrap>
<p>From the data in the table it becomes apparent that there are only six significant software-related terms (outlined by a horizontal line) in the literature on fog computing e-health applications: programming languages, cloud, simulators, frameworks, machine learning and operating systems. “Programming languages” is the term most frequently used in articles, with a number of uses up to three times as low as any other term considered. All significant terms use maximum numbers (marked with the grey background) that vary from 14 to 43 times and appear during the last four years under consideration.</p>
<fig id="j_infor525_fig_004">
<label>Fig. 4</label>
<caption>
<p>Total annual mentions of significant terms of software and their linear approximation.</p>
</caption>
<graphic xlink:href="infor525_g006.jpg"/>
</fig>
<p>The main trends of significant term use are shown in Fig. <xref rid="j_infor525_fig_004">4</xref> using a line fitting to-data technique. From the figure it is evident that three of the six significant terms are trending, i.e. their use during the years 2017–2022 is increasing, which are: “programming languages”, “cloud” and “simulators”. The increase in the usage of terms “machine learning” and “framework” was minimal. Only the trend of the use of the term “operating system” (whose usage in 2019 peaked) is decreasing. It is seen that four terms during the years 2020 and 2021 had a decrease though their use in 2022 peaked.</p>
</sec>
<sec id="j_infor525_s_013">
<label>3.1.3</label>
<title>Hardware Perspective</title>
<p>The fog environment commonly consists of few end devices that are heterogeneous, making the system more diverse. When developing fog applications, the computing platform, its devices, and network heterogeneity should be considered. Such systems consist of edge, fog, and cloud layer devices, IoMT, general-use sensors, and sometimes batteries, if devices are mobile. We will separately analyse sensor node and fog node hardware.</p>
<p><italic>Sensor node hardware.</italic> In total, 11 most common terms describing sensor node hardware in fog computing e-health applications were chosen and used. The upper part of Table <xref rid="j_infor525_tab_003">3</xref> summarises the results on these terms appearing in a representative set of articles.</p>
<p>The table data grounds that in the literature on fog computing e-health applications, there are five significant sensor node hardware-related terms (distinguished from the rest by a horizontal line): sensors, smartphones, microcontroller units (MCU), network modules and specialised sensor nodes. The term “sensor” is the most frequently used term in articles, with a number of uses up to six times lower than any other term considered. All significant terms use maximum numbers (marked with the grey background) that vary from 7 to 71 times and appear from 2019 to 2022.</p>
<table-wrap id="j_infor525_tab_003">
<label>Table 3</label>
<caption>
<p>The number of articles that in 2017–2022 addressed a particular hardware of sensor node (upper part) or fog node (lower part) in fog computing e-health applications.</p>
</caption>
<graphic xlink:href="infor525_g007.jpg"/>
</table-wrap>
<p>The main trends of significant term use are shown in Fig. <xref rid="j_infor525_fig_005">5</xref>(a) using a line fitting to-data technique. From the figure it is clear that one of the five significant terms – “sensor” is trending. The increase in the usage of the terms “smartphone” and “MCU” was minimal (which peaked in the last three years) and the decrease in the usage of the term “sensor node” was also minimal (which peaked in 2020). Only the trend of usage of the term “network module” (which peaked in 2019) was decreasing.</p>
<fig id="j_infor525_fig_005">
<label>Fig. 5</label>
<caption>
<p>Total annual mentions of significant terms of hardware node type and their linear approximation.</p>
</caption>
<graphic xlink:href="infor525_g008.jpg"/>
</fig>
<p><italic>Fog node hardware.</italic> In total, 9 most common terms describing fog node hardware in fog computing e-health applications were chosen and used. The lower part of Table <xref rid="j_infor525_tab_003">3</xref> summarises the results on these terms appearing in a representative set of articles. There are six significant fog node hardware-related terms (outlined by a horizontal line in the table) in the literature on fog computing e-health applications: single board computers (SBC), specialised fog nodes, more powerful personal computers (PC), microcontroller units (MCU), smartphones and network modules. “SBC” is the most commonly used term in articles, with a number of uses up to five times as low as any other term considered. All significant terms use maximum numbers (marked with the grey background in the table) which vary from 4 to 16 times and appear from 2018 to 2022.</p>
<p>The main trends of significant terms use are shown in Fig. <xref rid="j_infor525_fig_005">5</xref>(b) using a line fitting to-data technique. From the figure it is evident that two of the six significant terms are trending, the use of terms “fog node” and “PC” during the years 2017–2022 is increasing. The decrease of the usage of terms “SBC”, “MCU” and “smartphone” was minimal, while the usage of “network module” decreased significantly.</p>
</sec>
<sec id="j_infor525_s_014">
<label>3.1.4</label>
<title>Information Technologies Perspective</title>
<p>Network resources in the three-tier fog architecture can exist near edge devices in the dedicated fog equipment or within edge devices. This complexity requires the development of middleware that can manage the common pool of device resources, allocate them to application workloads, and work with various network connectivity and data processing technologies.</p>
<p>In total, 14 most common terms describing information technologies in fog computing e-health applications were chosen and used to get a view of the fourth perspective. Table <xref rid="j_infor525_tab_004">4</xref> summarises the results on these terms that appear in a representative set of articles.</p>
<table-wrap id="j_infor525_tab_004">
<label>Table 4</label>
<caption>
<p>The number of articles that in 2017–2022 addressed particular information technology in fog computing e-health applications.</p>
</caption>
<graphic xlink:href="infor525_g009.jpg"/>
</table-wrap>
<p>The table data grounds that there are only six significant information technologies-related terms (distinguished from the rest by a horizontal line) in the literature on fog computing e-health applications: networks, machine learning, neural networks, protocols, computational intelligence and data encryption. “Network” is the term most frequently used in articles, with a number of up to four times as low as any other term considered. All significant terms use maximum numbers (marked with the grey background) that vary from 19 to 81 times and appear from 2018 to 2022.</p>
<fig id="j_infor525_fig_006">
<label>Fig. 6</label>
<caption>
<p>Total annual mentions of significant information technology terms and their linear approximation.</p>
</caption>
<graphic xlink:href="infor525_g010.jpg"/>
</fig>
<p>The main trends of significant term use are shown in Fig. <xref rid="j_infor525_fig_006">6</xref> using a line fitting to-data technique. From the pictorial representation in the figure it is clear that three of the six significant terms are trending, the use of the terms “machine learning”, “neural network” and “computational intelligence” during the years 2017–2022 is increasing. The increase in the usage of the terms “data encryption”, “network” and “protocol” was minimal (whose use in 2022, 2019 and 2018 peaked accordingly).</p>
</sec>
<sec id="j_infor525_s_015">
<label>3.1.5</label>
<title>Mobility with Autonomy Perspective</title>
<p>With the rapidly increasing number of mobile and handheld devices, current computing architectures require computation over anywhere, anytime, and anything connectivity. As people and the computing nodes they use may be mobile, mobility is a barrier to computing in the fog computing environment because some of the data can also be stored at fixed locations. Therefore, the researchers are working on developing solutions for handling mobility, load balancing, task and services migration.</p>
<p>Mobility is one of the newest and least researched aspects of e-health fog computing. Two main groups can be distinguished: mobility of the device or of the service. The types of mobility devices present in the literature include wearable IoT devices or vehicle IoT nodes that can establish a connection with fog nodes distributed in the area.</p>
<p>In total, five most common terms describing mobility with autonomy in fog computing e-health applications were chosen and used to get a view of the fifth perspective. Table <xref rid="j_infor525_tab_005">5</xref> summarises the results on these terms that appear in a representative set of articles.</p>
<table-wrap id="j_infor525_tab_005">
<label>Table 5</label>
<caption>
<p>The number of articles that in 2017–2022 addressed a particular mobility with autonomy in fog computing e-health applications.</p>
</caption>
<graphic xlink:href="infor525_g011.jpg"/>
</table-wrap>
<p>There are two significant terms related to mobility and autonomy in the literature on fog computing e-health applications: wearable IoT devices and vehicle IoT nodes. “Wearable IoT device” is the term most frequently used in articles, with a number of up to three times lower than any other term considered. All significant terms use maximum numbers (on the grey background) that vary from 3 to 8 times and appear from 2020 to 2022.</p>
<fig id="j_infor525_fig_007">
<label>Fig. 7</label>
<caption>
<p>Total annual mentions of significant terms of mobility with autonomy and their linear approximation.</p>
</caption>
<graphic xlink:href="infor525_g012.jpg"/>
</fig>
<p>The main trends of significant term use are shown in Fig. <xref rid="j_infor525_fig_007">7</xref>. From the figure it is clear that one term is trending, even though the use of the term “wearable IoT device” drops in 2021. On the contrary, the increase in the use of the term “vehicle IoT node” is minimal and decreases in years 2019 and 2022, respectively.</p>
</sec>
</sec>
<sec id="j_infor525_s_016">
<label>3.2</label>
<title>The Benefits of Using Artificial Intelligence Techniques for Fog Computing in E-Health</title>
<p>The most important subfields of AI for fog computing e-health applications that we identified are computational intelligence, machine learning and neural networks. Therefore, we present an answer to the second research question from these three perspectives.</p>
<sec id="j_infor525_s_017">
<label>3.2.1</label>
<title>Computational Intelligence Methods</title>
<p>Computational intelligence (CI) uses a combination of five main paradigms (Engelbrecht, <xref ref-type="bibr" rid="j_infor525_ref_039">2007</xref>): fuzzy logic, artificial neural networks, evolutionary computing, swarm intelligence, and artificial immune systems. In addition to these paradigms, probabilistic methods are frequently used together with CI techniques, which help deal with uncertainty or imprecision. Due to the popularity and large nomenclature of artificial neural networks, we made the decision to analyse this subset separately.</p>
<table-wrap id="j_infor525_tab_006">
<label>Table 6</label>
<caption>
<p>The total number of articles that use a particular CI term.</p>
</caption>
<graphic xlink:href="infor525_g013.jpg"/>
</table-wrap>
<p>Table <xref rid="j_infor525_tab_006">6</xref> presents a list of CI techniques that were applied during our period of investigation of fog computing in e-health. The data in the table are sorted in decreasing order of technique use times, and the statistically significant terms are separated by line. The data point to six significant techniques from 17 in total. Each significant application of the technique was explored in 6 to 20 articles. Moreover, it becomes clear that fuzzy logic based techniques – FS, FKNN, and FCM cover nearly 45%, the sum of all significant applications.</p>
<table-wrap id="j_infor525_tab_007">
<label>Table 7</label>
<caption>
<p>Benefits of using CI techniques for fog computing in e-health applications.</p>
</caption>
<graphic xlink:href="infor525_g014.jpg"/>
</table-wrap>
<p>The benefits of using CI techniques for fog computing in e-health applications are revealed in Table <xref rid="j_infor525_tab_007">7</xref>. Here data from articles about comparative research of CI techniques are summarised – listing achieved accuracy, e-health application, investigated and the best techniques (marked with the grey background). According to Section <xref rid="j_infor525_s_008">2.6</xref>, all results are sorted in decreasing order of accuracy. It appears that all the eight best CI techniques – BBM, FHMM, BBN, FCM, FKNN, F-AMLF, W-NB, and HMM, achieve accuracies of 91.41% to 97.53%. Apparently, only BBN, FCM, FKNN and W-NB are significant terms (see Table <xref rid="j_infor525_tab_006">6</xref> text on the grey background and above the line). However, the best techniques BBM, FHMM, F-AMLF and HMM require more attention from researchers.</p>
</sec>
<sec id="j_infor525_s_018">
<label>3.2.2</label>
<title>Machine Learning Methods</title>
<p>Machine learning (ML) is a subfield of AI. With ML algorithms, a model is built based on sample data, known as training data, to make predictions or decisions. A subset of ML is also related to computational statistics, which focuses on making predictions using computers, but not all ML is statistical learning. The ML field is also impacted by mathematical optimisation theory that delivers methods and applications to the domain.</p>
<p>Table <xref rid="j_infor525_tab_008">8</xref> presents a list of ML techniques that were applied in the 2017–2022 period for fog computing in e-health. According to Section <xref rid="j_infor525_s_008">2.6</xref>, the data in the table are sorted in decreasing order of technique use times, and the statistically significant terms are separated by line. The data points to five significant techniques out of 33 in total. The applications of each significant technique – SVM, DT, NN, ML, and RF – were explored in 14 to 42 articles. SVM is the most commonly used technique and covers 30% of all significant applications. Apparently, the term “machine learning” that is too general in our context scores fourth.</p>
<table-wrap id="j_infor525_tab_008">
<label>Table 8</label>
<caption>
<p>The total number of articles that use a particular ML term.</p>
</caption>
<graphic xlink:href="infor525_g015.jpg"/>
</table-wrap>
<p>The benefits of using ML techniques for fog computing in e-health applications are shown in Table <xref rid="j_infor525_tab_009">9</xref>. Here data from articles about ML techniques comparative research is summarised by listing achieved accuracy, e-health application, investigated and the best techniques (shown on the grey background). The data are sorted in decreasing accuracy order.</p>
<table-wrap id="j_infor525_tab_009">
<label>Table 9</label>
<caption>
<p>Benefits of using ML techniques for fog computing in e-health applications.</p>
</caption>
<graphic xlink:href="infor525_g016.jpg"/>
</table-wrap>
<p>The table data clarify that all of the best 11 ML techniques – SVM, KNN, self-trained SVSL, RF, EN, HEHCRC, RC, J48 DT, MW, REPT, and AdaBoost – achieve accuracies from 79.10% to 99.84%. Apparently, only SVM, KNN, RF, J48 DT, and REPT are significant terms (see the text in Table <xref rid="j_infor525_tab_008">8</xref> on the grey background), i.e. fairly addressed in the analyses. Thus, self-trained SVSL, EN, HEHCRC, RC, MW, and AdaBoost require more attention from researchers working in fog computing.</p>
</sec>
<sec id="j_infor525_s_019">
<label>3.2.3</label>
<title>Neural Network Methods</title>
<p>Artificial neural networks (ANN) or neural networks (NN), are computing systems inspired by the biological neurons of brains. An ANN is based on an artificial neuron that receives and processes signals and can signal other neurons connected to it. Typically, they are aggregated into layers, the number of which determines the depth of the NN.</p>
<p>Similarly to previous sections, Table <xref rid="j_infor525_tab_010">10</xref> presents a list of ANN techniques that were applied during our period of investigation of fog computing in e-health, while Table <xref rid="j_infor525_tab_011">11</xref> shows the benefits of using ANN techniques for fog computing in e-health applications.</p>
<table-wrap id="j_infor525_tab_010">
<label>Table 10</label>
<caption>
<p>The total number of articles that use a particular ANN term.</p>
</caption>
<graphic xlink:href="infor525_g017.jpg"/>
</table-wrap>
<table-wrap id="j_infor525_tab_011">
<label>Table 11</label>
<caption>
<p>Benefitsof using ANN for fog computing in e-health applications.</p>
</caption>
<graphic xlink:href="infor525_g018.jpg"/>
</table-wrap>
<p>The data in Table <xref rid="j_infor525_tab_010">10</xref> point to seven significant techniques (separated by line) – ANN, CNN, LSTM, RNN, DNN, MLP, and Deep Learning – from 20 in total. Each significant application of the technique was explored in 8 to 34 articles. Distinctively, here the term “Artificial neural network” scores first and its usage is 27% of all significant applications. Apparently, the term “deep learning” that is too general in our context scores seventh.</p>
<p>Data from articles on comparative research on ANN techniques are summarised in Table <xref rid="j_infor525_tab_011">11</xref>. Here, as previously, achieved accuracy of e-health application, investigated, and the best techniques (marked with the grey background) are listed. According to Section <xref rid="j_infor525_s_008">2.6</xref>, all results are sorted in decreasing order of accuracy.</p>
<p>It appears that all the best 20 ANN techniques achieve accuracies from 84.88% to 99.86%. Apparently, only CNN, DNN, ANN-BP, ANN, DHNN, t-CNN, t-ANN, MLSTM, ACNN, RNN, ANN-CBR, Bidirectional LSTM, and Stacked LSTM are significant terms (see Table <xref rid="j_infor525_tab_010">10</xref> text on the grey background), i.e. fairly addressed in the analysed publications. Thus, more attention from researchers working in fog computing requires such techniques as MLNN, GSO-CCNN, Auto-IF, ANFIS-GA, FS-ANFIS, CCO-CSVM and ANFIS.</p>
</sec>
</sec>
</sec>
<sec id="j_infor525_s_020">
<label>4</label>
<title>Discussion</title>
<p>Here, the most recent review articles that deal with research in fog computing e-health applications are summarised. Some outcomes of the literature review articles are given in comparison with our findings. Finally, the limitations of our work and conclusions are presented.</p>
<sec id="j_infor525_s_021">
<label>4.1</label>
<title>Summary of Evidence</title>
<p>To position this systematic review among other review articles, we have created a classification of the most recent review articles that investigated the fog computing paradigm and present it in Table <xref rid="j_infor525_tab_012">12</xref>. We have chosen to analyse three recent years (from 2020 to 2022) because it is more likely that review authors have researched similar articles as us, and in that way, it also makes it easier to compare all findings. We have classified the review articles into three main themes: the first being relevant to all our chosen analysis perspectives, the second – architectures and design principles, and the third – taxonomy. Further discussion will be based on the review articles presented in the first row of the table.</p>
<table-wrap id="j_infor525_tab_012">
<label>Table 12</label>
<caption>
<p>Review articles from 2020 to 2022 dealing with research in fog computing e-health applications.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Main topic</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Review articles</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Services, software, hardware, information technologies, mobility with autonomy</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Doghri <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_036">2022</xref>); Yaqoob <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_110">2022</xref>); Khan <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_060">2022b</xref>); Raoof and Durai (<xref ref-type="bibr" rid="j_infor525_ref_087">2022</xref>); Kashyap <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_056">2022</xref>); Singh <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_098">2022</xref>); Alekseeva <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_012">2022</xref>); Arora <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_017">2022</xref>); Shirvanian <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_095">2022</xref>); Hayyolalam <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_049">2022</xref>); Ahmad <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_005">2022</xref>); Javaid <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_052">2022</xref>); Ali <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_013">2022</xref>); Alkhateeb <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_014">2022</xref>); Douch <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_037">2022</xref>); Khan <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_059">2022a</xref>,c); Quy <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_085">2022</xref>); Kashani <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_055">2021</xref>); Ahmadi <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_006">2021</xref>); Oh <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_078">2021</xref>); Dhaou <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_035">2021</xref>); Krishnamoorthy <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_063">2023</xref>); QingQingChang <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_083">2021</xref>); Khan <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_061">2021</xref>); Erhan <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_040">2021</xref>); Amin and Hossain (<xref ref-type="bibr" rid="j_infor525_ref_016">2021</xref>); Silva and Sofia (<xref ref-type="bibr" rid="j_infor525_ref_096">2020</xref>); Obaidat <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_077">2020</xref>); Silva <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_097">2020</xref>); Qiu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_084">2020</xref>); Kaur <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_058">2020b</xref>,a); Swamy and Kota (<xref ref-type="bibr" rid="j_infor525_ref_105">2020</xref>); Uslu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_106">2020</xref>); Younan <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_111">2020</xref>); Prabhu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_082">2020</xref>); de Moura Costa <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_033">2020</xref>); Al-Jaroodi <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_008">2020</xref>); Aceto <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_002">2020</xref>); Naresh <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_074">2020</xref>); Bansal and Kumar (<xref ref-type="bibr" rid="j_infor525_ref_021">2020</xref>); Vilela <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_108">2020</xref>); Nauman <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_075">2020</xref>); de Prado <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_034">2020</xref>); Behmanesh <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_022">2020</xref>); Farahani <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_041">2020</xref>)</td>
</tr>
</tbody><tbody>
<tr>
<td style="vertical-align: top; text-align: left">Architectures and design principles</td>
<td style="vertical-align: top; text-align: left">Doghri <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_036">2022</xref>); Alekseeva <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_012">2022</xref>); Peng <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_080">2022</xref>); Javaid <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_052">2022</xref>); Ali <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_013">2022</xref>); Douch <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_037">2022</xref>); Hajam and Sofi (<xref ref-type="bibr" rid="j_infor525_ref_048">2021</xref>); Sisodia and Jindal (<xref ref-type="bibr" rid="j_infor525_ref_101">2021</xref>); Xue <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_109">2021</xref>); Krishnamoorthy <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_063">2023</xref>); Amin and Hossain (<xref ref-type="bibr" rid="j_infor525_ref_016">2021</xref>); Obaidat <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_077">2020</xref>); Swamy and Kota (<xref ref-type="bibr" rid="j_infor525_ref_105">2020</xref>); Uslu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_106">2020</xref>); Ahmad <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_004">2020</xref>); Younan <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_111">2020</xref>); Qiu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_084">2020</xref>); Badidi <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_019">2020</xref>); Fu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_042">2020</xref>); Aazam <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_001">2020</xref>); Naresh <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_074">2020</xref>); Bansal and Kumar (<xref ref-type="bibr" rid="j_infor525_ref_021">2020</xref>); Vilela <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_108">2020</xref>); Nauman <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_075">2020</xref>); de Prado <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_034">2020</xref>)</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Taxonomy</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Khan <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_060">2022b</xref>); Arora <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_017">2022</xref>); Hayyolalam <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_049">2022</xref>); Chaudjary <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_032">2022</xref>); Singh <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_099">2021</xref>); Kashani <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_055">2021</xref>); Oh <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_078">2021</xref>); Sadri <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_091">2021</xref>); Babar <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_018">2021</xref>); Obaidat <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_077">2020</xref>); Silva <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_097">2020</xref>); Swamy and Kota (<xref ref-type="bibr" rid="j_infor525_ref_105">2020</xref>); Uslu <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_106">2020</xref>); Javadzadeh and Rahmani (<xref ref-type="bibr" rid="j_infor525_ref_051">2020</xref>); de Moura Costa <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_033">2020</xref>); Naresh <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_074">2020</xref>); Bansal and Kumar (<xref ref-type="bibr" rid="j_infor525_ref_021">2020</xref>); Vilela <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_108">2020</xref>); Nauman <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_075">2020</xref>); Behmanesh <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_022">2020</xref>)</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>In general, we have noticed that it is very common for most review articles to present lists and descriptions compiling scientific articles about applications, making conclusions on recent and future trends, research directions, open issues, and challenges. In many cases, only the total number of articles is given, while subjective analysis is done only on the most important works. We position this review as systematic and quantitative because it surveys fog computing e-health applications from carefully chosen perspectives, identifies recent trends, and finds benefits of using AI relying on yearly usage of formal terms. Furthermore, the benefits of using AI are elucidated using comparative research articles in selected AI subfields. Thus, our article is original and important to researchers.</p>
<p>In line with the first question Q1, analysing from <italic>a software perspective</italic> similarly to us, other authors have identified as important topics – virtualisation (Sisodia and Jindal, <xref ref-type="bibr" rid="j_infor525_ref_101">2021</xref>), deployment of medical IoT applications in the cloud (de Moura Costa <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_033">2020</xref>; Behmanesh <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_022">2020</xref>), operating systems and programming languages (Behmanesh <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_022">2020</xref>), although Sisodia and Jindal (<xref ref-type="bibr" rid="j_infor525_ref_101">2021</xref>) identified additional aspects such as interoperability, decentralisation, real-time capability, service orientation, and modularity.</p>
<p>Looking from <italic>a hardware perspective</italic>, other authors have also identified the sensor node (Kashani <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_055">2021</xref>) and fog node (de Moura Costa <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_033">2020</xref>) categories, and the importance of microcontrollers and development boards (Behmanesh <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_022">2020</xref>).</p>
<p>Analysing from <italic>an information technology perspective</italic> similar to us, other authors classified technologies into four categories:</p>
<list>
<list-item id="j_infor525_li_016">
<label>1.</label>
<p>Services (de Moura Costa <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_033">2020</xref>), interoperability (Ahmadi <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_006">2021</xref>) and offloading (Alekseeva <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_012">2022</xref>).</p>
</list-item>
<list-item id="j_infor525_li_017">
<label>2.</label>
<p>Data collection, storage, processing (Javadzadeh and Rahmani, <xref ref-type="bibr" rid="j_infor525_ref_051">2020</xref>; de Moura Costa <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_033">2020</xref>; Vilela <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_108">2020</xref>; Behmanesh <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_022">2020</xref>; Oh <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_078">2021</xref>; Sadri <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_091">2021</xref>; Shirvanian <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_095">2022</xref>), and analysis (near the origin of data and in the cloud) using big data analytics (Vilela <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_108">2020</xref>; Kashani <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_055">2021</xref>; Ahmadi <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_006">2021</xref>; Oh <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_078">2021</xref>; Krishnamoorthy <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_063">2023</xref>; Sadri <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_091">2021</xref>).</p>
</list-item>
<list-item id="j_infor525_li_018">
<label>3.</label>
<p>Networks (Javadzadeh and Rahmani, <xref ref-type="bibr" rid="j_infor525_ref_051">2020</xref>; Ali <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_013">2022</xref>) including software-defined networking (Krishnamoorthy <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_063">2023</xref>), communication standards (Behmanesh <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_022">2020</xref>; Kashani <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_055">2021</xref>; Ahmadi <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_006">2021</xref>), and protocols (de Moura Costa <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_033">2020</xref>; Behmanesh <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_022">2020</xref>).</p>
</list-item>
<list-item id="j_infor525_li_019">
<label>4.</label>
<p>Security (de Moura Costa <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_033">2020</xref>; Kashani <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_055">2021</xref>; Ahmadi <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_006">2021</xref>; Krishnamoorthy <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_063">2023</xref>; Sadri <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_091">2021</xref>) and privacy (Javadzadeh and Rahmani, <xref ref-type="bibr" rid="j_infor525_ref_051">2020</xref>), including anonymisation of data (Oh <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_078">2021</xref>).</p>
</list-item>
</list>
<p>From <italic>a mobility with autonomy perspective</italic>, Behmanesh <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_022">2020</xref>); Hayyolalam <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_049">2022</xref>) also identified wearable technology in medicine as an important area with an emphasis on medical sensors and Javaid <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_052">2022</xref>) emphasised mobile computing.</p>
<p>The authors, who were researching topics similar to our second research question Q2, were seeing the benefits of ML, focussing on its application in database administration, fitness monitoring, real-time health tracking, network QoS and the brain-computer interface (Krishnamoorthy <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor525_ref_063">2023</xref>). The move of AI to the edge and fog to compensate for cloud weaknesses and reduce latency was analysed by Greco <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_045">2020</xref>); Ali <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_013">2022</xref>). Myoung Lee <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_072">2018</xref>) suggested that AI would work as a microservice. Gopal <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_044">2019</xref>) emphasised that value-based AI in healthcare working in intelligent systems is an important part of digital transformation. Chamola <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor525_ref_031">2020</xref>) stressed the importance of AI solutions during the Covid-19 pandemic. We also found a survey article on IoT and AI-based smart healthcare (Alshehri and Muhammad, <xref ref-type="bibr" rid="j_infor525_ref_015">2021</xref>) that tried to collect the accuracy of the technique when conducting their literature research, although it was not that consistent compared to our research due to the varying metrics of the accuracy data collected.</p>
</sec>
<sec id="j_infor525_s_022">
<label>4.2</label>
<title>Limitations</title>
<p>This systematic analysis of the literature aimed to provide a comprehensive review in which the analysis was based on the specific terms and the number of articles in which they appeared. However, some limitations of this study should be noted: 
<list>
<list-item id="j_infor525_li_020">
<label>•</label>
<p>only the literature directly related to fog and health terms was analysed;</p>
</list-item>
<list-item id="j_infor525_li_021">
<label>•</label>
<p>only Web of Science indexed journal articles were considered;</p>
</list-item>
<list-item id="j_infor525_li_022">
<label>•</label>
<p>non-English articles have been ignored;</p>
</list-item>
<list-item id="j_infor525_li_023">
<label>•</label>
<p>we reviewed only articles to which we had full access to;</p>
</list-item>
<list-item id="j_infor525_li_024">
<label>•</label>
<p>employed categorisation of terms is original even though in part it is similar to the other taxonomies proposed in alternative reviews.</p>
</list-item>
</list>
</p>
</sec>
<sec id="j_infor525_s_023">
<label>4.3</label>
<title>Conclusions</title>
<p>To provide a computer scientist with a detailed analysis of the latest research on fog computing in e-health, 1222 articles published between 2017 and 2022 were evaluated, resulting in 374 relevant articles that were later systematically analysed.</p>
<p>The first research question – “What are the recent trends and focus areas in fog computing e-health applications?” is answered from five perspectives:</p>
<list>
<list-item id="j_infor525_li_025">
<label>•</label>
<p>from <italic>a services perspective</italic>, framework, data security, alert generation, and prediction are trending, while monitoring service research is booming and architecture trend is minimally increasing;</p>
</list-item>
<list-item id="j_infor525_li_026">
<label>•</label>
<p>from <italic>a software perspective</italic>, cloud and simulators are trending, research on programming languages is booming, machine learning and framework trends are minimally increasing, while research using operating systems term is decreasing;</p>
</list-item>
<list-item id="j_infor525_li_027">
<label>•</label>
<p>from <italic>a hardware perspective</italic>, research of sensor nodes including sensors; fog nodes including specialised fog nodes and personal computers is booming. Interest on sensor nodes including smartphones, microcontroller units and specialised sensor nodes is low, as well as fog node including single board computers, microcontroller units and smartphones with minimal interest decrease. With both hardware types, network module specification is decreasing;</p>
</list-item>
<list-item id="j_infor525_li_028">
<label>•</label>
<p>from <italic>an information technologies perspective</italic>, ML, ANN and CI uses are trending, when interest increase in data encryption, network and protocols was minimal, at the same time network related research is prevailing;</p>
</list-item>
<list-item id="j_infor525_li_029">
<label>•</label>
<p>from <italic>a mobility with autonomy perspective</italic>, wearable IoT devices are trending whereas vehicle IoT node usage is minimal.</p>
</list-item>
</list>
<p>The second research question – “What are the benefits of using AI techniques for fog computing in e-health?” is answered from three perspectives: 
<list>
<list-item id="j_infor525_li_030">
<label>•</label>
<p>from <italic>a computational intelligence perspective</italic>, the research concentrates on BBN, FCM, FKNN, and W-NB together with the more attention required for BBM, FHMM, F-AMLF, and HMM, delivering the best results with the highest accuracy: 97.53% with BBM in healthcare service quality classification; 97% with FHMM in health status prediction; 96.5% with BBN in health severity classification; 91.41% with HMM in health condition identification;</p>
</list-item>
<list-item id="j_infor525_li_031">
<label>•</label>
<p>from <italic>a machine learning perspective</italic>, fairly addressed in publications SVM, KNN, RF, J48 DT, and REPT together with more attention required self-trained SVSL, EN, HEHCRC, RC, MW, and AdaBoost are delivering the best results with the highest accuracy: 99.84% with SVM in panic health status classification; 98.70% with KNN in heartbeat detection; 97.59% with Self-Trained SVSL in activity recognition;</p>
</list-item>
<list-item id="j_infor525_li_032">
<label>•</label>
<p>from <italic>the artificial neural networks perspective</italic>, fairly addressed in publications CNN, DNN, ANN-BP, ANN, DHNN, t-CNN, t-ANN, MLSTM, ACNN, RNN, ANN-CBR, Bidirectional LSTM, and Stacked LSTM, together with more attention required MLNN, GSO-CCNN, Auto-IF, ABFIS-GA, FS-ANFIS, CCO-CSVM, and ANFIS, deliver the best results with the highest accuracy: 99.86% with CNN in fall detection; 99.86% with DNN in patient condition recognition; 98.99% with ANN-BP in categorization of severity of patients’ health status; 98.48% with ANN in skin image classification; 97.60% with DHNN in task scheduling; 97.50% with MLNN in breast cancer prediction.</p>
</list-item>
</list>
</p>
</sec>
</sec>
<sec id="j_infor525_s_024">
<title>Bibliography availability statement</title>
<p>A full bibliography (as a separate file) is available upon request.</p>
</sec>
</body>
<back>
<ref-list id="j_infor525_reflist_001">
<title>References</title>
<ref id="j_infor525_ref_001">
<mixed-citation publication-type="journal"><string-name><surname>Aazam</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Zeadally</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Harras</surname>, <given-names>K.A.</given-names></string-name> (<year>2020</year>). <article-title>Health fog for smart healthcare</article-title>. <source>IEEE Consumer Electronics Magazine</source>, <volume>9</volume>(<issue>2</issue>), <fpage>96</fpage>–<lpage>102</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/mce.2019.2953749" xlink:type="simple">https://doi.org/10.1109/mce.2019.2953749</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_002">
<mixed-citation publication-type="journal"><string-name><surname>Aceto</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Persico</surname>, <given-names>V.</given-names></string-name>, <string-name><surname>Pescapé</surname>, <given-names>A.</given-names></string-name> (<year>2020</year>). <article-title>Industry 4.0 and health: internet of things, big data, and cloud computing for Healthcare 4.0</article-title>. <source>Journal of Industrial Information Integration</source>, <volume>18</volume>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.jii.2020.100129" xlink:type="simple">https://doi.org/10.1016/j.jii.2020.100129</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_003">
<mixed-citation publication-type="journal"><string-name><surname>Ahanger</surname>, <given-names>T.A.</given-names></string-name>, <string-name><surname>Bhatia</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Aljumah</surname>, <given-names>A.</given-names></string-name> (<year>2022</year>). <article-title>Game-theory-inspired novel mechanism for assessing healthcare quality</article-title>. <source>IEEE Internet of Things Journal</source>, <volume>9</volume>(<issue>24</issue>), <fpage>24856</fpage>–<lpage>24865</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/jiot.2022.3194854" xlink:type="simple">https://doi.org/10.1109/jiot.2022.3194854</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_004">
<mixed-citation publication-type="journal"><string-name><surname>Ahmad</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Afzal</surname>, <given-names>M.M.</given-names></string-name>, <string-name><surname>ALharbi</surname>, <given-names>A.</given-names></string-name> (<year>2020</year>). <article-title>Big data analytics with fog computing in integrated cloud fog and IoT architecture for smart devices</article-title>. <source>International Journal of Computer Science and Network Security</source>, <volume>20</volume>(<issue>6</issue>), <fpage>171</fpage>–<lpage>177</lpage>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_005">
<mixed-citation publication-type="journal"><string-name><surname>Ahmad</surname>, <given-names>S.G.</given-names></string-name>, <string-name><surname>Iqbal</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Javaid</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Munir</surname>, <given-names>E.U.</given-names></string-name>, <string-name><surname>Kirn</surname>, <given-names>N.</given-names></string-name>, <string-name><surname>Jan</surname>, <given-names>S.U.</given-names></string-name>, <string-name><surname>Ramzan</surname>, <given-names>N.</given-names></string-name> (<year>2022</year>). <article-title>Sensing and artificial intelligent maternal-infant health care systems: a review</article-title>. <source>Sensors</source>, <volume>22</volume>(<issue>12</issue>), <fpage>4362</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/s22124362" xlink:type="simple">https://doi.org/10.3390/s22124362</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_006">
<mixed-citation publication-type="journal"><string-name><surname>Ahmadi</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Kashani</surname>, <given-names>M.H.</given-names></string-name>, <string-name><surname>Nikravan</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Mahdipour</surname>, <given-names>E.</given-names></string-name> (<year>2021</year>). <article-title>Fog-based healthcare systems: a systematic review</article-title>. <source>Multimedia Tools and Applications</source>, <volume>80</volume>(<issue>30</issue>), <fpage>36361</fpage>–<lpage>36400</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s11042-021-11227-x" xlink:type="simple">https://doi.org/10.1007/s11042-021-11227-x</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_007">
<mixed-citation publication-type="journal"><string-name><surname>Al-Fuqaha</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Guizani</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Mohammadi</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Aledhari</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Ayyash</surname>, <given-names>M.</given-names></string-name> (<year>2015</year>). <article-title>Internet of Things: a survey on enabling technologies, protocols, and applications</article-title>. <source>IEEE Communications Surveys &amp; Tutorials</source>, <volume>17</volume>(<issue>4</issue>), <fpage>2347</fpage>–<lpage>2376</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/COMST.2015.2444095" xlink:type="simple">https://doi.org/10.1109/COMST.2015.2444095</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_008">
<mixed-citation publication-type="journal"><string-name><surname>Al-Jaroodi</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Mohamed</surname>, <given-names>N.</given-names></string-name>, <string-name><surname>Abukhousa</surname>, <given-names>E.</given-names></string-name> (<year>2020</year>). <article-title>Health 4.0: on the way to realizing the healthcare of the future</article-title>. <source>IEEE Access</source>, <volume>8</volume>, <fpage>211189</fpage>–<lpage>211210</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/access.2020.3038858" xlink:type="simple">https://doi.org/10.1109/access.2020.3038858</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_009">
<mixed-citation publication-type="journal"><string-name><surname>Alabdulkreem</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>Alzahrani</surname>, <given-names>J.S.</given-names></string-name>, <string-name><surname>Eltahir</surname>, <given-names>M.M.</given-names></string-name>, <string-name><surname>Mohamed</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Hamza</surname>, <given-names>M.A.</given-names></string-name>, <string-name><surname>Motwakel</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Eldesouki</surname>, <given-names>M.I.</given-names></string-name>, <string-name><surname>Rizwanullah</surname>, <given-names>M.</given-names></string-name> (<year>2022</year>). <article-title>Cuckoo optimized convolution support vector machine for big health data processing</article-title>. <source>Computers, Materials &amp; Continua</source>, <volume>73</volume>(<issue>2</issue>), <fpage>3039</fpage>–<lpage>3055</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.32604/cmc.2022.029835" xlink:type="simple">https://doi.org/10.32604/cmc.2022.029835</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_010">
<mixed-citation publication-type="journal"><string-name><surname>Albeshri</surname>, <given-names>A.</given-names></string-name> (<year>2021</year>). <article-title>SVSL: a human activity recognition method using soft-voting and self-learning</article-title>. <source>Algorithms</source>, <volume>14</volume>(<issue>8</issue>), <fpage>245</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/a14080245" xlink:type="simple">https://doi.org/10.3390/a14080245</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_011">
<mixed-citation publication-type="journal"><string-name><surname>Aldaej</surname>, <given-names>A.</given-names></string-name> (<year>2022</year>). <article-title>IoT-inspired smart healthcare framework for diabetic patients: fog computing initiative</article-title>. <source>International Journal of Innovative Computing Information and Control</source>, <volume>18</volume>(<issue>3</issue>), <fpage>917</fpage>–<lpage>939</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.24507/ijicic.18.03.917" xlink:type="simple">https://doi.org/10.24507/ijicic.18.03.917</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_012">
<mixed-citation publication-type="journal"><string-name><surname>Alekseeva</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Ometov</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Arponen</surname>, <given-names>O.</given-names></string-name>, <string-name><surname>Lohan</surname>, <given-names>E.S.</given-names></string-name> (<year>2022</year>). <article-title>The future of computing paradigms for medical and emergency applications</article-title>. <source>Computer Science Review</source>, <volume>45</volume>, <fpage>100494</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.cosrev.2022.100494" xlink:type="simple">https://doi.org/10.1016/j.cosrev.2022.100494</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_013">
<mixed-citation publication-type="journal"><string-name><surname>Ali</surname>, <given-names>O.</given-names></string-name>, <string-name><surname>Ishak</surname>, <given-names>M.K.</given-names></string-name>, <string-name><surname>Bhatti</surname>, <given-names>M.K.L.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Kim</surname>, <given-names>K.-I.</given-names></string-name> (<year>2022</year>). <article-title>A comprehensive review of Internet of Things: technology stack, middlewares, and fog/edge computing interface</article-title>. <source>Sensors</source>, <volume>22</volume>(<issue>3</issue>), <fpage>995</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/s22030995" xlink:type="simple">https://doi.org/10.3390/s22030995</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_014">
<mixed-citation publication-type="journal"><string-name><surname>Alkhateeb</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Catal</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Kar</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Mishra</surname>, <given-names>A.</given-names></string-name> (<year>2022</year>). <article-title>Hybrid blockchain platforms for the Internet of Things (IoT): a systematic literature review</article-title>. <source>Sensors</source>, <volume>22</volume>(<issue>4</issue>), <fpage>1304</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/s22041304" xlink:type="simple">https://doi.org/10.3390/s22041304</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_015">
<mixed-citation publication-type="journal"><string-name><surname>Alshehri</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Muhammad</surname>, <given-names>G.</given-names></string-name> (<year>2021</year>). <article-title>A comprehensive survey of the Internet of Things (IoT) and AI-based smart healthcare</article-title>. <source>IEEE Access</source>, <volume>9</volume>, <fpage>3660</fpage>–<lpage>3678</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/access.2020.3047960" xlink:type="simple">https://doi.org/10.1109/access.2020.3047960</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_016">
<mixed-citation publication-type="journal"><string-name><surname>Amin</surname>, <given-names>S.U.</given-names></string-name>, <string-name><surname>Hossain</surname>, <given-names>M.S.</given-names></string-name> (<year>2021</year>). <article-title>Edge intelligence and Internet of Things in healthcare: a survey</article-title>. <source>IEEE Access</source>, <volume>9</volume>, <fpage>45</fpage>–<lpage>59</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/access.2020.3045115" xlink:type="simple">https://doi.org/10.1109/access.2020.3045115</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_017">
<mixed-citation publication-type="journal"><string-name><surname>Arora</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Gupta</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Anpalagan</surname>, <given-names>A.</given-names></string-name> (<year>2022</year>). <article-title>Evolution and adoption of next generation IoT-driven health care 4.0 systems</article-title>. <source>Wireless Personal Communications</source>, <volume>127</volume>(<issue>4</issue>), <fpage>3533</fpage>–<lpage>3613</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s11277-022-09932-3" xlink:type="simple">https://doi.org/10.1007/s11277-022-09932-3</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_018">
<mixed-citation publication-type="journal"><string-name><surname>Babar</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>M.S.</given-names></string-name>, <string-name><surname>Ali</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Imran</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Shoaib</surname>, <given-names>M.</given-names></string-name> (<year>2021</year>). <article-title>Cloudlet computing: recent advances, taxonomy, and challenges</article-title>. <source>IEEE Access</source>, <volume>9</volume>, <fpage>29609</fpage>–<lpage>29622</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/access.2021.3059072" xlink:type="simple">https://doi.org/10.1109/access.2021.3059072</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_019">
<mixed-citation publication-type="journal"><string-name><surname>Badidi</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>Mahrez</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Sabir</surname>, <given-names>E.</given-names></string-name> (<year>2020</year>). <article-title>Fog computing for smart cities’ big data management and analytics: a review</article-title>. <source>Future Internet</source>, <volume>12</volume>(<issue>11</issue>), <fpage>190</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/fi12110190" xlink:type="simple">https://doi.org/10.3390/fi12110190</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_020">
<mixed-citation publication-type="journal"><string-name><surname>Bagula</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Mandava</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Bagula</surname>, <given-names>H.</given-names></string-name> (<year>2018</year>). <article-title>A framework for healthcare support in the rural and low income areas of the developing world</article-title>. <source>Journal of Network and Computer Applications</source>, <volume>120</volume>, <fpage>17</fpage>–<lpage>29</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.jnca.2018.06.010" xlink:type="simple">https://doi.org/10.1016/j.jnca.2018.06.010</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_021">
<mixed-citation publication-type="journal"><string-name><surname>Bansal</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Kumar</surname>, <given-names>D.</given-names></string-name> (<year>2020</year>). <article-title>IoT ecosystem: a survey on devices, gateways, operating systems, middleware and communication</article-title>. <source>International Journal of Wireless Information Networks</source>, <volume>27</volume>(<issue>3</issue>), <fpage>340</fpage>–<lpage>364</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s10776-020-00483-7" xlink:type="simple">https://doi.org/10.1007/s10776-020-00483-7</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_022">
<mixed-citation publication-type="journal"><string-name><surname>Behmanesh</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Sayfouri</surname>, <given-names>N.</given-names></string-name>, <string-name><surname>Sadoughi</surname>, <given-names>F.</given-names></string-name> (<year>2020</year>). <article-title>Technological features of Internet of Things in medicine: a systematic mapping study</article-title>. <source>Wireless Communications and Mobile Computing</source>, <volume>2020</volume>, <fpage>1</fpage>–<lpage>27</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1155/2020/9238614" xlink:type="simple">https://doi.org/10.1155/2020/9238614</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_023">
<mixed-citation publication-type="journal"><string-name><surname>Bhatia</surname>, <given-names>M.</given-names></string-name> (<year>2020</year>). <article-title>Fog computing-inspired smart home framework for predictive veterinary healthcare</article-title>. <source>Microprocessors and Microsystems</source>, <volume>78</volume>, <fpage>103227</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.micpro.2020.103227" xlink:type="simple">https://doi.org/10.1016/j.micpro.2020.103227</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_024">
<mixed-citation publication-type="journal"><string-name><surname>Bhatia</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Kumari</surname>, <given-names>S.</given-names></string-name> (<year>2022</year>). <article-title>A novel IoT-fog-cloud-based healthcare system for monitoring and reventing encephalitis</article-title>. <source>Cognitive Computation</source>. <volume>14</volume>, <fpage>1609</fpage>–<lpage>1626</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s12559-021-09856-3" xlink:type="simple">https://doi.org/10.1007/s12559-021-09856-3</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_025">
<mixed-citation publication-type="journal"><string-name><surname>Bhatia</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Sood</surname>, <given-names>S.K.</given-names></string-name> (<year>2019</year>). <article-title>Exploring temporal analytics in fog-cloud architecture for smart office healthcare</article-title>. <source>Mobile Networks and Applications</source>, <volume>24</volume>(<issue>4</issue>), <fpage>1392</fpage>–<lpage>1410</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s11036-018-0991-5" xlink:type="simple">https://doi.org/10.1007/s11036-018-0991-5</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_026">
<mixed-citation publication-type="journal"><string-name><surname>Bhatia</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Ahanger</surname>, <given-names>T.A.</given-names></string-name>, <string-name><surname>Tariq</surname>, <given-names>U.</given-names></string-name>, <string-name><surname>Ibrahim</surname>, <given-names>A.</given-names></string-name> (<year>2021</year>). <article-title>Cognitive intelligence in fog computing-inspired veterinary healthcare</article-title>. <source>Computers &amp; Electrical Engineering</source>, <volume>91</volume>, <fpage>107061</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.compeleceng.2021.107061" xlink:type="simple">https://doi.org/10.1016/j.compeleceng.2021.107061</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_027">
<mixed-citation publication-type="chapter"><string-name><surname>Bonomi</surname>, <given-names>F.</given-names></string-name> (<year>2011</year>). <chapter-title>Connected vehicles, the Internet of Things, and fog computing</chapter-title>. In: <source>The Eighth ACM International Workshop on Vehicular Inter-networking (VANET)</source>, <conf-loc>Las Vegas, USA</conf-loc>, pp. <fpage>13</fpage>–<lpage>15</lpage>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_028">
<mixed-citation publication-type="chapter"><string-name><surname>Bonomi</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Milito</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Zhu</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Addepalli</surname>, <given-names>S.</given-names></string-name> (<year>2012</year>). <chapter-title>Fog computing and its role in the Internet of Things</chapter-title>. In: <source>Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing</source>. <publisher-name>Association for Computing Machinery</publisher-name>, <publisher-loc>New York, USA</publisher-loc>, pp. <fpage>13</fpage>–<lpage>16</lpage>. <isbn>978-1-4503-1519-7</isbn>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1145/2342509.2342513" xlink:type="simple">https://doi.org/10.1145/2342509.2342513</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_029">
<mixed-citation publication-type="journal"><string-name><surname>Busaeed</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Katib</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Albeshri</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Corchado</surname>, <given-names>J.M.</given-names></string-name>, <string-name><surname>Yigitcanlar</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Mehmood</surname>, <given-names>R.</given-names></string-name> (<year>2022</year>). <article-title>LidSonic V2.0: a LiDAR and deep-learning-based green assistive edge device to enhance mobility for the visually impaired</article-title>. <source>Sensors</source>, <volume>22</volume>(<issue>19</issue>), <fpage>7435</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/s22197435" xlink:type="simple">https://doi.org/10.3390/s22197435</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_030">
<mixed-citation publication-type="journal"><string-name><surname>Chakraborty</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Kishor</surname>, <given-names>A.</given-names></string-name> (<year>2022</year>). <article-title>Real-time cloud-based patient-centric monitoring using computational health systems</article-title>. <source>IEEE Transactions on Computational Social Systems</source>, <volume>9</volume>(<issue>6</issue>), <fpage>1613</fpage>–<lpage>1623</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/tcss.2022.3170375" xlink:type="simple">https://doi.org/10.1109/tcss.2022.3170375</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_031">
<mixed-citation publication-type="journal"><string-name><surname>Chamola</surname>, <given-names>V.</given-names></string-name>, <string-name><surname>Hassija</surname>, <given-names>V.</given-names></string-name>, <string-name><surname>Gupta</surname>, <given-names>V.</given-names></string-name>, <string-name><surname>Guizani</surname>, <given-names>M.</given-names></string-name> (<year>2020</year>). <article-title>A comprehensive review of the COVID-19 pandemic and the role of IoT, drones, AI, blockchain, and 5G in managing its impact</article-title>. <source>IEEE Access</source>, <volume>8</volume>, <fpage>90225</fpage>–<lpage>90265</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/access.2020.2992341" xlink:type="simple">https://doi.org/10.1109/access.2020.2992341</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_032">
<mixed-citation publication-type="journal"><string-name><surname>Chaudjary</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Kakkar</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Gupta</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Tanwar</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Agrawal</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Sharma</surname>, <given-names>R.</given-names></string-name> (<year>2022</year>). <article-title>Blockchain and federated learning-based security solutions for telesurgery system: a comprehensive review</article-title>. <source>Turkish Journal of Electrical Engineering and Computer Sciences</source>, <volume>30</volume>(<issue>7</issue>), <fpage>2446</fpage>–<lpage>2488</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.55730/1300-0632.3950" xlink:type="simple">https://doi.org/10.55730/1300-0632.3950</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_033">
<mixed-citation publication-type="journal"><string-name><surname>de Moura Costa</surname>, <given-names>H.J.</given-names></string-name>, <string-name><surname>da Costa</surname>, <given-names>C.A.</given-names></string-name>, <string-name><surname>da Rosa Righi</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Antunes</surname>, <given-names>R.S.</given-names></string-name> (<year>2020</year>). <article-title>Fog computing in health: a systematic literature review</article-title>. <source>Health and Technology</source>, <volume>10</volume>(<issue>5</issue>), <fpage>1025</fpage>–<lpage>1044</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s12553-020-00431-8" xlink:type="simple">https://doi.org/10.1007/s12553-020-00431-8</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_034">
<mixed-citation publication-type="journal"><string-name><surname>de Prado</surname>, <given-names>R.P.</given-names></string-name>, <string-name><surname>García-Galán</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Muñoz-Expósito</surname>, <given-names>J.E.</given-names></string-name>, <string-name><surname>Marchewka</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Ruiz-Reyes</surname>, <given-names>N.</given-names></string-name> (<year>2020</year>). <article-title>Smart containers schedulers for microservices provision in cloud-fog-IoT networks. Challenges and opportunities</article-title>. <source>Sensors</source>, <volume>20</volume>(<issue>6</issue>). <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/s20061714" xlink:type="simple">https://doi.org/10.3390/s20061714</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_035">
<mixed-citation publication-type="journal"><string-name><surname>Dhaou</surname>, <given-names>I.B.</given-names></string-name>, <string-name><surname>Ebrahimi</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Ammar</surname>, <given-names>M.B.</given-names></string-name>, <string-name><surname>Bouattour</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Kanoun</surname>, <given-names>O.</given-names></string-name> (<year>2021</year>). <article-title>Edge devices for internet of medical things: technologies, techniques, and implementation</article-title>. <source>Electronics</source>, <volume>10</volume>(<issue>17</issue>), <fpage>2104</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/electronics10172104" xlink:type="simple">https://doi.org/10.3390/electronics10172104</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_036">
<mixed-citation publication-type="journal"><string-name><surname>Doghri</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Saddoud</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Fourati</surname>, <given-names>L.C.</given-names></string-name> (<year>2022</year>). <article-title>Cyber-physical systems for structural health monitoring: sensing technologies and intelligent computing</article-title>. <source>The Journal of Supercomputing</source>, <volume>78</volume>(<issue>1</issue>), <fpage>766</fpage>–<lpage>809</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s11227-021-03875-5" xlink:type="simple">https://doi.org/10.1007/s11227-021-03875-5</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_037">
<mixed-citation publication-type="journal"><string-name><surname>Douch</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Abid</surname>, <given-names>M.R.</given-names></string-name>, <string-name><surname>Zine-Dine</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Bouzidi</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Benhaddou</surname>, <given-names>D.</given-names></string-name> (<year>2022</year>). <article-title>Edge computing technology enablers: a systematic lecture study</article-title>. <source>IEEE Access</source>, <volume>10</volume>, <fpage>69264</fpage>–<lpage>69302</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/access.2022.3183634" xlink:type="simple">https://doi.org/10.1109/access.2022.3183634</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_038">
<mixed-citation publication-type="other"><string-name><surname>El-Hasnony</surname>, <given-names>I.M.</given-names></string-name>, <string-name><surname>Mostafa</surname>, <given-names>R.R.</given-names></string-name>, <string-name><surname>Elhoseny</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Barakat</surname>, <given-names>S.I.</given-names></string-name> (2020). Leveraging mist and fog for big data analytics in IoT environment. <italic>Transactions on Emerging Telecommunications Technologies</italic>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1002/ett.4057" xlink:type="simple">https://doi.org/10.1002/ett.4057</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_039">
<mixed-citation publication-type="book"><string-name><surname>Engelbrecht</surname>, <given-names>A.P.</given-names></string-name> (<year>2007</year>). <source>Computational Intelligence: An Introduction</source>. <edition>2nd edition</edition>, <publisher-name>Wiley</publisher-name>, <publisher-loc>West Sussex, UK</publisher-loc>, pp. <fpage>640</fpage>. <isbn>978-0-470-03561-0</isbn>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_040">
<mixed-citation publication-type="journal"><string-name><surname>Erhan</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Ndubuaku</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Mauro</surname>, <given-names>M.D.</given-names></string-name>, <string-name><surname>Song</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Fortino</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Bagdasar</surname>, <given-names>O.</given-names></string-name>, <string-name><surname>Liotta</surname>, <given-names>A.</given-names></string-name> (<year>2021</year>). <article-title>Smart anomaly detection in sensor systems: a multi-perspective review</article-title>. <source>Information Fusion</source>, <volume>67</volume>, <fpage>64</fpage>–<lpage>79</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.inffus.2020.10.001" xlink:type="simple">https://doi.org/10.1016/j.inffus.2020.10.001</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_041">
<mixed-citation publication-type="journal"><string-name><surname>Farahani</surname>, <given-names>B.</given-names></string-name>, <string-name><surname>Barzegari</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Aliee</surname>, <given-names>F.S.</given-names></string-name>, <string-name><surname>Shaik</surname>, <given-names>K.A.</given-names></string-name> (<year>2020</year>). <article-title>Towards collaborative intelligent IoT eHealth: from device to fog, and cloud</article-title>. <source>Microprocessors and Microsystems</source>, <volume>72</volume>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.micpro.2019.102938" xlink:type="simple">https://doi.org/10.1016/j.micpro.2019.102938</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_042">
<mixed-citation publication-type="journal"><string-name><surname>Fu</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Lv</surname>, <given-names>Q.</given-names></string-name>, <string-name><surname>Badrnejad</surname>, <given-names>R.G.</given-names></string-name> (<year>2020</year>). <article-title>Fog computing in health management processing systems</article-title>. <source>Kybernetes</source>, <volume>49</volume>(<issue>12</issue>), <fpage>2893</fpage>–<lpage>2917</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1108/k-09-2019-0621" xlink:type="simple">https://doi.org/10.1108/k-09-2019-0621</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_043">
<mixed-citation publication-type="journal"><string-name><surname>Ghosh</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Mukherjee</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Ghosh</surname>, <given-names>S.K.</given-names></string-name>, <string-name><surname>Buyya</surname>, <given-names>R.</given-names></string-name> (<year>2022</year>). <article-title>STOPPAGE: spatio-temporal data driven cloud-fog-edge computing framework for pandemic monitoring and management</article-title>. <source>Software: Practice and Experience</source>, <volume>52</volume>(<issue>12</issue>), <fpage>2700</fpage>–<lpage>2726</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1002/spe.3144" xlink:type="simple">https://doi.org/10.1002/spe.3144</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_044">
<mixed-citation publication-type="journal"><string-name><surname>Gopal</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Suter-Crazzolara</surname>, <given-names>C.</given-names></string-name>, <string-name><surname>Toldo</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Eberhardt</surname>, <given-names>W.</given-names></string-name> (<year>2019</year>). <article-title>Digital transformation in healthcare – architectures of present and future information technologies</article-title>. <source>Clinical Chemistry and Laboratory Medicine (CCLM)</source>, <volume>57</volume>(<issue>3</issue>), <fpage>328</fpage>–<lpage>335</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/doi:10.1515/cclm-2018-0658" xlink:type="simple">https://doi.org/doi:10.1515/cclm-2018-0658</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_045">
<mixed-citation publication-type="journal"><string-name><surname>Greco</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Percannella</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Ritrovato</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Tortorella</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Vento</surname>, <given-names>M.</given-names></string-name> (<year>2020</year>). <article-title>Trends in IoT based solutions for health care: moving AI to the edge</article-title>. <source>Pattern Recognition Letters</source>, <volume>135</volume>, <fpage>346</fpage>–<lpage>353</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.patrec.2020.05.016" xlink:type="simple">https://doi.org/10.1016/j.patrec.2020.05.016</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_046">
<mixed-citation publication-type="journal"><string-name><surname>Gu</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Niu</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Jin</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Yu</surname>, <given-names>S.</given-names></string-name> (<year>2020</year>). <article-title>FDFA: a fog computing assisted distributed analytics and detecting system for family activities</article-title>. <source>Peer-to-Peer Networking and Applications</source>, <volume>13</volume>(<issue>1</issue>), <fpage>38</fpage>–<lpage>52</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s12083-018-0714-5" xlink:type="simple">https://doi.org/10.1007/s12083-018-0714-5</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_047">
<mixed-citation publication-type="journal"><string-name><surname>Gupta</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Singh</surname>, <given-names>A.</given-names></string-name> (<year>2022</year>). <article-title>An intelligent healthcare cyber physical framework for encephalitis diagnosis based on information fusion and soft-computing techniques</article-title>. <source>New Generation Computing</source>, <volume>40</volume>(<issue>4</issue>), <fpage>1093</fpage>–<lpage>1123</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s00354-022-00175-1" xlink:type="simple">https://doi.org/10.1007/s00354-022-00175-1</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_048">
<mixed-citation publication-type="journal"><string-name><surname>Hajam</surname>, <given-names>S.S.</given-names></string-name>, <string-name><surname>Sofi</surname>, <given-names>S.A.</given-names></string-name> (<year>2021</year>). <article-title>IoT-Fog architectures in smart city applications: a survey</article-title>. <source>China Communications</source>, <volume>18</volume>(<issue>11</issue>), <fpage>117</fpage>–<lpage>140</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.23919/jcc.2021.11.009" xlink:type="simple">https://doi.org/10.23919/jcc.2021.11.009</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_049">
<mixed-citation publication-type="journal"><string-name><surname>Hayyolalam</surname>, <given-names>V.</given-names></string-name>, <string-name><surname>Aloqaily</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Ozkasap</surname>, <given-names>O.</given-names></string-name>, <string-name><surname>Guizani</surname>, <given-names>M.</given-names></string-name> (<year>2022</year>). <article-title>Edge-assisted solutions for IoT-based connected healthcare systems: a literature review</article-title>. <source>IEEE Internet of Things Journal</source>, <volume>9</volume>(<issue>12</issue>), <fpage>9419</fpage>–<lpage>9443</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/jiot.2021.3135200" xlink:type="simple">https://doi.org/10.1109/jiot.2021.3135200</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_050">
<mixed-citation publication-type="journal"><string-name><surname>Ijaz</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>El-Sherbeeny</surname>, <given-names>A.M.</given-names></string-name>, <string-name><surname>Awelisah</surname>, <given-names>Y.M.</given-names></string-name>, <string-name><surname>Lin</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Koubaa</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Noor</surname>, <given-names>A.</given-names></string-name> (<year>2020</year>). <article-title>Intelligent fog-enabled smart healthcare system for wearable physiological parameter detection</article-title>. <source>Electronics</source>, <volume>9</volume>(<issue>12</issue>), <fpage>2015</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/electronics9122015" xlink:type="simple">https://doi.org/10.3390/electronics9122015</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_051">
<mixed-citation publication-type="journal"><string-name><surname>Javadzadeh</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Rahmani</surname>, <given-names>A.M.</given-names></string-name> (<year>2020</year>). <article-title>Fog computing applications in smart cities: a systematic survey</article-title>. <source>Wireless Networks</source>, <volume>26</volume>(<issue>2</issue>), <fpage>1433</fpage>–<lpage>1457</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s11276-019-02208-y" xlink:type="simple">https://doi.org/10.1007/s11276-019-02208-y</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_052">
<mixed-citation publication-type="journal"><string-name><surname>Javaid</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Zeadally</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Fahim</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>He</surname>, <given-names>B.</given-names></string-name> (<year>2022</year>). <article-title>Medical sensors and their integration in wireless body area networks for pervasive healthcare delivery: a review</article-title>. <source>IEEE Sensors Journal</source>, <volume>22</volume>(<issue>5</issue>), <fpage>3860</fpage>–<lpage>3877</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/jsen.2022.3141064" xlink:type="simple">https://doi.org/10.1109/jsen.2022.3141064</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_053">
<mixed-citation publication-type="journal"><string-name><surname>Kamruzzaman</surname>, <given-names>M.M.</given-names></string-name>, <string-name><surname>Alanazi</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Alruwaili</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Alrashdi</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Alhwaiti</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Alshammari</surname>, <given-names>N.</given-names></string-name> (<year>2022</year>). <article-title>Fuzzy-assisted machine learning framework for the fog-computing system in remote healthcare monitoring</article-title>. <source>Measurement</source>, <volume>195</volume>, <fpage>111085</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.measurement.2022.111085" xlink:type="simple">https://doi.org/10.1016/j.measurement.2022.111085</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_054">
<mixed-citation publication-type="journal"><string-name><surname>Kanani</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Padole</surname>, <given-names>M.</given-names></string-name> (<year>2020</year>). <article-title>Exploring and optimizing the fog computing in different dimensions</article-title>. <source>Procedia Computer Science</source>, <volume>171</volume>, <fpage>2694</fpage>–<lpage>2703</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.procs.2020.04.292" xlink:type="simple">https://doi.org/10.1016/j.procs.2020.04.292</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_055">
<mixed-citation publication-type="journal"><string-name><surname>Kashani</surname>, <given-names>M.H.</given-names></string-name>, <string-name><surname>Madanipour</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Nikravan</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Asghari</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Mahdipour</surname>, <given-names>E.</given-names></string-name> (<year>2021</year>). <article-title>A systematic seview of IoT in healthcare: applications, techniques, and trends</article-title>. <source>Journal of Network and Computer Applications</source>, <volume>192</volume>, <fpage>103164</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.jnca.2021.103164" xlink:type="simple">https://doi.org/10.1016/j.jnca.2021.103164</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_056">
<mixed-citation publication-type="journal"><string-name><surname>Kashyap</surname>, <given-names>V.</given-names></string-name>, <string-name><surname>Kumar</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Kumar</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Hu</surname>, <given-names>Y.-C.</given-names></string-name> (<year>2022</year>). <article-title>A systematic survey on fog and IoT driven healthcare: open challenges and research issues</article-title>. <source>Electronics</source>, <volume>11</volume>(<issue>17</issue>), <fpage>2668</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/electronics11172668" xlink:type="simple">https://doi.org/10.3390/electronics11172668</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_057">
<mixed-citation publication-type="journal"><string-name><surname>Kaur</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Agrawal</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>R.A.</given-names></string-name> (<year>2020</year>a). <article-title>Security issues in fog environment: a systematic literature review</article-title>. <source>International Journal of Wireless Information Networks</source>, <volume>27</volume>(<issue>3</issue>), <fpage>467</fpage>–<lpage>483</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s10776-020-00491-7" xlink:type="simple">https://doi.org/10.1007/s10776-020-00491-7</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_058">
<mixed-citation publication-type="journal"><string-name><surname>Kaur</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Pasricha</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Kaur</surname>, <given-names>B.</given-names></string-name> (<year>2020</year>b). <article-title>A study of wireless body area networks and its routing protocols for healthcare environment</article-title>. <source>Recent Advances in Electrical &amp; Electronic Engineering (Formerly Recent Patents on Electrical &amp; Electronic Engineering)</source>, <volume>13</volume>(<issue>2</issue>), <fpage>136</fpage>–<lpage>152</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.2174/2352096512666190305152857" xlink:type="simple">https://doi.org/10.2174/2352096512666190305152857</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_059">
<mixed-citation publication-type="journal"><string-name><surname>Khan</surname>, <given-names>J.I.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Ali</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Ullah</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Bacha</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Lee</surname>, <given-names>S.</given-names></string-name> (<year>2022</year>a). <article-title>Artificial Intelligence and Internet of Things (AI-IoT) technologies in response to COVID-19 pandemic: a systematic review</article-title>. <source>IEEE Access</source>, <volume>10</volume>, <fpage>62613</fpage>–<lpage>62660</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/access.2022.3181605" xlink:type="simple">https://doi.org/10.1109/access.2022.3181605</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_060">
<mixed-citation publication-type="journal"><string-name><surname>Khan</surname>, <given-names>M.A.</given-names></string-name>, <string-name><surname>Din</surname>, <given-names>I.U.</given-names></string-name>, <string-name><surname>Majali</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Kim</surname>, <given-names>B.-S.</given-names></string-name> (<year>2022</year>b). <article-title>A survey of authentication in Internet of Things-enabled healthcare systems</article-title>. <source>Sensors</source>, <volume>22</volume>(<issue>23</issue>), <fpage>9089</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/s22239089" xlink:type="simple">https://doi.org/10.3390/s22239089</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_061">
<mixed-citation publication-type="journal"><string-name><surname>Khan</surname>, <given-names>M.N.</given-names></string-name>, <string-name><surname>Rao</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Camtepe</surname>, <given-names>S.</given-names></string-name> (<year>2021</year>). <article-title>Lightweight cryptographic protocols for IoT-constrained devices: a survey</article-title>. <source>IEEE Internet of Things Journal</source>, <volume>8</volume>(<issue>6</issue>), <fpage>4132</fpage>–<lpage>4156</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/jiot.2020.3026493" xlink:type="simple">https://doi.org/10.1109/jiot.2020.3026493</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_062">
<mixed-citation publication-type="journal"><string-name><surname>Khan</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Arslan</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Ratnarajah</surname>, <given-names>T.</given-names></string-name> (<year>2022</year>c). <article-title>Digital twin perspective of fourth industrial and healthcare revolution</article-title>. <source>IEEE Access</source>, <volume>10</volume>, <fpage>25732</fpage>–<lpage>25754</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/access.2022.3156062" xlink:type="simple">https://doi.org/10.1109/access.2022.3156062</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_063">
<mixed-citation publication-type="journal"><string-name><surname>Krishnamoorthy</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Dua</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Gupta</surname>, <given-names>S.</given-names></string-name> (<year>2023</year>). <article-title>Role of emerging technologies in future IoT-driven Healthcare 4.0 technologies: a survey, current challenges and future directions</article-title>. <source>Journal of Ambient Intelligence and Humanized Computing</source>. <volume>14</volume>, <fpage>361</fpage>–<lpage>407</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s12652-021-03302-w" xlink:type="simple">https://doi.org/10.1007/s12652-021-03302-w</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_064">
<mixed-citation publication-type="journal"><string-name><surname>Kumar</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Gupta</surname>, <given-names>G.P.</given-names></string-name>, <string-name><surname>Tripathi</surname>, <given-names>R.</given-names></string-name> (<year>2021</year>). <article-title>An ensemble learning and fog-cloud architecture-driven cyber-attack detection framework for IoMT networks</article-title>. <source>Computer Communications</source>, <volume>166</volume>, <fpage>110</fpage>–<lpage>124</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.comcom.2020.12.003" xlink:type="simple">https://doi.org/10.1016/j.comcom.2020.12.003</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_065">
<mixed-citation publication-type="journal"><string-name><surname>Kumari</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Bhatia</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Stea</surname>, <given-names>G.</given-names></string-name> (<year>2022</year>). <article-title>Fog-computing based healthcare framework for predicting encephalitis outbreak</article-title>. <source>Big Data Research</source>, <volume>29</volume>, <fpage>100330</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.bdr.2022.100330" xlink:type="simple">https://doi.org/10.1016/j.bdr.2022.100330</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_066">
<mixed-citation publication-type="journal"><string-name><surname>Linthicum</surname>, <given-names>D.S.</given-names></string-name> (<year>2017</year>). <article-title>Connecting fog and cloud computing</article-title>. <source>IEEE Cloud Computing</source>, <volume>4</volume>(<issue>2</issue>), <fpage>18</fpage>–<lpage>20</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/MCC.2017.37" xlink:type="simple">https://doi.org/10.1109/MCC.2017.37</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_067">
<mixed-citation publication-type="journal"><string-name><surname>Liu</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Deng</surname>, <given-names>R.H.</given-names></string-name>, <string-name><surname>Yang</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Tran</surname>, <given-names>H.N.</given-names></string-name>, <string-name><surname>Zhong</surname>, <given-names>S.</given-names></string-name> (<year>2018</year>). <article-title>Hybrid privacy-preserving clinical decision support system in fog-cloud computing</article-title>. <source>Future Generation Computer Systems</source>, <volume>78</volume>(<issue>2</issue>), <fpage>825</fpage>–<lpage>837</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.future.2017.03.018" xlink:type="simple">https://doi.org/10.1016/j.future.2017.03.018</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_068">
<mixed-citation publication-type="journal"><string-name><surname>Maki</surname>, <given-names>O.</given-names></string-name>, <string-name><surname>Alshaikhli</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Gunduz</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Naji</surname>, <given-names>K.K.</given-names></string-name>, <string-name><surname>Abdulwahed</surname>, <given-names>M.</given-names></string-name> (<year>2022</year>). <article-title>Development of digitalization road map for healthcare facility management</article-title>. <source>IEEE Access</source>, <volume>10</volume>, <fpage>14450</fpage>–<lpage>14462</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/access.2022.3146341" xlink:type="simple">https://doi.org/10.1109/access.2022.3146341</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_069">
<mixed-citation publication-type="journal"><string-name><surname>Manocha</surname>, <given-names>A.</given-names></string-name> (<year>2022</year>). <article-title>IoT-assisted irregular environmental event determination for health analysis of pregnant females</article-title>. <source>Transactions on Emerging Telecommunications Technologies</source>, <volume>33</volume>(<issue>1</issue>). <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1002/ett.4392" xlink:type="simple">https://doi.org/10.1002/ett.4392</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_070">
<mixed-citation publication-type="journal"><string-name><surname>Manocha</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Singh</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Bhatia</surname>, <given-names>M.</given-names></string-name> (<year>2020</year>a). <article-title>Cognitive intelligence assisted fog-cloud architecture for Generalized Anxiety Disorder (GAD) prediction</article-title>. <source>Journal of Medical Systems</source>, <volume>44</volume>(<issue>1</issue>). <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s10916-019-1495-y" xlink:type="simple">https://doi.org/10.1007/s10916-019-1495-y</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_071">
<mixed-citation publication-type="journal"><string-name><surname>Manocha</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Singh</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Verma</surname>, <given-names>P.</given-names></string-name> (<year>2020</year>b). <article-title>An internet of things fog-assisted sleep-deprivation prediction framework for spinal cord injury patients</article-title>. <source>Computer</source>, <volume>53</volume>(<issue>2</issue>), <fpage>46</fpage>–<lpage>56</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/mc.2019.2916829" xlink:type="simple">https://doi.org/10.1109/mc.2019.2916829</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_072">
<mixed-citation publication-type="chapter"><string-name><surname>Myoung Lee</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Um</surname>, <given-names>T.-W.</given-names></string-name>, <string-name><surname>Choi</surname>, <given-names>J.K.</given-names></string-name> (<year>2018</year>). <chapter-title>AI as a Microservice (AIMS) over networks</chapter-title>. In: <source>2018 ITU Kaleidoscope: Machine Learning for a 5G Future (ITU K)</source>, <conf-loc>Santa Fe, Argentina</conf-loc>, pp. <fpage>1</fpage>–<lpage>7</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.23919/ITU-WT.2018.8597704" xlink:type="simple">https://doi.org/10.23919/ITU-WT.2018.8597704</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_073">
<mixed-citation publication-type="journal"><string-name><surname>Nagarajan</surname>, <given-names>S.M.</given-names></string-name>, <string-name><surname>Deverajan</surname>, <given-names>G.G.</given-names></string-name>, <string-name><surname>Chatterjee</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Alnumay</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Ghosh</surname>, <given-names>U.</given-names></string-name> (<year>2021</year>). <article-title>Effective task scheduling algorithm with deep learning for Internet of Health Things (IoHT) in sustainable smart cities</article-title>. <source>Sustainable Cities and Society</source>, <volume>71</volume>, <fpage>102945</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.scs.2021.102945" xlink:type="simple">https://doi.org/10.1016/j.scs.2021.102945</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_074">
<mixed-citation publication-type="journal"><string-name><surname>Naresh</surname>, <given-names>V.S.</given-names></string-name>, <string-name><surname>Pericherla</surname>, <given-names>S.S.</given-names></string-name>, <string-name><surname>Murty</surname>, <given-names>P.S.R.</given-names></string-name>, <string-name><surname>Reddi</surname>, <given-names>S.</given-names></string-name> (<year>2020</year>). <article-title>Internet of Things in healthcare: architecture, applications, challenges, and solutions</article-title>. <source>Computer Systems Science and Engineering</source>, <volume>35</volume>(<issue>6</issue>), <fpage>411</fpage>–<lpage>421</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.32604/csse.2020.35.411" xlink:type="simple">https://doi.org/10.32604/csse.2020.35.411</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_075">
<mixed-citation publication-type="journal"><string-name><surname>Nauman</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Qadri</surname>, <given-names>Y.A.</given-names></string-name>, <string-name><surname>Amjad</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Zikria</surname>, <given-names>Y.B.</given-names></string-name>, <string-name><surname>Afzal</surname>, <given-names>M.K.</given-names></string-name>, <string-name><surname>Kim</surname>, <given-names>S.W.</given-names></string-name> (<year>2020</year>). <article-title>Multimedia Internet of Things: a comprehensive survey</article-title>. <source>IEEE Access</source>, <volume>8</volume>, <fpage>8202</fpage>–<lpage>8250</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/access.2020.2964280" xlink:type="simple">https://doi.org/10.1109/access.2020.2964280</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_076">
<mixed-citation publication-type="journal"><string-name><surname>Navarro</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Vidaña-Vila</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>Alsina-Pagès</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Hervás</surname>, <given-names>M.</given-names></string-name> (<year>2018</year>). <article-title>Real-time distributed architecture for remote acoustic elderly monitoring in residential-scale ambient assisted living scenarios</article-title>. <source>Sensors</source>, <volume>18</volume>(<issue>8</issue>), <fpage>2492</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/s18082492" xlink:type="simple">https://doi.org/10.3390/s18082492</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_077">
<mixed-citation publication-type="journal"><string-name><surname>Obaidat</surname>, <given-names>M.A.</given-names></string-name>, <string-name><surname>Obeidat</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Holst</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Hayajneh</surname>, <given-names>A.A.</given-names></string-name>, <string-name><surname>Brown</surname>, <given-names>J.</given-names></string-name> (<year>2020</year>). <article-title>A comprehensive and systematic survey on the Internet of Things: security and privacy challenges, security frameworks, enabling technologies, threats, vulnerabilities and countermeasures</article-title>. <source>Computers</source>, <volume>9</volume>(<issue>2</issue>), <fpage>44</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/computers9020044" xlink:type="simple">https://doi.org/10.3390/computers9020044</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_078">
<mixed-citation publication-type="journal"><string-name><surname>Oh</surname>, <given-names>S.-R.</given-names></string-name>, <string-name><surname>Seo</surname>, <given-names>Y.-D.</given-names></string-name>, <string-name><surname>Lee</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>Kim</surname>, <given-names>Y.-G.</given-names></string-name> (<year>2021</year>). <article-title>A comprehensive survey on security and privacy for electronic health data</article-title>. <source>International Journal of Environmental Research and Public Health</source>, <volume>18</volume>(<issue>18</issue>), <fpage>9668</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/ijerph18189668" xlink:type="simple">https://doi.org/10.3390/ijerph18189668</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_079">
<mixed-citation publication-type="journal"><string-name><surname>Page</surname>, <given-names>M.J.</given-names></string-name>, <string-name><surname>McKenzie</surname>, <given-names>J.E.</given-names></string-name>, <string-name><surname>Bossuyt</surname>, <given-names>P.M.</given-names></string-name>, <string-name><surname>Boutron</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Hoffmann</surname>, <given-names>T.C.</given-names></string-name>, <string-name><surname>Mulrow</surname>, <given-names>C.D.</given-names></string-name>, <string-name><surname>Shamseer</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Tetzlaff</surname>, <given-names>J.M.</given-names></string-name>, <string-name><surname>Akl</surname>, <given-names>E.A.</given-names></string-name>, <string-name><surname>Brennan</surname>, <given-names>S.E.</given-names></string-name>, <string-name><surname>Chou</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Glanville</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Grimshaw</surname>, <given-names>J.M.</given-names></string-name>, <string-name><surname>Hróbjartsson</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Lalu</surname>, <given-names>M.M.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Loder</surname>, <given-names>E.W.</given-names></string-name>, <string-name><surname>Mayo-Wilson</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>McDonald</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>McGuinness</surname>, <given-names>L.A.</given-names></string-name>, <string-name><surname>Stewart</surname>, <given-names>L.A.</given-names></string-name>, <string-name><surname>Thomas</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Tricco</surname>, <given-names>A.C.</given-names></string-name>, <string-name><surname>Welch</surname>, <given-names>V.A.</given-names></string-name>, <string-name><surname>Whiting</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Moher</surname>, <given-names>D.</given-names></string-name> (<year>2021</year>). <article-title>The PRISMA 2020 statement: an updated guideline for reporting systematic reviews</article-title>. <source>BMJ</source>, <volume>372</volume>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1136/bmj.n71" xlink:type="simple">https://doi.org/10.1136/bmj.n71</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_080">
<mixed-citation publication-type="other"><string-name><surname>Peng</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Sun</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Zhou</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>Y.</given-names></string-name> (2022). Study QoS-aware fog computing for disease diagnosis and prognosis. <italic>Mobile Networks and Applications</italic>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s11036-022-01957-z" xlink:type="simple">https://doi.org/10.1007/s11036-022-01957-z</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_081">
<mixed-citation publication-type="journal"><string-name><surname>Poonia</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Ghosh</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Ghosh</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Nath</surname>, <given-names>S.B.</given-names></string-name>, <string-name><surname>Ghosh</surname>, <given-names>S.K.</given-names></string-name>, <string-name><surname>Buyya</surname>, <given-names>R.</given-names></string-name> (<year>2021</year>). <article-title>CONFRONT: cloud-fog-dew based monitoring framework for COVID-19 management</article-title>. <source>Internet of Things</source>, <volume>16</volume>, <fpage>100459</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.iot.2021.100459" xlink:type="simple">https://doi.org/10.1016/j.iot.2021.100459</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_082">
<mixed-citation publication-type="other"><string-name><surname>Prabhu</surname>, <given-names>C.S.R.</given-names></string-name>, <string-name><surname>Jan</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Prasad</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Varadarajan</surname>, <given-names>V.</given-names></string-name> (2020). Fog analytics – a survey. <italic>Malaysian Journal of Computer Science</italic>, 140–151. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.22452/mjcs.sp2020no1.10" xlink:type="simple">https://doi.org/10.22452/mjcs.sp2020no1.10</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_083">
<mixed-citation publication-type="journal"><string-name><surname>QingQingChang</surname></string-name>, <string-name><surname>Ahmad</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Liao</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Nazir</surname>, <given-names>S.</given-names></string-name> (<year>2021</year>). <article-title>Evaluation and quality assurance of fog computing-based IoT for health monitoring system</article-title>. <source>Wireless Communications and Mobile Computing</source>, <volume>2021</volume>, <fpage>1</fpage>–<lpage>12</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1155/2021/5599907" xlink:type="simple">https://doi.org/10.1155/2021/5599907</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_084">
<mixed-citation publication-type="journal"><string-name><surname>Qiu</surname>, <given-names>T.</given-names></string-name>, <string-name><surname>Chi</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Zhou</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Ning</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Atiquzzaman</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Wu</surname>, <given-names>D.O.</given-names></string-name> (<year>2020</year>). <article-title>Edge computing in industrial Internet of Things: architecture, advances and challenges</article-title>. <source>IEEE Communications Surveys &amp; Tutorials</source>, <volume>22</volume>(<issue>4</issue>), <fpage>2462</fpage>–<lpage>2488</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/comst.2020.3009103" xlink:type="simple">https://doi.org/10.1109/comst.2020.3009103</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_085">
<mixed-citation publication-type="journal"><string-name><surname>Quy</surname>, <given-names>V.K.</given-names></string-name>, <string-name><surname>Hau</surname>, <given-names>N.V.</given-names></string-name>, <string-name><surname>Anh</surname>, <given-names>D.V.</given-names></string-name>, <string-name><surname>Ngoc</surname>, <given-names>L.A.</given-names></string-name> (<year>2022</year>). <article-title>Smart healthcare IoT applications based on fog computing: architecture, applications and challenges</article-title>. <source>Complex &amp; Intelligent Systems</source>. <volume>8</volume>, <fpage>3805</fpage>–<lpage>3815</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s40747-021-00582-9" xlink:type="simple">https://doi.org/10.1007/s40747-021-00582-9</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_086">
<mixed-citation publication-type="journal"><string-name><surname>Raju</surname>, <given-names>K.B.</given-names></string-name>, <string-name><surname>Dara</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Vidyarthi</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Gupta</surname>, <given-names>V.M.</given-names></string-name>, <string-name><surname>Khan</surname>, <given-names>B.</given-names></string-name> (<year>2022</year>). <article-title>Smart heart disease prediction system with IoT and fog computing sectors enabled by cascaded deep learning model</article-title>. <source>Computational Intelligence and Neuroscience</source>, <volume>2022</volume>, <fpage>1</fpage>–<lpage>22</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1155/2022/1070697" xlink:type="simple">https://doi.org/10.1155/2022/1070697</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_087">
<mixed-citation publication-type="journal"><string-name><surname>Raoof</surname>, <given-names>S.S.</given-names></string-name>, <string-name><surname>Durai</surname>, <given-names>M.A.S.</given-names></string-name> (<year>2022</year>). <article-title>A comprehensive review on smart health care: applications, paradigms, and challenges with case studies</article-title>. <source>Contrast Media &amp; Molecular Imaging</source>, <volume>2022</volume>, <fpage>1</fpage>–<lpage>18</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1155/2022/4822235" xlink:type="simple">https://doi.org/10.1155/2022/4822235</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_088">
<mixed-citation publication-type="journal"><string-name><surname>Rashid</surname>, <given-names>N.</given-names></string-name>, <string-name><surname>Demirel</surname>, <given-names>B.U.</given-names></string-name>, <string-name><surname>Faruque</surname>, <given-names>M.A.A.</given-names></string-name> (<year>2022</year>). <article-title>AHAR: adaptive CNN for energy-efficient human activity recognition in low-power edge devices</article-title>. <source>IEEE Internet of Things Journal</source>, <volume>9</volume>(<issue>15</issue>), <fpage>13041</fpage>–<lpage>13051</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/jiot.2022.3140465" xlink:type="simple">https://doi.org/10.1109/jiot.2022.3140465</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_089">
<mixed-citation publication-type="journal"><string-name><surname>Ribeiro</surname>, <given-names>O.</given-names></string-name>, <string-name><surname>Gomes</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Vale</surname>, <given-names>Z.</given-names></string-name> (<year>2022</year>). <article-title>IoT-based human fall detection system</article-title>. <source>Electronics</source>, <volume>11</volume>(<issue>4</issue>), <fpage>592</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/electronics11040592" xlink:type="simple">https://doi.org/10.3390/electronics11040592</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_090">
<mixed-citation publication-type="journal"><string-name><surname>Sadaf</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Sultana</surname>, <given-names>J.</given-names></string-name> (<year>2020</year>). <article-title>Intrusion detection based on autoencoder and isolation forest in fog computing</article-title>. <source>IEEE Access</source>, <volume>8</volume>, <fpage>167059</fpage>–<lpage>167068</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/access.2020.3022855" xlink:type="simple">https://doi.org/10.1109/access.2020.3022855</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_091">
<mixed-citation publication-type="journal"><string-name><surname>Sadri</surname>, <given-names>A.A.</given-names></string-name>, <string-name><surname>Rahmani</surname>, <given-names>A.M.</given-names></string-name>, <string-name><surname>Saberikamarposhti</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Hosseinzadeh</surname>, <given-names>M.</given-names></string-name> (<year>2021</year>). <article-title>Fog data management: a vision, challenges, and future directions</article-title>. <source>Journal of Network and Computer Applications</source>, <volume>174</volume>, <fpage>102882</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.jnca.2020.102882" xlink:type="simple">https://doi.org/10.1016/j.jnca.2020.102882</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_092">
<mixed-citation publication-type="journal"><string-name><surname>Sahil</surname></string-name>, <string-name><surname>Sood</surname>, <given-names>S.K.</given-names></string-name> (<year>2022</year>). <article-title>Fog-Cloud centric IoT-based cyber physical framework for panic oriented disaster evacuation in smart cities</article-title>. <source>Earth Science Informatics</source>, <volume>15</volume>, <fpage>1449</fpage>–<lpage>1470</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s12145-020-00481-6" xlink:type="simple">https://doi.org/10.1007/s12145-020-00481-6</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_093">
<mixed-citation publication-type="journal"><string-name><surname>Santos</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Endo</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Monteiro</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Rocha</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>Silva</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Lynn</surname>, <given-names>T.</given-names></string-name> (<year>2019</year>). <article-title>Accelerometer-based human fall detection using convolutional neural networks</article-title>. <source>Sensors</source>, <volume>19</volume>(<issue>7</issue>), <fpage>1644</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/s19071644" xlink:type="simple">https://doi.org/10.3390/s19071644</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_094">
<mixed-citation publication-type="journal"><string-name><surname>Scirè</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Tropeano</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Anagnostopoulos</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Chatzigiannakis</surname>, <given-names>I.</given-names></string-name> (<year>2019</year>). <article-title>Fog-computing-based heartbeat detection and arrhythmia classification using machine learning</article-title>. <source>Algorithms</source>, <volume>12</volume>(<issue>2</issue>), <fpage>32</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/a12020032" xlink:type="simple">https://doi.org/10.3390/a12020032</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_095">
<mixed-citation publication-type="journal"><string-name><surname>Shirvanian</surname>, <given-names>N.</given-names></string-name>, <string-name><surname>Shams</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Rahmani</surname>, <given-names>A.M.</given-names></string-name> (<year>2022</year>). <article-title>Internet of Things data management: a systematic literature review, vision, and future trends</article-title>. <source>International Journal of Communication Systems</source>, <volume>35</volume>(<issue>14</issue>). <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1002/dac.5267" xlink:type="simple">https://doi.org/10.1002/dac.5267</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_096">
<mixed-citation publication-type="journal"><string-name><surname>Silva</surname>, <given-names>D.M.A.D.</given-names></string-name>, <string-name><surname>Sofia</surname>, <given-names>R.C.</given-names></string-name> (<year>2020</year>). <article-title>A discussion on context-awareness to better support the IoT cloud/edge continuum</article-title>. <source>IEEE Access</source>, <volume>8</volume>, <fpage>193686</fpage>–<lpage>193694</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/access.2020.3032388" xlink:type="simple">https://doi.org/10.1109/access.2020.3032388</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_097">
<mixed-citation publication-type="journal"><string-name><surname>Silva</surname>, <given-names>F.S.D.</given-names></string-name>, <string-name><surname>Silva</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>Neto</surname>, <given-names>E.P.</given-names></string-name>, <string-name><surname>Lemos</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Neto</surname>, <given-names>A.J.V.</given-names></string-name>, <string-name><surname>Esposito</surname>, <given-names>F.</given-names></string-name> (<year>2020</year>). <article-title>A taxonomy of DDoS attack mitigation approaches featured by SDN technologies in IoT scenarios</article-title>. <source>Sensors</source>, <volume>20</volume>(<issue>11</issue>). <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/s20113078" xlink:type="simple">https://doi.org/10.3390/s20113078</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_098">
<mixed-citation publication-type="journal"><string-name><surname>Singh</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Singh</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Gehlot</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Akram</surname>, <given-names>S.V.</given-names></string-name>, <string-name><surname>Priyadarshi</surname>, <given-names>N.</given-names></string-name>, <string-name><surname>Twala</surname>, <given-names>B.</given-names></string-name> (<year>2022</year>). <article-title>An imperative role of digitalization in monitoring cattle health for sustainability</article-title>. <source>Electronics</source>, <volume>11</volume>(<issue>17</issue>), <fpage>2702</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/electronics11172702" xlink:type="simple">https://doi.org/10.3390/electronics11172702</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_099">
<mixed-citation publication-type="journal"><string-name><surname>Singh</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Singh</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Gill</surname>, <given-names>S.S.</given-names></string-name> (<year>2021</year>). <article-title>Fog computing: a taxonomy, systematic review, current trends and research challenges</article-title>. <source>Journal of Parallel and Distributed Computing</source>, <volume>157</volume>, <fpage>56</fpage>–<lpage>85</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.jpdc.2021.06.005" xlink:type="simple">https://doi.org/10.1016/j.jpdc.2021.06.005</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_100">
<mixed-citation publication-type="journal"><string-name><surname>Singh</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Malhotra</surname>, <given-names>J.</given-names></string-name> (<year>2022</year>). <article-title>Smart neurocare approach for detection of epileptic seizures using deep learning based temporal analysis of EEG patterns</article-title>. <source>Multimedia Tools and Applications</source>, <volume>81</volume>(<issue>20</issue>), <fpage>29555</fpage>–<lpage>29586</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s11042-022-12512-z" xlink:type="simple">https://doi.org/10.1007/s11042-022-12512-z</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_101">
<mixed-citation publication-type="journal"><string-name><surname>Sisodia</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Jindal</surname>, <given-names>R.</given-names></string-name> (<year>2021</year>). <article-title>A meta-analysis of Industry 4.0 design principles applied in the health sector</article-title>. <source>Engineering Applications of Artificial Intelligence</source>, <volume>104</volume>, <fpage>104377</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.engappai.2021.104377" xlink:type="simple">https://doi.org/10.1016/j.engappai.2021.104377</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_102">
<mixed-citation publication-type="journal"><string-name><surname>Sood</surname>, <given-names>S.K.</given-names></string-name>, <string-name><surname>Mahajan</surname>, <given-names>I.</given-names></string-name> (<year>2018</year>). <article-title>A fog assisted cyber-physical framework for identifying and preventing coronary heart disease</article-title>. <source>Wireless Personal Communications</source>, <volume>101</volume>(<issue>1</issue>), <fpage>143</fpage>–<lpage>165</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s11277-018-5680-y" xlink:type="simple">https://doi.org/10.1007/s11277-018-5680-y</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_103">
<mixed-citation publication-type="journal"><string-name><surname>Suggala</surname>, <given-names>R.K.</given-names></string-name>, <string-name><surname>Krishna</surname>, <given-names>M.V.</given-names></string-name>, <string-name><surname>Swain</surname>, <given-names>S.K.</given-names></string-name> (<year>2022</year>). <article-title>Health monitoring jeopardy prophylaxis model based on machine learning in fog computing</article-title>. <source>Transactions on Emerging Telecommunications Technologies</source>, <volume>33</volume>(<issue>7</issue>). <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1002/ett.4497" xlink:type="simple">https://doi.org/10.1002/ett.4497</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_104">
<mixed-citation publication-type="journal"><string-name><surname>Sun</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Yu</surname>, <given-names>Q.</given-names></string-name>, <string-name><surname>Peng</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Subramani</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>X.</given-names></string-name> (<year>2021</year>). <article-title>FogMed: a fog-based framework for disease prognosis based medical sensor data streams</article-title>. <source>Computers, Materials &amp; Continua</source>, <volume>66</volume>(<issue>1</issue>), <fpage>603</fpage>–<lpage>619</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.32604/cmc.2020.012515" xlink:type="simple">https://doi.org/10.32604/cmc.2020.012515</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_105">
<mixed-citation publication-type="journal"><string-name><surname>Swamy</surname>, <given-names>S.N.</given-names></string-name>, <string-name><surname>Kota</surname>, <given-names>S.R.</given-names></string-name> (<year>2020</year>). <article-title>An empirical study on system level aspects of Internet of Things (IoT)</article-title>. <source>IEEE Access</source>, <volume>8</volume>, <fpage>188082</fpage>–<lpage>188134</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/access.2020.3029847" xlink:type="simple">https://doi.org/10.1109/access.2020.3029847</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_106">
<mixed-citation publication-type="journal"><string-name><surname>Uslu</surname>, <given-names>B.Ç.</given-names></string-name>, <string-name><surname>Okay</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>Dursun</surname>, <given-names>E.</given-names></string-name> (<year>2020</year>). <article-title>Analysis of factors affecting IoT-based smart hospital design</article-title>. <source>Journal of Cloud Computing</source>, <volume>9</volume>(<issue>1</issue>). <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1186/s13677-020-00215-5" xlink:type="simple">https://doi.org/10.1186/s13677-020-00215-5</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_107">
<mixed-citation publication-type="journal"><string-name><surname>Vijayakumar</surname>, <given-names>V.</given-names></string-name>, <string-name><surname>Malathi</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Subramaniyaswamy</surname>, <given-names>V.</given-names></string-name>, <string-name><surname>Saravanan</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Logesh</surname>, <given-names>R.</given-names></string-name> (<year>2019</year>). <article-title>Fog computing-based intelligent healthcare system for the detection and prevention of mosquito-borne diseases</article-title>. <source>Computers in Human Behavior</source>, <volume>100</volume>, <fpage>275</fpage>–<lpage>285</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.chb.2018.12.009" xlink:type="simple">https://doi.org/10.1016/j.chb.2018.12.009</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_108">
<mixed-citation publication-type="journal"><string-name><surname>Vilela</surname>, <given-names>P.H.</given-names></string-name>, <string-name><surname>Rodrigues</surname>, <given-names>J.J.P.C.</given-names></string-name>, <string-name><surname>da R. Righi</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Kozlov</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Rodrigues</surname>, <given-names>V.F.</given-names></string-name> (<year>2020</year>). <article-title>Looking at fog computing for e-health through the lens of deployment challenges and applications</article-title>. <source>Sensors</source>, <volume>20</volume>(<issue>9</issue>). <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/s20092553" xlink:type="simple">https://doi.org/10.3390/s20092553</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_109">
<mixed-citation publication-type="journal"><string-name><surname>Xue</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Nazir</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Peng</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Khattak</surname>, <given-names>H.</given-names></string-name> (<year>2021</year>). <article-title>Selection and ranking of fog computing-based IoT for monitoring of health using the analytic network approach</article-title>. <source>Complexity</source>, <volume>2021</volume>, <fpage>1</fpage>–<lpage>11</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1155/2021/9964303" xlink:type="simple">https://doi.org/10.1155/2021/9964303</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_110">
<mixed-citation publication-type="journal"><string-name><surname>Yaqoob</surname>, <given-names>I.</given-names></string-name>, <string-name><surname>Salah</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Jayaraman</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Al-Hammadi</surname>, <given-names>Y.</given-names></string-name> (<year>2022</year>). <article-title>Blockchain for healthcare data management: opportunities, challenges, and future recommendations</article-title>. <source>Neural Computing and Applications</source>. <volume>34</volume>, <fpage>11475</fpage>–<lpage>11490</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1007/s00521-020-05519-w" xlink:type="simple">https://doi.org/10.1007/s00521-020-05519-w</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_111">
<mixed-citation publication-type="journal"><string-name><surname>Younan</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Houssein</surname>, <given-names>E.H.</given-names></string-name>, <string-name><surname>Elhoseny</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Ali</surname>, <given-names>A.A.</given-names></string-name> (<year>2020</year>). <article-title>Challenges and recommended technologies for the industrial Internet of Things: a comprehensive review</article-title>. <source>Measurement</source>, <volume>151</volume>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.measurement.2019.107198" xlink:type="simple">https://doi.org/10.1016/j.measurement.2019.107198</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor525_ref_112">
<mixed-citation publication-type="journal"><string-name><surname>Yu</surname>, <given-names>H.Q.</given-names></string-name>, <string-name><surname>Reiff-Marganiec</surname>, <given-names>S.</given-names></string-name> (<year>2021</year>). <article-title>Targeted ensemble machine classification approach for supporting IoT enabled skin disease detection</article-title>. <source>IEEE Access</source>, <volume>9</volume>, <fpage>50244</fpage>–<lpage>50252</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/access.2021.3069024" xlink:type="simple">https://doi.org/10.1109/access.2021.3069024</ext-link>.</mixed-citation>
</ref>
</ref-list>
</back>
</article>
