1 Elsevier
1 Elsevier
article info a b s t r a c t
Article history: IoT (Internet of Things) information flow perception is the foundation of the IoT architecture and plays
Received 26 November 2019 an important role. Providing cloud services on demand is one of the key issues and core features of
Received in revised form 28 August 2020 cloud services in the IoT information flow perception. Firstly, we study the mixed logic dynamics (MLD)
Accepted 12 October 2020
modeling method of IoT information flow awareness, and use IoT sensor nodes, controlled nodes, and
Available online 14 October 2020
coordination nodes to describe system application scenarios, and use automata for internal information
Keywords: transmission. Secondly, an open queuing method based on large-scale information flow perception
Mixed Logic Dynamic(MLD) modeling and network delay analysis method is proposed. By analyzing the end-to-end delay of the
Information flow perception node path and the average delay analysis of the whole queuing network, the open queuing is obtained.
Open queuing Aiming at the characteristics of distributed data of information flow perception in the IoT, a priority-
Modeling
based queuing network is proposed to model and analyze the aggregation nodes based on embedded
multi-core SoC(System on Chip), which greatly improves the performance of embedded multi-core
SoC.
© 2020 Elsevier B.V. All rights reserved.
1. Introduction to study the cache allocation method that can obtain the best per-
formance, design efficient IoT convergence bamboo points, and
The cloud-oriented IoT is responsible for hosting server appli- effectively reduce the data set congestion problem; to improve
cations in many IoT products, so it needs to be able to withstand and optimize traditional node location methods and to provide
and process a large number of concurrent network messages, more efficient network service performance.
which place high demands on the system architecture and soft- The IoT cloud system provides a cloud computing service of
ware performance of the cloud platform. The cloud-oriented IoT the type of platform as a service (PaaS, Platform as a Service).
provides a platform-as-a-service cloud computing service for IoT The cloud platform system deploys a sufficient number of servers
applications. At the hardware level, the cloud platform provides in the hardware to carry various services in the system, de-
the necessary server resources and network resources for the ploys all kinds of necessary services of the IoT application server
IoT cloud computing service. At the software level, the cloud in software, and implements a complete cloud system of the
platform is based on the popular IoT cloud service solution, which IoT application [1–4]. IoT application product planners produce
terminal products and applications according to the logic and
implements basic functions including application layer message
protocol standards stipulated by the cloud platform, and access
processing, data storage and management, and load balancing,
the cloud platform in various ways, ultimately enabling the IoT
and is packaged and provided to access application developers.
products to be practically applied. In recent years, some research
In recent years, people have done a lot of work in improving the
has been made on the modeling of large-scale IoT information
service quality of large-scale network in the IoT and enhancing
flow perception nodes. At present, typical modeling methods
the system’s emergency response capability. These studies are
include Petri net modeling method and queuing theory modeling
mainly reflected in the layout and path selection of a pair of
method. Petri net modeling method has been successfully applied
large-scale information flow perception modeling. The matter is
in current wireless sensor networks. For example, a non-Markov
to study effective modeling and simulation evaluation methods; stochastic Petri net model [5–8] is proposed which can evaluate
to study the different types of sensory node modeling problems; star, tree and grid. A method for predicting node energy using
the Petri net model [9–12], thereby determining the node that the
∗ Corresponding author. next hop should pass, which can be used to save the energy of the
E-mail address: [email protected] (R. Chen). node. The use of Petri nets to model wireless sensor networks to
https://doi.org/10.1016/j.future.2020.10.012
0167-739X/© 2020 Elsevier B.V. All rights reserved.
J. Liu, Y. Duan, Y. Wu et al. Future Generation Computer Systems 115 (2021) 671–679
2. MLD behavior modeling method for IoT information flow 2.2. IoT perception MLD behavior model
perception
Assuming that the perception node, the controlled node, and
This chapter will adopt the hybrid logic dynamic MLD model- the coordinator sensed by the IoT information flow have rela-
ing method, start from the basic structure of the IoT information tively independent information decision-making capabilities, the
flow perception and control system, analyze the behavior and information flow of the perceptual measurement and control sys-
tem can be represented as the information flow diagram shown
control behavior of the IoT, through the application scene ab-
in Fig. 2.
straction mechanism, the information flow dynamic interaction
As shown in Fig. 2, an information collection task on the
behavior MLD model description method, and formal instance
perception node is performed to acquire information of a certain
verification. A scenario is a system function that describes how measurement and control object firstly. After the node decision,
the various components of the system interact to perform the the necessary sampling information is wired (shown by a solid
operations of interest to the user [27–31]. It can also be described line in the figure) or wireless (shown by a broken line in the
as a series of events that may occur in the system [32–36]. The figure). The information can be transmitted to the coordinator
method is based on three aspects and is devoted to constructing a node, when the specific information of multiple perception nodes
unified model framework and testing the feasibility of the model is needed in the specific system; the multi-perception nodes are
through examples. aggregated for local decision making (cluster decision), and then
672
J. Liu, Y. Duan, Y. Wu et al. Future Generation Computer Systems 115 (2021) 671–679
Table 1
Status and information event table in the perception node model.
State name Identification Information event Identification
Perception node n1 Environmental χi1 Fig. 3. IoT information flow continuous and discrete event description and MLD
detection information modeling.
Pretreatment n2 Perception node χi2
observation data
Node decision n3 Preprocessed data χi3
Data is sent to n4 Data transmission χi4 between the linear function and the logical variable into a mixed
the coordinator after decision integer inequality form. Finally, the continuous and discrete parts
of the system are integrated into a unified framework to describe
the whole system as a mixed logic dynamic model.
If the state event of the perception node energy continuously
sent to the coordinator for total decision, when only a single sense
decreasing in time is regarded as a continuous event, the per-
is needed. When the node information is measured, it is directly
sent to the coordinator. Secondly, the coordinator performs in- ceptual overall measurement, the control behavior logic state
formation processing and scheduling decision tasks, analyzes the transition event, the perception node internal judgment decision
acquired perception information, and formulates corresponding event, and the controlled component execution decision event
control commands according to the system control strategy, and can be regarded as discrete events. Then, the information flow
transmits instructions to the network controller node. Finally, the diagram of the IoT information flow perception and control sys-
controlled node interprets the control command and implements tem is set such that the continuous or discrete state set at a
a complete measurement control process by implementing the certain time t is x(t), and the continuous or discrete input set
received control command after the node decides. that causes the change of the perceived state is u(t), and the
The following describes the internal information flow mecha- perception and control system can be transformed into the IoT
nism of the perception node using the automaton method [37]. information flow continuous and discrete event description. Its
The ith detection time of the perception node is ti ; the internal MLD modeling method diagram is shown in Fig. 3.
operation period of the perception node is Ta ; the maximum As shown in Fig. 3, the information flow perception acquires
detection time is max(Ta ), and the related information event of the measurement and control object information through the
the ith operation is represented as a binary group (aix , ti ), and perception node; the coordinator node formulates the schedul-
the data detection state g1 is experienced. The data preprocessing ing decision strategy according to the measurement and control
state is g2 ; the local decision state is g3 and the data transmission information, and the controlled node performs the correspond-
state isg4 . Then the node internal information flow operation ing decision according to the coordinator. The physical meaning
mechanism can be represented as the automatic node model expressed by the continuous and discrete event description is
diagram, and the sense of Table 1 is the meaning and identity expressed in (1) the overall behavior presents information acqui-
of the corresponding state and information events in the node sition, scheduling decision, decision-making three-state cyclical
model. change, that is, jump-discrete state transition; (2) on the other
It should be noted that the above perception node description hand, the overall behavior at the microscopic level shows con-
is for a node with intelligent information processing and decision tinuous evolution intermittently, alternating between the two
function, and does not have an intelligent function node for evolution, and the formation of intricate dynamic processes.
practical applications, and only needs to simplify the model. (1) Establishment of a continuous dynamic state space mech-
MLD modeling is a unified model to describe the continuous anism model for perception and control behavior. The process of
part and discrete parts of the system to the system evolution, and perceptual measurement and control involves various continuous
is the basis of system scheduling optimization research. Firstly, events, discrete events and their mixed events. It is difficult to
the model analyzes the continuous events and discrete events of express with general differential mathematical equations. It is as-
the IoT perception layer, and then establishes the different op- sumed that the overall behavior of the perceptual layer presents
erational modes of the system corresponding to the system state a nonlinear transition state of information acquisition, scheduling
space mathematical model, and sets and define different auxiliary decision, and execution decision three-state cycle. The state at
logic variables of the system, and builds the propositional logic a certain moment is y(t), and the state at the next moment is
related to the constraints and convert them into integer inequal- y(t+1), resulting in the change of the state of the perceived state
ities. The auxiliary variable transforms the product relationship is as v(t); the state of information acquisition is f1 (y(t), v (t)); the
673
J. Liu, Y. Duan, Y. Wu et al. Future Generation Computer Systems 115 (2021) 671–679
state of the scheduling decision is f2 (y(t), v (t)), and the execution 3. Information flow perception modeling and evaluation
decision is f3 (y(t), v (t)). In some state, the constraint set is Yi ; the method based on queuing network
three-state constraint set is Y = (Y1 , Y2 , Y3 ), and the whole mea-
surement and control behavior are based on different constraints Under the limited hardware consumption, maximizing the
and are transformed between the three-state models. Then the performance of the perceived network in the IoT has become
mathematical model of the perception layer measurement and a research hotspot for improving the perceived network QoS
control behavior represented by the piecewise function is: in recent years. In large-scale wireless sensor networks, node
f [y(t), v (t)] packet buffer size is the main factor affecting node performance
⎧
⎨1
⎪
and link blocking. This paper proposes an approach to model
y(t + 1) = f2 [y(t), v (t)] (1) the IoT information flow perception by using an open queuing
⎪
f3 [y(t), v (t)] network, so that it is in the best working condition and analyzes
⎩
its data packet buffer. According to the topology and operational
This is a macro description of the flow-perception measure- characteristics of the IoT information flow, the arrival, transfer
ment and control behavior. In fact, each state also contains many
and departure relationships of the transport nodes, boundary
sub-process behaviors. Let Xi be a subset of X, it internally contains
nodes and sink nodes are analyzed, and the data flow balance
different sub-process behavior constraints in this state. Let the
equation with congestion is obtained, and the interception of the
information flow sense that each subset Xi (i = 1, 2, 3) in the
IoT information flow is established to queue the network model.
constraint set Xi in each state satisfies:
In order to evaluate the congestion situation in the network, the
Yi ∩ Yj = ∅, ∀i ̸ = j
{
actual effective arrival rate and the transfer rate in the model are
(2) obtained, and the maintenance node is added in the queuing net-
∪Y j i = Y
i=1 work model to obtain an extended equivalent queuing network
Let each subset Xi be represented as a x, u-constrained disjoint model.
convex polyhedron, the system state x(t} and the input u (t} space
convex polyhedron set constrained set T, and the correlation coef- 3.1. Packet queuing relationship
ficient of the x(t) constraint in the polyhedron is S; the correlation
coefficient of the u(t) constraint in the polyhedron is R, namely: The IoT information flow perception applied to environmental
{[ ]
y
} monitoring and control is not always processed due to factors
Yi = : Si (y(t)) + R, v (t) ≤ Ti (3) such as energy consumption. Under the premise of meeting the
v real-time requirements of the monitored objects, the IoT infor-
mation flow monitoring and sleep interval are carried out. The
For the state Xi , the logical variable δi ∈ 0, 1, i = 1, 2, 3 is
longest time elapsed before entering another sleep state in all
introduced, and the system is in the state Xi , δi = 1. Since each
state corresponding to each logical variable does not intersect, nodes sensed by the IoT traffic is called the longest monitoring
there are: period of the wireless sensor network node.
Table 2 Table 3
IoT information flow perception modeling performance index solving algorithm Priority-based scheduling algorithm based on multiple information flows
(algorithm 1). (Algorithm 2).
Input: j, Q represents the queuing network; Input: T represents the task input;
lp
Output: βi is the arrival rate; Output: max(N h );
Step 1: j → Q ; Step 1: If T, go to step 2, otherwise go to step 3;
− Step 2: Determine T→ buffer queue;
βje = βje (1 − pbej ) buffer queue = buffer queue+1;
Step 2: pbej → j Step 2.1: While T is not the maximum number, continue, otherwise go to
−
step 3;
β e = βje ÷j = βje (1 − pbej )/j
T = T+1;
Set the loop j = j + 1
End;
Step 3:Compute the probability that queue is in steady state ni
Step 2.2: Computer max(nij );
pni (1 − p)
pi (ni ) = Step 3: T→ cache queue Hj ;
1 − pNc +1 Step 3.1: If Hj is empty, go to step 1, otherwise go to step 3.2.
ni (1, 2..Nc ) represents the number of packet buffers per node;
Step 3.2: If the length of Hj is max(N h )
Step 4: Calculate the blocking probability βij = βi pij (1 − pij );
then T→ buffer queue;
Step 5: Ioop–, if Ioop<0, go to step 7;
the length of Hj = max(N h ) − 1;
Step 6: Compute the difference
else max(N h ) = the length of Hj +1;
pni (1 − p) e − e
= pi (ni ) = -β = βj ÷j = βje (1 − pbej )/j; end if;
1 − pNc +1 Step 4: Output max(N h ).
If difference<a certain value, go to step 8, otherwise go to step 3 and
proceed;
Step 7: If difference<0, then refine λ0j , go to step 3; Table 4
lp
Step 8: Return λi . Calculating the Equivalent Model Algorithm (Algorithm 3).
Input: j, A represents embedded multicore SoC queuing network;
Output: pbm ;
Step 1: j→A;
blocking probability of the external arriving node j. For node j, −
Step 2: Enter βje = βje (1 − pbej );
the total arrival rate is equal to the sum of the external arrival
Set the total blocking probability of the node,
rate λej and the internal node arrival rate blocking. The external pb m = 0.2, where m = 1, 2, . . . , n
effective arrival rate i1 , i2 . . . iq of the node j is: Step 3: Calculate the arrival and departure rates;
−
Table 5
Model input parameters.
i CAai ui CSi NCi
1 12 42 15 1-31
2 13 41 17 1-31
3 13 42 17 1-31
4 11 41 12 1-31
5 6 31 11 1-31
6 9 31 11 1-31
7 15 92 31 1-31
Acknowledgments
References
rate of each node. It can be seen from the figure that there is a
[1] A. Ahmad, M.H. Rehmani, H. Tembine, et al., IEEE access special section
certain difference in the node arrival rate between the simulation editorial: Optimization for emerging wireless networks: IoT, 5G, and smart
data obtained by the queuing software simulation and the real grid communication networks, IEEE Access 5 (2017) 2096–2100.
experimental data obtained from the actual IoT platform. When [2] D. Vu, N. Dao, Y. Jang, et al., Joint energy and latency optimization for
upstream IoT offloading services in fog radio access networks, Trans.
the node inflection point is reached (such as Experiment 3), the
Emerg. Telecommun. Technol. 30 (8) (2019) e3497–e3504.
node arrival rate of the experimental data is significantly higher [3] Y. Zhang, H. Wang, Y. Xie, An intelligent hybrid model for power flow
than the simulation data, which indicates that the IoT queuing optimization in the cloud-IOT electrical distribution network, Cluster
modeling and simulation software designed in this paper has Comput. 2017 (2) (2017) 1–10.
practical application value. [4] C. Mascolo, C. Mascolo, C. Mascolo, et al., Low-resource multi-task audio
perception for mobile and embedded devices via shared deep neural net-
work representations, Proc. Acm Inter. Mob. Wearable Ubiquitous Technol.
5. Conclusion 1 (3) (2017) 50–63.
[5] S. Zhengyang, D. Yucong, W. Shixiang, et al., Processing optimization of
typed resources with synchronized storage and computation adaptation in
This paper studies the IoT aware MLD modeling method in- fog computing, Wirel. Commun. Mob. Comput. 2018 (2) (2018) 1–13.
cluding the IoT information flow application scenario abstraction [6] J. Kim, H. Hwangbo, Sensor-based optimization model for air quality
mechanism and the IoT information flow-aware information dy- improvement in home IoT, Sensors 18 (4) (2018) 959–972.
namic interaction behavior, which realizes the clear expression of [7] D. Amaxilatis, O. Akrivopoulos, G. Mylonas, et al., An IoT-based solution for
monitoring a fleet of educational buildings focusing on energy efficiency,
the Internet of Things-aware overall structure system and system
Sensors 17 (10) (2017) 2296–2312.
process behavior. The whole measurement and control behavior [8] J. Wang, J.M. Li, Z. Ru, et al., Locating hazardous gas leaks in the
of the Internet of Things is transformed into MLD model. Large- atmosphere via modified genetic, MCMC and particle swarm optimization
scale information flow perception modeling and performance algorithms, Atmos. Environ. 157 (2017) 27–37.
optimization method based on queuing network for IoT is pro- [9] X. Xu, M. Chao, Z. Wang, A value-oriented iterative service modeling
process, Lect. Notes Bus. Inf. Process. 122 (2017) 104–116.
posed. The delay type queuing network delay analysis method is
[10] H. El-Sayed, S. Sankar, M. Prasad, et al., Edge of things: The big picture
used to obtain the sensor node. The best path and alternative path on the integration of edge, IoT and the cloud in a distributed computing
for data transfer can be realized by classifying and qualitatively environment, IEEE Access 6 (99) (2018) 1706–1717.
678
J. Liu, Y. Duan, Y. Wu et al. Future Generation Computer Systems 115 (2021) 671–679
[11] N. Jiang, Y. Deng, A. Nallanathan, et al., Reinforcement learning for real- Jian Liu was born in Jiangsu, China PRC in 1986. He
time optimization in NB-IoT networks, IEEE J. Sel. Areas Commun. 37 (6) received his Ph.D. degree in geotechnical engineering
(2019) 1–13. from Hohai University, China in 2015 and worked as
[12] P. Wang, F. Ye, X. Chen, A smart home gateway platform for data collection a PostDoc researcher in the Hong Kong University of
and perceptionness, IEEE Commun. Mag. 56 (9) (2018) 87–93. Science and Technology afterwards. He joined Hohai
University as an associate research in January 2018
[13] L. Liu, C. Zheng, X. Guo, et al., Multiobjective optimization for computation
and associate professor in 2019. He has published 35
offloading in fog computing, IEEE IoT J. 5 (1) (2018) 283–294.
papers and holds 11 patents. His research interests in-
[14] R. Zhang, J. Tao, Data-driven modeling using improved multi-objective clude unsaturated water flow in soil, internet of things
optimization based neural network for coke furnace system, IEEE Trans. in geotechnical engineering and soft soil foundation
Ind. Electron. 64 (4) (2017) 3147–3155. reinforcement technology. Email: [email protected]
[15] C. Yang, D. Puthal, S.P. Mohanty, et al., Big-perception-data curation for the
cloud is coming: A promise of scalable cloud-data-center mitigation for
next-generation IoT and wireless sensor networks, IEEE Consum. Electron.
Mag. 6 (4) (2017) 48–56. Yuanmin Duan was born in Anhui, China PCR in
[16] D. Shin, V. Sharma, J. Kim, et al., Secure and efficient protocol for route 1998. She received her B.E. degree in civil engineering
optimization in PMIPv6-based smart home IoT networks, IEEE Access 5 from Anhui Agricultural University, China in 2019 and
(99) (2017) 11100–11117. Currently studying for master’s degree in geotechnical
[17] L. Jian, L. Yun, Z. Zhang, et al., Towards green IoT networking: Performance engineering in Hohai University. Email: 17356515281@
optimization of network coding based communication and reliable storage, 163.com
IEEE Access 5 (99) (2017) 8780–8791.
[18] S. Guo, S. Shao, W. Yao, et al., Cross stratum resources protection in fog-
computing-based radio over fiber networks for 5G services, Opt. Fiber
Technol., Mater. Devices Syst. 37 (2017) 61–68.
[19] O. Alsaryrah, I. Mashal, T.Y. Chung, Bi-objective optimization for energy
perception IoT service composition, IEEE Access 6 (2018) 26809–26819.
[20] L. Xin, X. Zhang, Rate and energy efficiency improvements for 5G-based Yuedong Wu was born in Fujian, China PRC in 1969. He
IoT with simultaneous transfer, IEEE IoT J. 6 (4) (2019) 5971–5980. received his M.A. degree and Ph.D. degree in geotech-
[21] R. Deng, R. Lu, C. Lai, et al., Optimal workload allocation in fog-cloud nical engineering from Hohai University, China in 1999
computing toward balanced delay and power consumption, IEEE IoT J. 3 and 2008. He joined Hohai University as a full-time
(6) (2017) 1171–1181. lecturer in August 1995, and is currently the deputy di-
[22] L. He, K. Ota, M. Dong, Learning IoT in edge: Deep learning for the IoT rector of Geotechnical Engineering at Hohai University.
with edge computing, IEEE Netw. 32 (1) (2018) 96–101. His research interests include soft foundation treatment
and basic engineering and geotechnical engineering
[23] Y. Lin, J. Yang, Z. Lv, et al., A self-assessment stereo capture model
test technology. E-mail: [email protected]
applicable to the internet of things, Sensors 15 (8) (2015) 20925–20944.
[24] J. Li, G. Feng, W. Wei, et al., PSOTrack: A RFID-based system for ran-
dom moving objects tracking in unconstrained indoor environment, IEEE
Internet Things J. 5 (6) (2018) 4632–4641.
[25] W. Wei, M. Guizani, S.H. Ahmed, et al., Guest editorial: Special section on
Rui Chen was born in Fujian, China PRC in 1978. He
integration of big data and artificial intelligence for internet of things, IEEE
received his Ph.D. degree in civil engineering from
Trans. Ind. Inf. 16 (4) (2020) 2562–2565.
the Hong Kong University of Science and Technology,
[26] W. Wang, F. Xia, H. Nie, et al., Vehicle trajectory clustering based on China in 2007. He received his Bachelor degrees in
dynamic representation learning of internet of vehicles, IEEE Trans. Intell. hydraulic and hydro-Power Engineering from Tsinghua
Transp. Syst. (2020) http://dx.doi.org/10.1109/TITS.2020.2995856. University in 2001. He joined Harbin Institute of Tech-
[27] F.G. Brundu, E. Patti, A. Osello, et al., IoT software infrastructure for energy nology, Shenzhen as an associate professor in 2011 and
management and simulation in smart cities, IEEE Trans. Ind. Inf. 13 (2) professor in 2019. E-mail: [email protected]
(2017) 832–840.
[28] R. Mahmud, K. Ramamohanarao, R. Buyya, Latency-perception application
module management for fog computing environments, Acm Trans. Internet
Technol. 19 (1) (2018) 1–21.
[29] T. Roubicek, G. Tomassetti, Thermomechanics of hydrogen storage in Liang Chen, male, born in Jiangsu Province of PR.
metallic hydrides: modeling and analysis, Discrete Contin. Dyn. Syst. Ser. China in October 1976, Professor of Hohai University of
B 19 (7) (2017) 2313–2333. China. Graduated from Physics Department of Nanjing
[30] A. Alelaiwi, A collaborative resource management for big IoT data University in 1996. Research direction include: seepage
processing in Cloud, Cluster Comput. 20 (5) (2017) 1–9. theory and leakage test; seepage deformation mecha-
[31] G. Liang, J. Qiu, Optimization technology in cloud manufacturing, Int. J. nism; solute transport theory and solid waste landfill
Adv. Manuf. Technol. 97 (2) (2018) 1–13. underground pollution test. Email: [email protected].
[32] C. Tang, X. Wei, S. Xiao, et al., A mobile cloud based scheduling strategy cn
for industrial IoT, IEEE Access 6 (99) (2018) 7262–7275.
[33] L. Deng, D. Li, Z. Cai, et al., Smart IoT information transmission and security
optimization model based on chaotic neural computing, Neural Comput.
Appl. 2019 (2) (2019) 1–14.
[34] M.C. Chen, S.Q. Lu, Q.L. Liu, Uniform regularity for a Keller–Segel–Navier– Geng Chen was born in Shandong, China PRC in
Stokes system, Appl. Math. Lett. 107 (2020) 106476. 1987. He received his Ph.D. degree in geotechnical
[35] M.C. Chen, S.Q. Lu, Q.L. Liu, Global regularity for a 2D model of electro- engineering from Hohai University, China in 2015 and
kinetic fluid in a bounded domain, Acta Math. Appl. Sin. Engl. Ser. 34 (2) joined Hohai University April 2016. He has published
(2018) 398–403. 19 papers and holds 15 patents. His research inter-
ests include ultra-soft soil consolidation, foundation
[36] A. Quilliot, H. Toussaint, Prospective network flow models and algorithms
treatment and environmental geotechnical engineering.
for bin packing problems, Electron. Notes Discrete Math. 36 (2018) 49–56.
Email: [email protected]
[37] D. Shuang, H. Xin, J. Wang, Multiobjective optimization model for service
node selection based on a tradeoff between quality of service and resource
consumption in mobile crowd perception, IEEE IoT J. 4 (1) (2017) 258–268.
679