Computer Science ›› 2015, Vol. 42 ›› Issue (7): 170-173.doi: 10.11896/j.issn.1002-137X.2015.07.037

Previous Articles     Next Articles

Fog Computing Based Hospital Information Service System

CHEN Dong-mei and LI Zhi   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Due to local information requirements and the lack of the cloud computing framework support,this paper proposed a fog computing framework based on “intelligent front-terminal” for mobile applications.The framework extends a fog layer between cloud services and mobile devices,aiming at the smooth,low-latency and economical services deliveryfrom cloud to mobile.In hospital scene,this paper designed and developed an information service system,which provides medical information,queuing waiting time and multimedia services.Moreover,the multi-band load balancing algorithm and queuing waiting time estimation based on local information algorithm were proposed in the system.The availability of the system and the efficiency of algorithms were verified in real-world experiments.

Key words: Cloud computing,Fog computing,Date caching,Wireless accessing,Internet of Things

[1] Cisco.Cisco Global Cloud Index:Forecast and Methodology 2013-2018 white Paper.http://www.cisco.com/c/en/us/solutions/collateral/service-pro-vider/global-cloud-index-gci/Cloud_Index_White_Paper.html
[2] 孙利民,沈杰,朱红松.从云计算到海计算:论物联网的体系结构[J].中兴通讯技术,2011,17(1):3-7 Sun Li-ming,Shen Jie,Zhu Hong-song.From Cloud Computing to Sea Computing:The Architecture of the Internet of things[J].ZTE Communications,2011,17(1):3-7
[3] Li Z,Liu Y,Zhu H,et al.Coff:Contact Duration Aware Cellular Traffic Offloading Over DTN[J/OL].http://ieeexplore.ieee.org/xpls/labs_all.jsp?arnumber=6987350
[4] Bonomi F,Milito R,Zhu J,et al.Fog computing and its role in the internet of things[C]∥Proceedings of First Edition of MCC Workshop on Mobile Cloud Computing.ACM,2012:13-16
[5] Stojmenovic I,Wen S.The Fog computing paradigm:Scenarios and security issues[C]∥2014 Federated Conference on Compu-ter Science and Information Systems (FedCSIS).IEEE,2014:1-8(下转第190页)(上接第173页)
[6] Stolfo S J,Salem M B,Keromytis A D.Fog computing:Mitigating insider data theft attacks in the cloud[C]∥2012 IEEE Symposium on Security and Privacy Workshops (SPW).IEEE,2012:125-128
[7] Hong K,Lillethun D,Ramachandran U,et al.Mobile fog:A pro-gramming model for large-scale applications on the internet of things[C]∥Proceedings of the second ACM SIGCOMM Workshop on Mobile Cloud Computing.ACM,2013:15-20
[8] Gkantsidis C,Rodriguez P R.Network coding for large scale content distribution[C]∥INFOCOM 2005.24th Annual Joint Conference of the IEEE Computer and Communications Societies.IEEE,2005,4:2235-2245
[9] Ahlgren B,Dannewitz C,Imbrenda C,et al.A survey of information-centric networking[J].IEEE Communications Magazine,2012,50(7):26-36
[10] 刘云浩.物联网导论[M].北京:科学出版社,2011 Liu Yun-hao.Introduction to Internet of Things[M].Beijing:Science Press,2011
[11] 孙利民,李建中,陈渝,等.无线传感器网络[M].北京:清华大学出版社,2005 Sun Li-min,Li Jian-zhong,Chen Yu,et al.Wireless Sensor Networks[M].Beijing:Tsinghua University Press,2005
[12] Li Q,Han Q,Cheng X,et al.QueueSense:Collaborative recognition of queuing on mobile phones[C]∥2014 Eleventh Annual IEEE International Conference on Sensing,Communication,and Networking (SECON).IEEE,2014:230-238

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!