<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.1 20151215//EN" "http://jats.nlm.nih.gov/publishing/1.1/JATS-journalpublishing1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.1">
<front>
<journal-meta>
<journal-id journal-id-type="pmc">CSSE</journal-id>
<journal-id journal-id-type="nlm-ta">CSSE</journal-id>
<journal-id journal-id-type="publisher-id">CSSE</journal-id>
<journal-title-group>
<journal-title>Computer Systems Science &#x0026; Engineering</journal-title>
</journal-title-group>
<issn pub-type="ppub">0267-6192</issn>
<publisher>
<publisher-name>Tech Science Press</publisher-name>
<publisher-loc>USA</publisher-loc>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">28269</article-id>
<article-id pub-id-type="doi">10.32604/csse.2023.028269</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Article</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Hierarchical Data Aggregation with Data Offloading Scheme for Fog Enabled IoT Environment</article-title><alt-title alt-title-type="left-running-head">Hierarchical Data Aggregation with Data Offloading Scheme for Fog Enabled IoT Environment</alt-title><alt-title alt-title-type="right-running-head">Hierarchical Data Aggregation with Data Offloading Scheme for Fog Enabled IoT Environment</alt-title>
</title-group>
<contrib-group content-type="authors">
<contrib id="author-1" contrib-type="author" corresp="yes">
<name name-style="western"><surname>Nalayini</surname><given-names>P.</given-names></name>
<xref ref-type="aff" rid="aff-1">1</xref><email>nalav79@gmail.com</email>
</contrib>
<contrib id="author-2" contrib-type="author">
<name name-style="western"><surname>Arun Prakash</surname><given-names>R.</given-names></name>
<xref ref-type="aff" rid="aff-2">2</xref>
</contrib>
<aff id="aff-1"><label>1</label><institution>Department of Computer Science and Engineering, Kings College of Engineering</institution>, <addr-line>Punalkulam, 613303, Tamilnadu</addr-line>, <country>India</country></aff>
<aff id="aff-2"><label>2</label><institution>Department of Computer Science and Engineering, University College of Engineering</institution>, <addr-line>Ariyalur, 621704, Tamilnadu</addr-line>, <country>India</country></aff>
</contrib-group><author-notes><corresp id="cor1"><label>&#x002A;</label>Corresponding Author: P. Nalayini. Email: <email>nalav79@gmail.com</email></corresp></author-notes>
<pub-date pub-type="epub" date-type="pub" iso-8601-date="2022-06-20"><day>20</day>
<month>06</month>
<year>2022</year></pub-date>
<volume>44</volume>
<issue>3</issue>
<fpage>2033</fpage>
<lpage>2047</lpage>
<history>
<date date-type="received"><day>06</day><month>2</month><year>2022</year></date>
<date date-type="accepted"><day>10</day><month>3</month><year>2022</year></date>
</history>
<permissions>
<copyright-statement>&#x00A9; 2023 Nalayini and Arun Prakash</copyright-statement>
<copyright-year>2023</copyright-year>
<copyright-holder>Nalayini and Arun Prakash</copyright-holder>
<license xlink:href="https://creativecommons.org/licenses/by/4.0/">
<license-p>This work is licensed under a <ext-link ext-link-type="uri" xlink:type="simple" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution 4.0 International License</ext-link>, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.</license-p>
</license>
</permissions>
<self-uri content-type="pdf" xlink:href="TSP_CSSE_28269.pdf"></self-uri>
<abstract>
<p>Fog computing is a promising technology that has been emerged to handle the growth of smart devices as well as the popularity of latency-sensitive and location-awareness Internet of Things (IoT) services. After the emergence of IoT-based services, the industry of internet-based devices has grown. The number of these devices has raised from millions to billions, and it is expected to increase further in the near future. Thus, additional challenges will be added to the traditional centralized cloud-based architecture as it will not be able to handle that growth and to support all connected devices in real-time without affecting the user experience. Conventional data aggregation models for Fog enabled IoT environments possess high computational complexity and communication cost. Therefore, in order to resolve the issues and improve the lifetime of the network, this study develops an effective hierarchical data aggregation with chaotic barnacles mating optimizer (HDAG-CBMO) technique. The HDAG-CBMO technique derives a fitness function from many relational matrices, like residual energy, average distance to neighbors, and centroid degree of target area. Besides, a chaotic theory based population initialization technique is derived for the optimal initial position of barnacles. Moreover, a learning based data offloading method has been developed for reducing the response time to IoT user requests. A wide range of simulation analyses demonstrated that the HDAG-CBMO technique has resulted in balanced energy utilization and prolonged lifetime of the Fog assisted IoT networks.</p>
</abstract>
<kwd-group kwd-group-type="author">
<kwd>Internet of things</kwd>
<kwd>fog computing</kwd>
<kwd>barnacles mating optimizer</kwd>
<kwd>data offloading</kwd>
<kwd>data aggregation</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="s1">
<label>1</label>
<title>Introduction</title>
<p>IoT is an emerging technology in Information and Technology (IT) [<xref ref-type="bibr" rid="ref-1">1</xref>]. It is a group of internet-connected embedding devices which can able to sense and transmit information from one place to other without human intervention [<xref ref-type="bibr" rid="ref-2">2</xref>]. IoT refers to things that are interconnected to the internet through transmission technology including near field communication, wireless sensor network, Bluetooth, and radio frequency identification. IoT gives a number of advantages in each aspect of human life. IoT application includes industrial Internet, smart homes, smart cities, smart supply chains, smart grids, connected health, wearables, connected cars, smart retail, smart farming, and so on [<xref ref-type="bibr" rid="ref-3">3</xref>]. With the increasing demand for user applications, transmission technology plays a significant role in computing services. Fog computing is a transmission-support model that expands cloud service and application to the network edge. The user under the network edge utilizes the application, platform, and service of cloud service in an interoperable way [<xref ref-type="bibr" rid="ref-4">4</xref>]. A fog layer is widely deployed among the user plane and the cloud to ease access, service sharing, and computing prospects. Fog is a decentralized computing model developed for avoiding latency problems in cloud resource sharing and allocation. Like cloud layer, the fog layer comprises devoted gateways and servers for accepting user requests and processing them. The device includes switches, routers, access points, and servers with smart computing capability are the element of fog layer [<xref ref-type="bibr" rid="ref-5">5</xref>]. The incorporation of multilevel service and computing paradigms enhances the reliability of the transmission method. Nonetheless, data processing and resolving difficult problems remains a challenge in accomplishing appropriate optimization. Decision-making and Processing techniques and algorithms are required to enhance the optimization rate. <xref ref-type="fig" rid="fig-1">Fig. 1</xref> illustrates the process of fog enabled IoT environment.</p>
<fig id="fig-1">
<label>Figure 1</label>
<caption>
<title>Fog enabled IoT environment</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_28269-fig-1.png"/>
</fig>
<p>Energy is a limited resource in IoT. Thus, energy preservation is a major problem in IoT [<xref ref-type="bibr" rid="ref-6">6</xref>]. Various methods are presented for redoing energy utilization in IoT. Sleeping mechanisms, Energy-aware routing, data aggregation, and congestion-aware routing have been presented approaches in IoT. In energy-aware routing, the present protocol contains node reliance techniques, energy-aware solar routing, data-driven approaches, multihop hierarchical clustering, duty cycling for extending lifetime of the network [<xref ref-type="bibr" rid="ref-7">7</xref>]. It can be fundamental process for saving energy and eliminating redundant data [<xref ref-type="bibr" rid="ref-8">8</xref>]. As well, it expanded lifetime of the network [<xref ref-type="bibr" rid="ref-9">9</xref>]. This technique is appropriate for some applications including gas leakage monitoring and temperature monitoring. The current data aggregation technique is region-based routing and clustering for reducing duplicate data communication over the network [<xref ref-type="bibr" rid="ref-10">10</xref>]. This study presents a new hierarchical data aggregation with chaotic barnacles mating optimizer (HDAG-CBMO) technique for fog assisted WSN. The HDAG-CBMO technique computes a fitness function using several relational matrices such as residual energy, average distance to neighbors, and centroid degree of target area. Moreover, a chaotic theory based population initialization technique is computed to optimally select the barnacle&#x0027;s initial positions. Furthermore, a learning based data offloading method is designed for reducing the response time to IoT user requests. In order to ensure the enhanced outcomes of the fog assisted WSN, a comprehensive simulation analysis was performed and the results are inspected under several aspects.</p>
</sec>
<sec id="s2">
<label>2</label>
<title>Literature Review</title>
<p>Alli et al. [<xref ref-type="bibr" rid="ref-11">11</xref>] presented a secure computation off-loading method from Fog-Cloud-IoT environment (SecOFF-FCIoT). Utilizing ML approaches, it can be accomplishing effectual, secured offloading from Fog-IoT setting. In specific, it can be utilized Neuro-Fuzzy Method for securing information at the smart gateway, afterward, the IoT devices choose a better Fog node for that it is offloading their workload utilizing PSO utilized smart gateway. Daraghmi et al. [<xref ref-type="bibr" rid="ref-12">12</xref>] presented the Client-Fog-Cloud (CFC) multilayer data process and aggregation infrastructure which is planned for promoting latency-sensitive applications from the IoT contexts. The infrastructure has been planned for addressing the present IoT based challenge: an extensive distribution, huge uploaded, minimal latency, and real time interface. The presented infrastructure has of device gateway, fog servers, and clouds. Wang et al. [<xref ref-type="bibr" rid="ref-13">13</xref>] progressed the task-driven data offloading (TDO) technique from urban IoT service. Especially, a 3-layer urban IoT service infrastructure has been presented, and the TDO procedure has been expressed as combination optimized issue taking task deadlines and capabilities of fog device as to consideration. Afterward, it is demonstrated the TDO issue has NP-hard, and G-TDO technique has been developed for solving it with carefully planned utility function. In [<xref ref-type="bibr" rid="ref-14">14</xref>], the role of context or condition for performing the offloading has been considered and drawn to end which for meeting the efficacy requirement of IoT enabled service, context-based offloading is role an important play. In several existing structures EMCO, MobiCOP-IoT, Autonomic Management structure, CSOS, Fog Computing structure dependent upon its novelty and optimal efficiency are taken to execution analysis. Hossen et al. [<xref ref-type="bibr" rid="ref-15">15</xref>] utilized a Spark based big data processing scheme (BDPS) for accelerating the distributed database (RDD) delay effectual approach from the fog to a decentralized heterogeneous network structure for reinforcing appropriate data allocation utilizing IoTs. It can be present BDPS dependent upon Spark-RDD from the fog-IoT overlay structure for addressing the efficacy issue across the network orchestration. Chen et al. [<xref ref-type="bibr" rid="ref-16">16</xref>] examined the privacy and energy co-aware data aggregation compute offloading to fog assists IoT network. In detail, a fog supported 3-layer security compute structure was established for counteracting security threats and allowing the aggregation function is executed from ciphertext. In the meantime, a drive gradient descent based energy effective offloading decision technique has been established for minimizing the entire energy utilization of computation tasks that attains an optimum value with fast convergence rate.</p>
</sec>
<sec id="s3">
<label>3</label>
<title>The Proposed Model</title>
<p>In this study, an effective HDAG-CBMO algorithm has been developed for data aggregation and data offloading processes in the fog assisted WSN. The HDAG-CBMO technique computes a fitness function using several relational matrices such as residual energy, average distance to neighbors, and centroid degree of target area. At last, a learning based data offloading method is designed for reducing the response time to IoT user requests.</p>
<sec id="s3_1">
<label>3.1</label>
<title>Data Aggregation Scheme</title>
<p>Barnacles are microbes which get involved in the objects that exist from the water. They have the major characteristics of lengthy penis. The mating process includes all neighbors and competitors who exist in the reaching area of the penis. The BMO approach was stimulated by the mating nature of the barnacles [<xref ref-type="bibr" rid="ref-17">17</xref>]. It involves three stages of operations such as initialization, selection, and reproduction. At the initial stage, the barnacles are considered as candidate solutions where the population matrix is defined by <xref ref-type="disp-formula" rid="eqn-1">Eq. (1)</xref>. Followed by, the mating of the chosen parents takes place using <xref ref-type="disp-formula" rid="eqn-2">Eqs. (2)</xref> and <xref ref-type="disp-formula" rid="eqn-3">(3)</xref>.</p>
<p><disp-formula id="eqn-1"><label>(1)</label>
<mml:math id="mml-eqn-1" display="block"><mml:mi>X</mml:mi><mml:mo>=</mml:mo><mml:mrow><mml:mo>[</mml:mo><mml:mrow><mml:mtable rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mn>1</mml:mn><mml:mn>1</mml:mn></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x22EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mn>1</mml:mn><mml:mi>n</mml:mi></mml:msubsup></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mo>&#x22EE;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x22F1;</mml:mo></mml:mtd><mml:mtd><mml:mo>&#x22EE;</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mi>N</mml:mi><mml:mn>1</mml:mn></mml:msubsup></mml:mrow></mml:mtd><mml:mtd><mml:mo>&#x22EF;</mml:mo></mml:mtd><mml:mtd><mml:mrow><mml:msubsup><mml:mi>x</mml:mi><mml:mi>N</mml:mi><mml:mi>n</mml:mi></mml:msubsup></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo>]</mml:mo></mml:mrow><mml:mspace width="thickmathspace" /></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-2"><label>(2)</label>
<mml:math id="mml-eqn-2" display="block"><mml:mi>b</mml:mi><mml:mi>a</mml:mi><mml:mi>r</mml:mi><mml:mi>n</mml:mi><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:msub><mml:mi>e</mml:mi><mml:mo>&#x2212;</mml:mo></mml:msub><mml:mi>d</mml:mi><mml:mo>=</mml:mo><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mi>p</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>m</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>N</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mspace width="thickmathspace" /></mml:math>
</disp-formula></p>
<p><disp-formula id="eqn-3"><label>(3)</label>
<mml:math id="mml-eqn-3" display="block"><mml:mi>b</mml:mi><mml:mi>a</mml:mi><mml:mi>r</mml:mi><mml:mi>n</mml:mi><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:msub><mml:mi>e</mml:mi><mml:mo>&#x2212;</mml:mo></mml:msub><mml:mi>m</mml:mi><mml:mo>=</mml:mo><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mi>p</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>m</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mi>N</mml:mi><mml:mo stretchy="false">)</mml:mo><mml:mspace width="thickmathspace" /></mml:math>
</disp-formula></p>
<p>where <italic>N</italic> denotes barnacle count, <italic>n</italic> indicates control variable count, <italic>barnacle</italic><sub>&#x2212;</sub><italic>d</italic> and <italic>barnacle</italic><sub>&#x2212;</sub><italic>m</italic> represent the parent&#x0027;s undergone mating process. As there exist no particular formulations in deriving the productivity of barnacles. It is noted that the penis length (<italic>pl</italic>) acts as an essential part in computing the exploitation and exploration process. When the choice of barnacles mating exists in the range of <italic>pl</italic> of <italic>Dad</italic> barnacle, the exploitation procedure is carried out. The process involved in the generation of new parameters of offspring from barnacle parents is defined as follows.<disp-formula id="eqn-4"><label>(4)</label>
<mml:math id="mml-eqn-4" display="block"><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mrow><mml:msub><mml:mi>N</mml:mi><mml:mo>&#x2212;</mml:mo></mml:msub><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:mi>p</mml:mi><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>b</mml:mi><mml:mi>a</mml:mi><mml:mi>r</mml:mi><mml:mi>n</mml:mi><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:msub><mml:mi>e</mml:mi><mml:mo>&#x2212;</mml:mo></mml:msub><mml:mi>d</mml:mi></mml:mrow><mml:mi>N</mml:mi></mml:msubsup><mml:mo>+</mml:mo><mml:mi>q</mml:mi><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>b</mml:mi><mml:mi>a</mml:mi><mml:mi>r</mml:mi><mml:mi>n</mml:mi><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:msub><mml:mi>e</mml:mi><mml:mo>&#x2212;</mml:mo></mml:msub><mml:mi>m</mml:mi></mml:mrow><mml:mi>N</mml:mi></mml:msubsup><mml:mspace width="thickmathspace" /></mml:math>
</disp-formula></p>
<p>where <italic>p</italic> denotes uniform distribution number, <inline-formula id="ieqn-1">
<mml:math id="mml-ieqn-1"><mml:mi>q</mml:mi><mml:mo>=</mml:mo><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:mi>p</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mspace width="thinmathspace" /><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>b</mml:mi><mml:mi>a</mml:mi><mml:mi>r</mml:mi><mml:mi>n</mml:mi><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:msub><mml:mi>e</mml:mi><mml:mo>&#x2212;</mml:mo></mml:msub><mml:mi>d</mml:mi></mml:mrow><mml:mi>N</mml:mi></mml:msubsup></mml:math>
</inline-formula> and <inline-formula id="ieqn-2">
<mml:math id="mml-ieqn-2"><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>b</mml:mi><mml:mi>a</mml:mi><mml:mi>r</mml:mi><mml:mi>n</mml:mi><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:msub><mml:mi>e</mml:mi><mml:mo>&#x2212;</mml:mo></mml:msub><mml:mi>m</mml:mi></mml:mrow><mml:mi>N</mml:mi></mml:msubsup></mml:math>
</inline-formula> represents parameter of <italic>Dad</italic> and Mum barnacles t. Also, <italic>p</italic> and <italic>q</italic> represent the genotype frequency of <italic>Dad</italic> and Mum barnacles in newly obtained offspring. In BMO, sperm casting can be considered as the exploration procedure that can be defined using <xref ref-type="disp-formula" rid="eqn-5">Eq. (5)</xref>.<disp-formula id="eqn-5"><label>(5)</label>
<mml:math id="mml-eqn-5" display="block"><mml:msubsup><mml:mi>x</mml:mi><mml:mi>i</mml:mi><mml:mrow><mml:msub><mml:mi>n</mml:mi><mml:mo>&#x2212;</mml:mo></mml:msub><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mi>w</mml:mi></mml:mrow></mml:msubsup><mml:mo>=</mml:mo><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>n</mml:mi><mml:mi>d</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mspace width="thickmathspace" /><mml:mo stretchy="false">)</mml:mo><mml:mo>&#x00D7;</mml:mo><mml:msubsup><mml:mi>x</mml:mi><mml:mrow><mml:mi>b</mml:mi><mml:mi>a</mml:mi><mml:mi>r</mml:mi><mml:mi>n</mml:mi><mml:mi>a</mml:mi><mml:mi>c</mml:mi><mml:mi>l</mml:mi><mml:msub><mml:mi>e</mml:mi><mml:mo>&#x2212;</mml:mo></mml:msub><mml:mi>m</mml:mi></mml:mrow><mml:mi>n</mml:mi></mml:msubsup><mml:mspace width="thickmathspace" /></mml:math>
</disp-formula></p>
<p>where rand () implies arbitrary number in the range of [0, 1]. It is noted that newly created offspring is represented as Mum barnacle as it attains that the sperms are released to the water by other barnacles. At this point, the barnacle&#x0027;s location can be upgraded using <xref ref-type="disp-formula" rid="eqn-4">Eqs. (4)</xref> or <xref ref-type="disp-formula" rid="eqn-5">(5)</xref>. <xref ref-type="fig" rid="fig-2">Fig. 2</xref> depicts the flowchart of BMO.</p>
<fig id="fig-2">
<label>Figure 2</label>
<caption>
<title>Flowchart of BMO</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_28269-fig-2.png"/>
</fig>
<p>Besides, a chaotic theory based population initialization [<xref ref-type="bibr" rid="ref-18">18</xref>] technique is computed to optimally select the barnacle&#x0027;s initial positions. During random optimization algorithm, chaotic variable is used in place of random variable and is named as chaotic optimization algorithm (COA). Due to the fact that the chaos holds the characteristics of non-repetition and ergodicity, it carries out entire searching process at maximum speed compared to stochastic searching process which is based on probability. To accomplish this, 1-D non-invertible maps is applied for producing chaotic set. In [<xref ref-type="bibr" rid="ref-19">19</xref>], the model investigation of energy utilization is conducted and an optimal amount of CHs are attained as:<disp-formula id="eqn-6"><label>(6)</label>
<mml:math id="mml-eqn-6" display="block"><mml:msub><mml:mi>k</mml:mi><mml:mrow><mml:mi>o</mml:mi><mml:mi>p</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mi>M</mml:mi><mml:msqrt><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mi>N</mml:mi><mml:msub><mml:mi>&#x03F5;</mml:mi><mml:mrow><mml:mi>f</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mrow><mml:mn>2</mml:mn><mml:mi>&#x03C0;</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>&#x03F5;</mml:mi><mml:mrow><mml:mi>m</mml:mi><mml:mi>p</mml:mi></mml:mrow></mml:msub><mml:msubsup><mml:mi>d</mml:mi><mml:mrow><mml:mi>t</mml:mi><mml:mi>o</mml:mi><mml:mi>B</mml:mi><mml:mi>S</mml:mi></mml:mrow><mml:mn>4</mml:mn></mml:msubsup><mml:mo>&#x2212;</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mi>e</mml:mi><mml:mi>l</mml:mi><mml:mi>e</mml:mi><mml:mi>c</mml:mi></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:msqrt><mml:mspace width="thickmathspace" /></mml:math>
</disp-formula></p>
<p>where <italic>N</italic> refers the entire amount of sensor nodes from the area and <italic>M</italic> represents the border length of square monitored region. In order to resolve an optimum issue, the explanation of FFs is role an important play in the feature of algorithm efficacy. In order for CHs, an essential task is for collecting information in their member node. So, it should not only have superior RE, for keeping the lesser the average distance to every node from its clusters. In addition, for preventing the place of CHs at the edge of clusters, it is ensured as nearer feasible to the center of region that is shorten the distance in member nodes fundamentally. According to above study, many estimation issues are evaluated and the Equivalent equation is provided as:<disp-formula id="eqn-7"><label>(7)</label>
<mml:math id="mml-eqn-7" display="block"><mml:mrow><mml:mo>{</mml:mo><mml:mtable rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd columnalign="left"><mml:msub><mml:mi>f</mml:mi><mml:mn>1</mml:mn></mml:msub><mml:mo>=</mml:mo><mml:munderover><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>N</mml:mi></mml:munderover><mml:mo>&#x2061;</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mn>0</mml:mn></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>n</mml:mi><mml:mi>i</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:munderover><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mi>K</mml:mi></mml:munderover><mml:mo>&#x2061;</mml:mo><mml:msub><mml:mi>E</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>n</mml:mi><mml:mi>j</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mtd></mml:mtr><mml:mtr><mml:mtd columnalign="left"><mml:msub><mml:mi>f</mml:mi><mml:mn>2</mml:mn></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mi mathvariant="normal">m</mml:mi><mml:mi mathvariant="normal">a</mml:mi></mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">x</mml:mi></mml:mrow><mml:mrow><mml:mi>k</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x22EF;</mml:mo><mml:mo>,</mml:mo><mml:mi>K</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo>{</mml:mo><mml:mrow><mml:munder><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mi>n</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow></mml:munder><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:mi>d</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>n</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mi>C</mml:mi><mml:msub><mml:mi>H</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mrow><mml:msub><mml:mi>C</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo></mml:mrow></mml:mfrac></mml:mrow></mml:mstyle></mml:mrow><mml:mo>}</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd columnalign="left"><mml:msub><mml:mi>f</mml:mi><mml:mn>3</mml:mn></mml:msub><mml:mo>=</mml:mo><mml:mrow><mml:mi mathvariant="normal">m</mml:mi><mml:mi mathvariant="normal">i</mml:mi></mml:mrow><mml:msub><mml:mrow><mml:mi mathvariant="normal">n</mml:mi></mml:mrow><mml:mrow><mml:mi>k</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>,</mml:mo><mml:mn>2</mml:mn><mml:mo>,</mml:mo><mml:mo>&#x22EF;</mml:mo><mml:mo>,</mml:mo><mml:mi>K</mml:mi></mml:mrow></mml:msub><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mrow><mml:mo fence="false" stretchy="false">{</mml:mo><mml:mi>C</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>n</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:msub><mml:mi>C</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo fence="false" stretchy="false">}</mml:mo></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd columnalign="left"><mml:mi>C</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>n</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:msub><mml:mi>C</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>=</mml:mo><mml:msqrt><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mrow><mml:msub><mml:mi>C</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo></mml:mrow></mml:mfrac></mml:mrow><mml:munderover><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:mi>j</mml:mi><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow><mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mrow><mml:msub><mml:mi>C</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo></mml:mrow></mml:munderover><mml:mo>&#x2061;</mml:mo><mml:msub><mml:mi>x</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mn>2</mml:mn></mml:msup></mml:mstyle></mml:mrow><mml:mo>+</mml:mo><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x2212;</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mrow><mml:msub><mml:mi>C</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo></mml:mrow></mml:mfrac></mml:mrow><mml:munderover><mml:mrow><mml:mo movablelimits="false">&#x2211;</mml:mo></mml:mrow><mml:mrow><mml:msup><mml:mi>J</mml:mi><mml:mrow><mml:mo>=</mml:mo><mml:mn>1</mml:mn></mml:mrow></mml:msup></mml:mrow><mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo><mml:mrow><mml:msub><mml:mi>C</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mo fence="false" stretchy="false">|</mml:mo></mml:mrow></mml:munderover><mml:mo>&#x2061;</mml:mo><mml:msub><mml:mi>y</mml:mi><mml:mi>j</mml:mi></mml:msub><mml:msup><mml:mo stretchy="false">)</mml:mo><mml:mn>2</mml:mn></mml:msup></mml:mstyle></mml:mrow></mml:msqrt></mml:mtd></mml:mtr></mml:mtable><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo></mml:mrow></mml:math>
</disp-formula></p>
<p>where the sensor node <italic>n</italic><sub><italic>j</italic></sub> goes to cluster <italic>C</italic><sub><italic>k</italic></sub>, and &#x007C;<italic>C</italic><sub><italic>k</italic></sub>&#x007C; implies the amount of nodes from the cluster <italic>C</italic><sub><italic>k</italic></sub>.&#x2005;<italic>d</italic>(<italic>n</italic><sub><italic>j</italic></sub>, <italic>CH</italic><sub><italic>k</italic></sub>) stands for the distance amongst the member nodes <italic>n</italic><sub><italic>i</italic></sub> and their CH. In addition, <inline-formula id="ieqn-3">
<mml:math id="mml-ieqn-3"><mml:mi>C</mml:mi><mml:mi>o</mml:mi><mml:msub><mml:mi>r</mml:mi><mml:mrow><mml:msub><mml:mi>n</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>C</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow></mml:msub><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>n</mml:mi><mml:mi>i</mml:mi></mml:msub><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /><mml:mi>C</mml:mi><mml:msub><mml:mi>H</mml:mi><mml:mi>k</mml:mi></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:math>
</inline-formula> refers the node centrality function that refers the degree of proximity amongst node and their neighbors. <italic>x</italic><sub><italic>j</italic></sub> and <italic>y</italic><sub><italic>j</italic></sub> signify the <italic>x</italic>- and <italic>y</italic>-axis coordinates correspondingly.</p>
</sec>
<sec id="s3_2">
<label>3.2</label>
<title>Data Offloading Process</title>
<p>During the offloading method, significant data has been provided to requested user. Also, the procedures exceeding the capacity of devices were shared through the neighbors to parallel computation. It can be minimized overloading of devices with decreasing data and task congestion rate with lesser delay. The benefit of ML was more extended to connections amongst the fog layer and end user from the user layer. To the observed <italic>s</italic><sub><italic>a</italic></sub> accumulated data, appropriate offloading has vital for preventing data unallocation and minimizing retrieval times. The fog element assigned the sensed data to the request in the user layers. The sensed data has been made in the cloud by fog components for minimizing the request waiting time [<xref ref-type="bibr" rid="ref-20">20</xref>]. Assume <italic>P</italic><sub><italic>ij</italic></sub> be present the probability to end user devices request being mapped to <italic>j</italic><sup><italic>th</italic></sup> fog component<disp-formula id="eqn-8"><label>(8)</label>
<mml:math id="mml-eqn-8" display="block"><mml:mrow><mml:mo fence="true" stretchy="true" symmetric="true"></mml:mo><mml:mrow><mml:mtable rowspacing="4pt" columnspacing="1em"><mml:mtr><mml:mtd columnalign="left"><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mspace width="thickmathspace" /><mml:mi>i</mml:mi><mml:mi>f</mml:mi><mml:mspace width="thickmathspace" /><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>q</mml:mi><mml:mi>u</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mspace width="thickmathspace" /><mml:mi>i</mml:mi><mml:mspace width="thickmathspace" /><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mspace width="thickmathspace" /><mml:mi>m</mml:mi><mml:mi>a</mml:mi><mml:mi>p</mml:mi><mml:mi>p</mml:mi><mml:mi>e</mml:mi><mml:mi>d</mml:mi><mml:mspace width="thickmathspace" /><mml:mi>j</mml:mi></mml:mrow></mml:mtd></mml:mtr><mml:mtr><mml:mtd columnalign="left"><mml:mrow><mml:msub><mml:mi>P</mml:mi><mml:mrow><mml:mi>i</mml:mi><mml:mi>j</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mn>0</mml:mn><mml:mspace width="thickmathspace" /><mml:mi>o</mml:mi><mml:mi>t</mml:mi><mml:mi>h</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>w</mml:mi><mml:mi>i</mml:mi><mml:mi>s</mml:mi><mml:mi>e</mml:mi></mml:mrow></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo>}</mml:mo></mml:mrow><mml:mspace width="thickmathspace" /></mml:math>
</disp-formula></p>
<p>Since the request space of fog component has been restricted, the optimality of making sure <italic>P</italic><sub><italic>ij</italic></sub>&#x2009;&#x003D;&#x2009;1 has shown with request arrival rate (<italic>ra</italic><sub><italic>r</italic></sub>). The request arrival rate has been calculated utilizing in <xref ref-type="disp-formula" rid="eqn-9">Eq. (9)</xref>,<disp-formula id="eqn-9"><label>(9)</label>
<mml:math id="mml-eqn-9" display="block"><mml:mi>r</mml:mi><mml:msub><mml:mi>a</mml:mi><mml:mi>r</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:msubsup><mml:mi>r</mml:mi><mml:mi>n</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msubsup><mml:msub><mml:mi>t</mml:mi><mml:mi>r</mml:mi></mml:msub><mml:mspace width="thickmathspace" /></mml:math>
</disp-formula></p>
<p>where <italic>r</italic><sub><italic>n</italic></sub> refers the amount of requests transferred at time <italic>t</italic><sub><italic>r</italic></sub>. Assume <italic>c</italic><sub><italic>j</italic></sub> implies the capacity of <italic>j</italic><sup><italic>th</italic></sup> fog component; otherwise, if <italic>ra</italic><sub><italic>r</italic></sub>&#x2009;&#x003E;&#x2009;<italic>c</italic><sub><italic>j</italic></sub>, the fog component offloads request to their neighbor. The offloading of user requests improves the waiting time before dropping. The aggregation rate has irrespective of the amount of end users and requests. For improving the consistency of responses and the service utility rate, downloaded or data access success was evaluated. Assume <italic>d</italic><sub><italic>p</italic></sub> represent the download probability of end users that is evaluated utilizing in <xref ref-type="disp-formula" rid="eqn-10">Eq. (10)</xref>:<disp-formula id="eqn-10"><label>(10)</label>
<mml:math id="mml-eqn-10" display="block"><mml:msub><mml:mi>d</mml:mi><mml:mi>p</mml:mi></mml:msub><mml:mo>=</mml:mo><mml:mn>1</mml:mn><mml:mo>&#x2212;</mml:mo><mml:munder><mml:mrow><mml:mo movablelimits="false">&#x220F;</mml:mo></mml:mrow><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x2208;</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mi>a</mml:mi></mml:msub></mml:mrow></mml:munder><mml:mo>&#x2061;</mml:mo><mml:msup><mml:mi>e</mml:mi><mml:mrow><mml:mo>&#x2212;</mml:mo><mml:mi>r</mml:mi><mml:msub><mml:mi>a</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msup><mml:mspace width="thickmathspace" /></mml:math>
</disp-formula></p>
<p>The ratio of downloading <italic>d</italic><sub><italic>rat</italic></sub> is then calculated utilizing<disp-formula id="eqn-11"><label>(11)</label>
<mml:math id="mml-eqn-11" display="block"><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:mstyle displaystyle="true" scriptlevel="0"><mml:mrow><mml:mfrac><mml:mrow><mml:msub><mml:mi>r</mml:mi><mml:mi>n</mml:mi></mml:msub></mml:mrow><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mi>a</mml:mi></mml:msub><mml:msub><mml:mrow><mml:mo>/</mml:mo></mml:mrow><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>a</mml:mi></mml:msub></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:mrow><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /></mml:mstyle></mml:math>
</disp-formula></p>
<p>where <italic>d</italic><sub><italic>a</italic></sub> stands for the data accumulated at <italic>t</italic><sub><italic>a</italic></sub> intervals and <italic>r</italic><sub><italic>n</italic></sub> signifies the amount of requests in the user layer. At this point, the ML procedure started from the previous interface has been modeled for working from the recursive approach. The <italic>d</italic><sub><italic>rat</italic></sub> attained from the preceding iterate was make sure at all iterates with minimal route cost. The procedure of recursive learning interms of the consideration of <italic>d</italic><sub><italic>rat</italic></sub>. The learning procedure was planned for achieving a superior <italic>d</italic><sub><italic>rat</italic></sub> for <italic>d</italic><sub><italic>a</italic></sub> and <italic>t</italic><sub><italic>a</italic></sub> with gathering information in <italic>s</italic><sub><italic>a</italic></sub> out of <italic>s</italic><sub><italic>i</italic></sub> sensors. In particular, for <italic>s</italic><sub><italic>a</italic></sub> sensor, the route cost has <inline-formula id="ieqn-4">
<mml:math id="mml-ieqn-4"><mml:msubsup><mml:mi>r</mml:mi><mml:mi>c</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msubsup></mml:math>
</inline-formula> with minimal errors.</p>
<p>This procedure of learning are distinct in convention neural learning [<xref ref-type="bibr" rid="ref-21">21</xref>,<xref ref-type="bibr" rid="ref-22">22</xref>] since it can be structured for deriving the particular <inline-formula id="ieqn-5">
<mml:math id="mml-ieqn-5"><mml:msubsup><mml:mi>r</mml:mi><mml:mi>c</mml:mi><mml:mo>&#x2217;</mml:mo></mml:msubsup></mml:math>
</inline-formula> with assuming <italic>d</italic><sub><italic>rat</italic></sub> as the learning constraints. Likewise, the learning constraint is utilized to train the input at all transitions; during this case, the hidden layer was optimizing dependent upon the learning constraints. The response time <italic>t</italic><sub><italic>res</italic></sub> to offloading <italic>d</italic><sub><italic>a</italic></sub> to request <italic>r</italic><sub><italic>n</italic></sub> has calculated utilizing in <xref ref-type="disp-formula" rid="eqn-12">Eq. (12)</xref>.<disp-formula id="eqn-12"><label>(12)</label>
<mml:math id="mml-eqn-12" display="block"><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi></mml:mrow></mml:msub><mml:mo>=</mml:mo><mml:msup><mml:mn>2</mml:mn><mml:mo>&#x2217;</mml:mo></mml:msup><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:msub><mml:mi>t</mml:mi><mml:mi>a</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mi>w</mml:mi></mml:msub><mml:mo>+</mml:mo><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>r</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:mrow><mml:mo stretchy="false">)</mml:mo><mml:mo>,</mml:mo><mml:mspace width="thickmathspace" /><mml:mspace width="thickmathspace" /></mml:math>
</disp-formula></p>
<p>where <italic>t</italic><sub><italic>w</italic></sub> implies the wait time of requests, and <inline-formula id="ieqn-6">
<mml:math id="mml-ieqn-6"><mml:msub><mml:mi>t</mml:mi><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>n</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:msub></mml:math>
</inline-formula> refers the time to download.</p>
</sec>
</sec>
<sec id="s4">
<label>4</label>
<title>Performance Validation</title>
<p>The experimental validation of the HDAG-CBMO technique takes place in this section. The results are inspected under varying numbers of requests and rounds. <xref ref-type="table" rid="table-1">Tab. 1</xref> and <xref ref-type="fig" rid="fig-3">Fig. 3</xref> inspect the processing time (PT) examination of the HDAG-CBMO model under distinct number of requests. The results indicated that the HDAG-CBMO model has accomplished effectual outcomes with minimal PT.</p>
<table-wrap id="table-1"><label>Table 1</label>
<caption>
<title>Processing time analysis of HDAG-CBMO technique under distinct number of requests</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left" colspan="6">Processing time (ms)</th>
</tr>
<tr>
<th align="left">No. of requests</th>
<th align="left">IoT-DeM</th>
<th align="left">D-fog</th>
<th align="left">Fuzzy C-means</th>
<th align="left">ML-DAO</th>
<th align="left">HDAG-CBMO</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">10</td>
<td align="left">192</td>
<td align="left">121</td>
<td align="left">96</td>
<td align="left">74</td>
<td align="left">38</td>
</tr>
<tr>
<td align="left">20</td>
<td align="left">253</td>
<td align="left">136</td>
<td align="left">105</td>
<td align="left">63</td>
<td align="left">30</td>
</tr>
<tr>
<td align="left">30</td>
<td align="left">279</td>
<td align="left">250</td>
<td align="left">116</td>
<td align="left">76</td>
<td align="left">41</td>
</tr>
<tr>
<td align="left">40</td>
<td align="left">349</td>
<td align="left">353</td>
<td align="left">125</td>
<td align="left">96</td>
<td align="left">52</td>
</tr>
<tr>
<td align="left">50</td>
<td align="left">478</td>
<td align="left">474</td>
<td align="left">79</td>
<td align="left">101</td>
<td align="left">47</td>
</tr>
<tr>
<td align="left">60</td>
<td align="left">284</td>
<td align="left">570</td>
<td align="left">134</td>
<td align="left">94</td>
<td align="left">49</td>
</tr>
<tr>
<td align="left">70</td>
<td align="left">369</td>
<td align="left">248</td>
<td align="left">201</td>
<td align="left">110</td>
<td align="left">65</td>
</tr>
<tr>
<td align="left">80</td>
<td align="left">397</td>
<td align="left">480</td>
<td align="left">195</td>
<td align="left">121</td>
<td align="left">74</td>
</tr>
<tr>
<td align="left">90</td>
<td align="left">436</td>
<td align="left">442</td>
<td align="left">302</td>
<td align="left">137</td>
<td align="left">74</td>
</tr>
<tr>
<td align="left">100</td>
<td align="left">476</td>
<td align="left">522</td>
<td align="left">397</td>
<td align="left">137</td>
<td align="left">87</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-3">
<label>Figure 3</label>
<caption>
<title>PT analysis of HDAG-CBMO technique with recent approaches</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_28269-fig-3.png"/>
</fig>
<p>For instance, with 10 requests, the HDAG-CBMO model has gained lower PT of 38&#x2005;ms whereas the IoT-DeM, D-Fog, FCM, and ML-DAO models have obtained higher PT of 192&#x2005;ms, 121&#x2005;ms, 96&#x2005;ms, and 74&#x2005;ms respectively. Eventually, with 50 requests, the HDAG-CBMO model has provided reduced PT of 47&#x2005;ms whereas the IoT-DeM, D-Fog, FCM, and ML-DAO models have attained increased PT of 478&#x2005;ms, 474&#x2005;ms, 79&#x2005;ms, and 101&#x2005;ms respectively. Meanwhile, with 100 requests, the HDAG-CBMO model has accomplished minimal PT of 87&#x2005;ms whereas the IoT-DeM, D-Fog, FCM, and ML-DAO models have reached maximum PT of 476&#x2005;ms, 522&#x2005;ms, 397&#x2005;ms, and 137&#x2005;ms respectively. <xref ref-type="table" rid="table-2">Tab. 2</xref> and <xref ref-type="fig" rid="fig-4">Fig. 4</xref> depict the response time (RT) examination of the HDAG-CBMO technique under distinct count of requests. The results outperformed that the HDAG-CBMO approach has accomplished effectual outcomes with minimal RT.</p>
<table-wrap id="table-2"><label>Table 2</label>
<caption>
<title>Response time analysis of HDAG-CBMO technique under distinct number of requests</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left" colspan="6">Response time (s)</th>
</tr>
<tr>
<th align="left">No. of requests</th>
<th align="left">IoT-DeM</th>
<th align="left">D-Fog</th>
<th align="left">Fuzzy C-Means</th>
<th align="left">ML-DAO</th>
<th align="left">HDAG-CBMO</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">100</td>
<td align="left">0.41</td>
<td align="left">0.35</td>
<td align="left">0.31</td>
<td align="left">0.26</td>
<td align="left">0.22</td>
</tr>
<tr>
<td align="left">200</td>
<td align="left">0.47</td>
<td align="left">0.45</td>
<td align="left">0.35</td>
<td align="left">0.28</td>
<td align="left">0.23</td>
</tr>
<tr>
<td align="left">300</td>
<td align="left">0.54</td>
<td align="left">0.50</td>
<td align="left">0.38</td>
<td align="left">0.31</td>
<td align="left">0.24</td>
</tr>
<tr>
<td align="left">400</td>
<td align="left">0.66</td>
<td align="left">0.56</td>
<td align="left">0.32</td>
<td align="left">0.34</td>
<td align="left">0.27</td>
</tr>
<tr>
<td align="left">500</td>
<td align="left">0.69</td>
<td align="left">0.48</td>
<td align="left">0.38</td>
<td align="left">0.37</td>
<td align="left">0.30</td>
</tr>
<tr>
<td align="left">600</td>
<td align="left">0.90</td>
<td align="left">0.62</td>
<td align="left">0.47</td>
<td align="left">0.44</td>
<td align="left">0.33</td>
</tr>
<tr>
<td align="left">700</td>
<td align="left">0.96</td>
<td align="left">0.75</td>
<td align="left">0.53</td>
<td align="left">0.47</td>
<td align="left">0.31</td>
</tr>
<tr>
<td align="left">800</td>
<td align="left">1.08</td>
<td align="left">0.60</td>
<td align="left">0.61</td>
<td align="left">0.44</td>
<td align="left">0.37</td>
</tr>
<tr>
<td align="left">900</td>
<td align="left">1.05</td>
<td align="left">0.90</td>
<td align="left">0.66</td>
<td align="left">0.48</td>
<td align="left">0.39</td>
</tr>
<tr>
<td align="left">1000</td>
<td align="left">1.27</td>
<td align="left">1.06</td>
<td align="left">0.82</td>
<td align="left">0.59</td>
<td align="left">0.45</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-4">
<label>Figure 4</label>
<caption>
<title>RT analysis of HDAG-CBMO technique with recent approaches</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_28269-fig-4.png"/>
</fig>
<p>For instance, with 100 requests, the HDAG-CBMO algorithm has reached minimal RT of 0.22&#x2005;s whereas the IoT-DeM, D-Fog, FCM, and ML-DAO models have obtained maximal RT of 0.41&#x2005;s, 0.35&#x2005;s, 0.31&#x2005;s, and 0.26&#x2005;s correspondingly. Followed by, with 500 requests, the HDAG-CBMO algorithm has offered reduced RT of 0.30&#x2005;s whereas the IoT-DeM, D-Fog, FCM, and ML-DAO models have attained maximal RT of 0.69&#x2005;s, 0.48&#x2005;s, 0.38&#x2005;s, and 0.37 correspondingly. Lastly, with 1000 requests, the HDAG-CBMO system has accomplished minimal RT of 0.45&#x2005;s whereas the IoT-DeM, D-Fog, FCM, and ML-DAO approaches have reached higher RT of 1.27&#x2005;s, 1.06&#x2005;s, 0.82&#x2005;s, and 0.59&#x2005;s correspondingly. <xref ref-type="table" rid="table-3">Tab. 3</xref> and <xref ref-type="fig" rid="fig-5">Fig. 5</xref> demonstrate the failure probability (FP) examination of the HDAG-CBMO model under distinct number of requests. The results indicated that the HDAG-CBMO approach has accomplished effectual outcomes with minimal FP. For instance, with 100 requests, the HDAG-CBMO methodology has reached decreased FP of 0.17 whereas the IoT-DeM, D-Fog, FCM, and ML-DAO models have obtained higher FP of 0.50, 0.45, 0.26, and 0.21 correspondingly. Likewise, with 500 requests, the HDAG-CBMO model has offered reduced FP of 0.17 whereas the IoT-DeM, D-Fog, FCM, and ML-DAO systems have attained increased FP of 0.47, 0.34, 0.20, and 0.23 correspondingly. At last, with 1000 requests, the HDAG-CBMO technique has accomplished lesser FP of 0.25 whereas the IoT-DeM, D-Fog, FCM, and ML-DAO systems have attained superior FP of 0.85, 0.42, 0.37, and 0.32 correspondingly.</p>
<table-wrap id="table-3"><label>Table 3</label>
<caption>
<title>Failure probability analysis of HDAG-CBMO technique under distinct number of requests</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left" colspan="6">Failure probability</th>
</tr>
<tr>
<th align="left">No. of requests</th>
<th align="left">IoT-DeM</th>
<th align="left">D-Fog</th>
<th align="left">Fuzzy C-means</th>
<th align="left">ML-DAO</th>
<th align="left">HDAG-CBMO</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">100</td>
<td align="left">0.50</td>
<td align="left">0.45</td>
<td align="left">0.26</td>
<td align="left">0.21</td>
<td align="left">0.17</td>
</tr>
<tr>
<td align="left">200</td>
<td align="left">0.69</td>
<td align="left">0.41</td>
<td align="left">0.34</td>
<td align="left">0.19</td>
<td align="left">0.17</td>
</tr>
<tr>
<td align="left">300</td>
<td align="left">0.49</td>
<td align="left">0.44</td>
<td align="left">0.24</td>
<td align="left">0.25</td>
<td align="left">0.19</td>
</tr>
<tr>
<td align="left">400</td>
<td align="left">0.48</td>
<td align="left">0.44</td>
<td align="left">0.28</td>
<td align="left">0.24</td>
<td align="left">0.20</td>
</tr>
<tr>
<td align="left">500</td>
<td align="left">0.47</td>
<td align="left">0.34</td>
<td align="left">0.20</td>
<td align="left">0.23</td>
<td align="left">0.17</td>
</tr>
<tr>
<td align="left">600</td>
<td align="left">0.68</td>
<td align="left">0.29</td>
<td align="left">0.32</td>
<td align="left">0.23</td>
<td align="left">0.19</td>
</tr>
<tr>
<td align="left">700</td>
<td align="left">0.64</td>
<td align="left">0.38</td>
<td align="left">0.37</td>
<td align="left">0.30</td>
<td align="left">0.22</td>
</tr>
<tr>
<td align="left">800</td>
<td align="left">0.62</td>
<td align="left">0.45</td>
<td align="left">0.35</td>
<td align="left">0.26</td>
<td align="left">0.20</td>
</tr>
<tr>
<td align="left">900</td>
<td align="left">0.74</td>
<td align="left">0.39</td>
<td align="left">0.35</td>
<td align="left">0.31</td>
<td align="left">0.22</td>
</tr>
<tr>
<td align="left">1000</td>
<td align="left">0.85</td>
<td align="left">0.42</td>
<td align="left">0.37</td>
<td align="left">0.32</td>
<td align="left">0.25</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-5">
<label>Figure 5</label>
<caption>
<title>FP analysis of HDAG-CBMO technique with recent approaches</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_28269-fig-5.png"/>
</fig>
<p><xref ref-type="table" rid="table-4">Tab. 4</xref> and <xref ref-type="fig" rid="fig-6">Fig. 6</xref> determine the aggregation time (AT) examination of the HDAG-CBMO model under distinct count of requests. The results revealed that the HDAG-CBMO technique has accomplished effectual outcomes with minimal AT. For instance, with 1000 requests, the HDAG-CBMO model has gained lower AT of 279&#x2005;ms whereas the IoT-DeM, D-Fog, FCM, and ML-DAO models have obtained higher AT of 1059&#x2005;ms, 831&#x2005;ms, 592&#x2005;ms, and 345&#x2005;ms respectively.</p>
<table-wrap id="table-4"><label>Table 4</label>
<caption>
<title>Aggregation time analysis of HDAG-CBMO technique under distinct number of requests</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left" colspan="6">Aggregation time (ms)</th>
</tr>
<tr>
<th align="left">No. of requests</th>
<th align="left">IoT-DeM</th>
<th align="left">D-fog</th>
<th align="left">Fuzzy C-means</th>
<th align="left">ML-DAO</th>
<th align="left">HDAG-CBMO</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">1000</td>
<td align="left">1059</td>
<td align="left">831</td>
<td align="left">592</td>
<td align="left">345</td>
<td align="left">279</td>
</tr>
<tr>
<td align="left">2000</td>
<td align="left">1140</td>
<td align="left">1081</td>
<td align="left">956</td>
<td align="left">831</td>
<td align="left">463</td>
</tr>
<tr>
<td align="left">3000</td>
<td align="left">860</td>
<td align="left">838</td>
<td align="left">562</td>
<td align="left">514</td>
<td align="left">444</td>
</tr>
<tr>
<td align="left">4000</td>
<td align="left">661</td>
<td align="left">739</td>
<td align="left">673</td>
<td align="left">533</td>
<td align="left">407</td>
</tr>
<tr>
<td align="left">5000</td>
<td align="left">1254</td>
<td align="left">971</td>
<td align="left">864</td>
<td align="left">488</td>
<td align="left">393</td>
</tr>
<tr>
<td align="left">6000</td>
<td align="left">1343</td>
<td align="left">835</td>
<td align="left">746</td>
<td align="left">558</td>
<td align="left">422</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-6">
<label>Figure 6</label>
<caption>
<title>AT analysis of HDAG-CBMO technique with recent approaches</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_28269-fig-6.png"/>
</fig>
<p>Eventually, with 3000 requests, the HDAG-CBMO model has provided reduced AT of 444&#x2005;ms whereas the IoT-DeM, D-Fog, FCM, and ML-DAO approaches have obtained increased AT of 860&#x2005;ms, 838&#x2005;ms, 562&#x2005;ms, and 514&#x2005;ms correspondingly. Finally, with 6000 requests, the HDAG-CBMO model has accomplished decreased AT of 422&#x2005;ms whereas the IoT-DeM, D-Fog, FCM, and ML-DAO methods have reached higher AT of 1343&#x2005;ms, 835&#x2005;ms, 746&#x2005;ms, and 558&#x2005;ms respectively. <xref ref-type="table" rid="table-5">Tab. 5</xref> and <xref ref-type="fig" rid="fig-7">Fig. 7</xref> examine the unallocated data chunks (UDC) examination of the HDAG-CBMO method under distinct number of requests. The results indicated that the HDAG-CBMO approach has accomplished effectual outcomes with minimal UDC. For instance, with 50 requests, the HDAG-CBMO approach has gained lower UDC of 160 whereas the IoT-DeM, D-Fog, FCM, and ML-DAO systems have obtained higher UDC of 407, 308, 328, and 249 respectively.</p>
<table-wrap id="table-5"><label>Table 5</label>
<caption>
<title>Unallocated data chunks analysis of HDAG-CBMO technique under distinct number of requests</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left" colspan="6">Unallocated data chunks</th>
</tr>
<tr>
<th align="left">No. of requests</th>
<th align="left">IoT-DeM</th>
<th align="left">D-fog</th>
<th align="left">Fuzzy C-means</th>
<th align="left">ML-DAO</th>
<th align="left">HDAG-CBMO</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">50</td>
<td align="left">407</td>
<td align="left">308</td>
<td align="left">328</td>
<td align="left">249</td>
<td align="left">160</td>
</tr>
<tr>
<td align="left">100</td>
<td align="left">654</td>
<td align="left">565</td>
<td align="left">437</td>
<td align="left">308</td>
<td align="left">230</td>
</tr>
<tr>
<td align="left">150</td>
<td align="left">2016</td>
<td align="left">1572</td>
<td align="left">1759</td>
<td align="left">318</td>
<td align="left">230</td>
</tr>
<tr>
<td align="left">200</td>
<td align="left">3022</td>
<td align="left">2243</td>
<td align="left">2213</td>
<td align="left">1927</td>
<td align="left">1680</td>
</tr>
<tr>
<td align="left">250</td>
<td align="left">2746</td>
<td align="left">2450</td>
<td align="left">2559</td>
<td align="left">2124</td>
<td align="left">1887</td>
</tr>
<tr>
<td align="left">300</td>
<td align="left">3279</td>
<td align="left">2756</td>
<td align="left">2412</td>
<td align="left">1759</td>
<td align="left">1394</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-7">
<label>Figure 7</label>
<caption>
<title>UDC analysis of HDAG-CBMO technique with recent approaches</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_28269-fig-7.png"/>
</fig>
<p>Meanwhile, with 150 requests, the HDAG-CBMO system has provided lesser UDC of 230 whereas the IoT-DeM, D-Fog, FCM, and ML-DAO models have attained enhanced UDC of 2016, 1572, 1759, and 318 correspondingly. In the meantime, with 300 requests, the HDAG-CBMO model has accomplished minimal UDC of 1394 whereas the IoT-DeM, D-Fog, FCM, and ML-DAO algorithms have gained increased UDC of 3279, 2756, 2412, and 1759 respectively.</p>
<p>A comparative total residual energy (TRE) investigation of the HDAG-CBMO model with recent methods is offered in <xref ref-type="table" rid="table-6">Tab. 6</xref> and <xref ref-type="fig" rid="fig-8">Fig. 8</xref>. The experimental results indicated that the HDAG-CBMO model has resulted in higher values of TRE compared to existing techniques.</p>
<table-wrap id="table-6"><label>Table 6</label>
<caption>
<title>TRE analysis of HDAG-CBMO technique under distinct number of rounds</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left" colspan="5">Total residual energy (J)</th>
</tr>
<tr>
<th align="left">No. of rounds</th>
<th align="left">FSEP-E</th>
<th align="left">DECA</th>
<th align="left">HAD-PSO</th>
<th align="left">HDAG-CBMO</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">100</td>
<td align="left">75</td>
<td align="left">70</td>
<td align="left">80</td>
<td align="left">81</td>
</tr>
<tr>
<td align="left">200</td>
<td align="left">55</td>
<td align="left">50</td>
<td align="left">62</td>
<td align="left">65</td>
</tr>
<tr>
<td align="left">300</td>
<td align="left">40</td>
<td align="left">37</td>
<td align="left">46</td>
<td align="left">50</td>
</tr>
<tr>
<td align="left">400</td>
<td align="left">26</td>
<td align="left">24</td>
<td align="left">34</td>
<td align="left">40</td>
</tr>
<tr>
<td align="left">500</td>
<td align="left">16</td>
<td align="left">17</td>
<td align="left">23</td>
<td align="left">32</td>
</tr>
<tr>
<td align="left">600</td>
<td align="left">7</td>
<td align="left">9</td>
<td align="left">16</td>
<td align="left">21</td>
</tr>
<tr>
<td align="left">700</td>
<td align="left">2</td>
<td align="left">5</td>
<td align="left">8</td>
<td align="left">13</td>
</tr>
<tr>
<td align="left">800</td>
<td align="left">0</td>
<td align="left">2</td>
<td align="left">4</td>
<td align="left">8</td>
</tr>
<tr>
<td align="left">900</td>
<td align="left">0</td>
<td align="left">0</td>
<td align="left">2</td>
<td align="left">5</td>
</tr>
<tr>
<td align="left">1000</td>
<td align="left">0</td>
<td align="left">0</td>
<td align="left">0</td>
<td align="left">0</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-8">
<label>Figure 8</label>
<caption>
<title>TRE analysis of HDAG-CBMO technique with recent approaches</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_28269-fig-8.png"/>
</fig>
<p>For example, with 100 rounds, the HDAG-CBMO model has provided higher TRE of 81&#x2005;J whereas the FSEP-E, DECA, and HAD-PSO models have attained lower TRE of 75&#x2005;J, 70&#x2005;J, and 80&#x2005;J respectively. In addition, with 500 rounds, the HDAG-CBMO model has accomplished increased TRE of 32&#x2005;J whereas the FSEP-E, DECA, and HAD-PSO models have resulted in reduced TRE of 16&#x2005;J, 17&#x2005;J, and 23&#x2005;J respectively.</p>
<p>A comparative throughput (THRPT) examination of the HDAG-CBMO model with recent techniques is offered in <xref ref-type="table" rid="table-7">Tab. 7</xref> and <xref ref-type="fig" rid="fig-9">Fig. 9</xref>. The experimental outcomes exposed that the HDAG-CBMO model has resulted in higher values of THRPT compared to existing techniques. For example, with 120 rounds, the HDAG-CBMO system has provided superior THRPT of 162.94Mbps whereas the FSEP-E, DECA, and HAD-PSO methods have attained lower THRPT of 128.54Mbps, 140.01Mbps, and 148.61Mbps correspondingly. Besides, with 1000 rounds, the HDAG-CBMO algorithm has accomplished improved THRPT of 1057.05Mbps whereas the FSEP-E, DECA, and HAD-PSO methodologies have resulted to reduce THRPT of 595.66Mbps, 756.14Mbps, and 968.21Mbps correspondingly.</p>
<table-wrap id="table-7"><label>Table 7</label>
<caption>
<title>Throughput analysis of HDAG-CBMO technique under distinct number of rounds</title></caption>
<table><colgroup><col align="left"/><col align="left"/><col align="left"/><col align="left"/><col align="left"/>
</colgroup>
<thead>
<tr>
<th align="left" colspan="5">Throughput (Mbps)</th>
</tr>
<tr>
<th align="left">No. of rounds</th>
<th align="left">FSEP-E</th>
<th align="left">DECA</th>
<th align="left">HAD-PSO</th>
<th align="left">HDAG-CBMO</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left">40</td>
<td align="left">39.72</td>
<td align="left">48.31</td>
<td align="left">51.17</td>
<td align="left">62.64</td>
</tr>
<tr>
<td align="left">80</td>
<td align="left">79.83</td>
<td align="left">94.16</td>
<td align="left">99.89</td>
<td align="left">108.49</td>
</tr>
<tr>
<td align="left">120</td>
<td align="left">128.54</td>
<td align="left">140.01</td>
<td align="left">148.61</td>
<td align="left">162.94</td>
</tr>
<tr>
<td align="left">160</td>
<td align="left">168.67</td>
<td align="left">185.87</td>
<td align="left">191.59</td>
<td align="left">211.66</td>
</tr>
<tr>
<td align="left">200</td>
<td align="left">203.06</td>
<td align="left">237.45</td>
<td align="left">248.91</td>
<td align="left">266.10</td>
</tr>
<tr>
<td align="left">240</td>
<td align="left">248.91</td>
<td align="left">266.10</td>
<td align="left">291.89</td>
<td align="left">320.56</td>
</tr>
<tr>
<td align="left">280</td>
<td align="left">297.63</td>
<td align="left">320.56</td>
<td align="left">346.35</td>
<td align="left">375.00</td>
</tr>
<tr>
<td align="left">320</td>
<td align="left">337.74</td>
<td align="left">372.14</td>
<td align="left">389.34</td>
<td align="left">429.45</td>
</tr>
<tr>
<td align="left">360</td>
<td align="left">383.60</td>
<td align="left">417.99</td>
<td align="left">438.05</td>
<td align="left">492.50</td>
</tr>
<tr>
<td align="left">400</td>
<td align="left">409.39</td>
<td align="left">486.77</td>
<td align="left">486.77</td>
<td align="left">546.94</td>
</tr>
<tr>
<td align="left">440</td>
<td align="left">455.24</td>
<td align="left">512.56</td>
<td align="left">535.49</td>
<td align="left">607.13</td>
</tr>
<tr>
<td align="left">480</td>
<td align="left">506.83</td>
<td align="left">558.41</td>
<td align="left">587.07</td>
<td align="left">664.44</td>
</tr>
<tr>
<td align="left">520</td>
<td align="left">544.08</td>
<td align="left">609.99</td>
<td align="left">635.78</td>
<td align="left">713.16</td>
</tr>
<tr>
<td align="left">560</td>
<td align="left">575.61</td>
<td align="left">650.12</td>
<td align="left">687.36</td>
<td align="left">770.48</td>
</tr>
<tr>
<td align="left">600</td>
<td align="left">581.34</td>
<td align="left">693.10</td>
<td align="left">730.35</td>
<td align="left">824.92</td>
</tr>
<tr>
<td align="left">640</td>
<td align="left">587.07</td>
<td align="left">724.62</td>
<td align="left">776.20</td>
<td align="left">870.77</td>
</tr>
<tr>
<td align="left">680</td>
<td align="left">589.93</td>
<td align="left">744.69</td>
<td align="left">833.52</td>
<td align="left">930.96</td>
</tr>
<tr>
<td align="left">720</td>
<td align="left">595.66</td>
<td align="left">753.28</td>
<td align="left">879.38</td>
<td align="left">979.68</td>
</tr>
<tr>
<td align="left">760</td>
<td align="left">595.66</td>
<td align="left">756.14</td>
<td align="left">922.35</td>
<td align="left">1025.53</td>
</tr>
<tr>
<td align="left">800</td>
<td align="left">595.66</td>
<td align="left">756.14</td>
<td align="left">945.28</td>
<td align="left">1039.85</td>
</tr>
<tr>
<td align="left">840</td>
<td align="left">595.66</td>
<td align="left">756.14</td>
<td align="left">951.02</td>
<td align="left">1045.59</td>
</tr>
<tr>
<td align="left">880</td>
<td align="left">595.66</td>
<td align="left">756.14</td>
<td align="left">965.34</td>
<td align="left">1054.18</td>
</tr>
<tr>
<td align="left">920</td>
<td align="left">595.66</td>
<td align="left">756.14</td>
<td align="left">968.21</td>
<td align="left">1059.91</td>
</tr>
<tr>
<td align="left">960</td>
<td align="left">595.66</td>
<td align="left">756.14</td>
<td align="left">971.07</td>
<td align="left">1059.91</td>
</tr>
<tr>
<td align="left">1000</td>
<td align="left">595.66</td>
<td align="left">756.14</td>
<td align="left">968.21</td>
<td align="left">1057.05</td>
</tr>
</tbody>
</table>
</table-wrap>
<fig id="fig-9">
<label>Figure 9</label>
<caption>
<title>Throughput analysis of HDAG-CBMO technique with recent approaches</title></caption>
<graphic mimetype="image" mime-subtype="png" xlink:href="CSSE_28269-fig-9.png"/>
</fig>
<p>After examining the above mentioned results and discussion, it is evident that the HDAG-CBMO model has accomplished superior performance over the other methods.</p>
</sec>
<sec id="s5">
<label>5</label>
<title>Conclusion</title>
<p>In this study, an effective HDAG-CBMO algorithm has been developed for data aggregation and data offloading processes in the fog assisted WSN. The HDAG-CBMO technique computes a fitness function using several relational matrices such as residual energy, average distance to neighbors, and centroid degree of target area. Besides, a chaotic theory based population initialization technique is computed to optimally select the barnacle&#x0027;s initial positions. At last, a learning based data offloading method is designed for reducing the response time to IoT user requests. In order to ensure the enhanced outcomes of the fog assisted WSN, a comprehensive simulation analysis was performed and the results are inspected under several aspects. The experimental results pointed out the better outcomes of the HDAG-CBMO technique over the other recent techniques. In future, hybrid metaheuristics based routing techniques can be developed for fog assisted IoT networks.</p>
</sec>
</body>
<back><fn-group>
<fn fn-type="other">
<p><bold>Funding Statement:</bold> The authors received no specific funding for this study.</p>
</fn>
<fn fn-type="conflict">
<p><bold>Conflicts of Interest:</bold> The authors declare that they have no conflicts of interest to report regarding the present study.</p>
</fn>
</fn-group>
<ref-list content-type="authoryear">
<title>References</title>
<ref id="ref-1"><label>[1]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Sennan</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Balasubramaniyam</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Luhach</surname></string-name>, <string-name><given-names>A. K.</given-names> <surname>Ramasubbareddy</surname></string-name>, <string-name><given-names>S.</given-names>, <surname>Chilamkurti</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>Energy and delay aware data aggregation in routing protocol for internet of things</article-title>.&#x201D; <source>Sensors</source>, vol. <volume>19</volume>, no. <issue>24</issue>, pp. <fpage>5486</fpage>&#x2013;<lpage>5498</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-2"><label>[2]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Lu</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Heung</surname></string-name>, <string-name><given-names>A. H.</given-names> <surname>Lashkari</surname></string-name> and <string-name><given-names>A. A.</given-names> <surname>Ghorbani</surname></string-name></person-group>, &#x201C;<article-title>A lightweight privacy-preserving data aggregation scheme for fog computing-enhanced IoT</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>5</volume>, no. <issue>8</issue>, pp. <fpage>3302</fpage>&#x2013;<lpage>3312</lpage>, <year>2017</year>.</mixed-citation></ref>
<ref id="ref-3"><label>[3]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F.</given-names> <surname>Yildirim Okay</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Ozdemir</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Xiao</surname></string-name></person-group>, &#x201C;<article-title>Fog computing-based privacy preserving data aggregation protocols</article-title>,&#x201D; <source>Transactions on Emerging Telecommunications Technologies</source>, vol. <volume>31</volume>, no. <issue>4</issue>, pp. <fpage>3900</fpage>&#x2013;<lpage>3915</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-4"><label>[4]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X.</given-names> <surname>Shen</surname></string-name>, <string-name><given-names>L.</given-names> <surname>Zhu</surname></string-name>, <string-name><given-names>K.</given-names> <surname>Xu</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Sharif</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Lu</surname></string-name></person-group>, &#x201C;<article-title>A Privacy-preserving data aggregation scheme for dynamic groups in fog computing</article-title>,&#x201D; <source>Information Sciences</source>, vol. <volume>7</volume>, no. <issue>514</issue>, pp. <fpage>118</fpage>&#x2013;<lpage>130</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-5"><label>[5]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>F.</given-names> <surname>Yildirim</surname></string-name>, <string-name><given-names>F.</given-names> <surname>Okay</surname></string-name>, <string-name><given-names>S. S.</given-names> <surname>Ozdemir</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Xiao</surname></string-name></person-group>, &#x201C;<article-title>Fog computing-based privacy preserving data aggregation protocols</article-title>,&#x201D; <source>Transactions on Emerging Telecommunications Technologies</source>, vol. <volume>31</volume>, no. <issue>4</issue>, pp. <fpage>3900</fpage>&#x2013;<lpage>3917</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-6"><label>[6]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>Y.</given-names> <surname>Huo</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Yong</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Lu</surname></string-name></person-group>, &#x201C;<article-title>Re-ADP: Real-time data aggregation with adaptive-event differential privacy for fog computing</article-title>,&#x201D; <source>Wireless Communications and Mobile Computing</source>, vol. <volume>12</volume>, no. <issue>2</issue>, pp. <fpage>312</fpage>&#x2013;<lpage>325</lpage>, <year>2018</year>.</mixed-citation></ref>
<ref id="ref-7"><label>[7]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Amuthan</surname></string-name> and <string-name><given-names>R.</given-names> <surname>Sendhil</surname></string-name></person-group>, &#x201C;<article-title>Hybrid GSW and DM based fully homomorphic encryption scheme for handling false data injection attacks under privacy preserving data aggregation in fog computing</article-title>,&#x201D; <source>Journal of Ambient Intelligence and Humanized Computing</source>, vol. <volume>11</volume>, no. <issue>11</issue>, pp. <fpage>5217</fpage>&#x2013;<lpage>5231</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-8"><label>[8]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Yang</surname></string-name>, <string-name><given-names>T.</given-names> <surname>Zhu</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Liu</surname></string-name>, <string-name><given-names>Y.</given-names> <surname>Xiang</surname></string-name> and <string-name><given-names>W.</given-names> <surname>Zhou</surname></string-name></person-group>, &#x201C;<article-title>Machine learning differential privacy with multifunctional aggregation in a fog computing architecture</article-title>.&#x201D; <source>IEEE Access</source>, vol. <volume>6</volume>, no. <issue>1</issue>, pp. <fpage>17119</fpage>&#x2013;<lpage>17129</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-9"><label>[9]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Gu</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Wu</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Yin</surname></string-name> and <string-name><given-names>W.</given-names> <surname>Jia</surname></string-name></person-group>, &#x201C;<article-title>Secure data query framework for cloud and fog computing</article-title>,&#x201D; <source>IEEE Transactions on Network and Service Management</source>, vol. <volume>17</volume>, no. <issue>1</issue>, pp. <fpage>332</fpage>&#x2013;<lpage>345</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-10"><label>[10]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Sarwar</surname></string-name>, <string-name><given-names>S.</given-names> <surname>Yongchareon</surname></string-name>, <string-name><given-names>J.</given-names> <surname>Yu</surname></string-name> and <string-name><given-names>S.</given-names> <surname>ur Rehman</surname></string-name></person-group>, &#x201C;<article-title>Lightweight, divide-and-conquer privacy-preserving data aggregation in fog computing</article-title>,&#x201D; <source>Future Generation Computer Systems</source>, vol. <volume>12</volume>, no. <issue>119</issue>, pp. <fpage>188</fpage>&#x2013;<lpage>199</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-11"><label>[11]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>A.</given-names> <surname>Alli</surname></string-name> and <string-name><given-names>M.</given-names> <surname>Alam</surname></string-name></person-group>, &#x201C;<article-title>SecOFF-FCIoT: Machine learning based secure offloading in Fog-cloud of things for smart city applications</article-title>,&#x201D; <source>Internet of Things</source>, vol. <volume>1</volume>, no. <issue>7</issue>, pp. <fpage>100070</fpage>&#x2013;<lpage>100085</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-12"><label>[12]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>E. Y.</given-names> <surname>Daraghmi</surname></string-name>, <string-name><given-names>M. C.</given-names> <surname>Wu</surname></string-name> and <string-name><given-names>S. M.</given-names> <surname>Yuan</surname></string-name></person-group>, &#x201C;<article-title>A multilayer data processing and aggregating fog-based framework for latency-sensitive iot services</article-title>,&#x201D; <source>Applied Sciences</source>, vol. <volume>11</volume>, no. <issue>4</issue>, pp. <fpage>1374</fpage>&#x2013;<lpage>1385</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-13"><label>[13]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>P.</given-names> <surname>Wang</surname></string-name>, <string-name><given-names>R.</given-names> <surname>Yu</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Gao</surname></string-name>, <string-name><given-names>C.</given-names> <surname>Lin</surname></string-name> and <string-name><given-names>Y.</given-names> <surname>Liu</surname></string-name></person-group>, &#x201C;<article-title>Task-driven data offloading for fog-enabled urban iot services</article-title>,&#x201D; <source>IEEE Internet of Things Journal</source>, vol. <volume>8</volume>, no. <issue>9</issue>, pp. <fpage>7562</fpage>&#x2013;<lpage>7574</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-14"><label>[14]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>K.</given-names> <surname>Bajaj</surname></string-name>, <string-name><given-names>B.</given-names> <surname>Sharma</surname></string-name> and R. Singh, </person-group><article-title>&#x201C;Implementation analysis of IoT-based offloading frameworks on cloud/edge computing for sensor generated big data,&#x201D;</article-title> <source>Complex &#x0026; Intelligent Systems</source>, vol. <volume>19</volume>, no. <issue>1</issue>, pp. <fpage>1</fpage>&#x2013;<lpage>18</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-15"><label>[15]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>R.</given-names> <surname>Hossen</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Whaiduzzaman</surname></string-name>, <string-name><given-names>M.</given-names> <surname>Uddin</surname></string-name>, <string-name><given-names>M. N.</given-names> <surname>Islam</surname></string-name>, <string-name><given-names>N.</given-names> <surname>Faruqui</surname></string-name> <etal>et al.,</etal></person-group> &#x201C;<article-title>BDPS: An efficient spark-based big data processing scheme for cloud fog-IoT orchestration</article-title>,&#x201D; <source>Information</source>, vol. <volume>12</volume>, no. <issue>12</issue>, p.<fpage>5 17</fpage>&#x2013;<lpage>523</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-16"><label>[16]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>S.</given-names> <surname>Chen</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>You</surname></string-name> and <string-name><given-names>X.</given-names> <surname>Ruan</surname></string-name></person-group>, &#x201C;<article-title>Privacy and energy co-aware data aggregation computation offloading for fog-assisted IoT networks</article-title>,&#x201D; <source>IEEE Access</source>, vol. <volume>8</volume>, no. <issue>4</issue>, pp. <fpage>72424</fpage>&#x2013;<lpage>72434</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-17"><label>[17]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M. H.</given-names> <surname>Sulaiman</surname></string-name>, <string-name><given-names>Z.</given-names> <surname>Mustaffa</surname></string-name>, <string-name><given-names>M. M.</given-names> <surname>Saari</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Daniyal</surname></string-name></person-group>, &#x201C;<article-title>Barnacles mating optimizer: A new bio-inspired algorithm for solving engineering optimization problems</article-title>,&#x201D; <source>Engineering Applications of Artificial Intelligence</source>, vol. <volume>8</volume>, no. <issue>7</issue>, pp.<fpage>103330</fpage>&#x2013;<lpage>103345</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-18"><label>[18]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>M.</given-names> <surname>Wang</surname></string-name> and <string-name><given-names>H.</given-names> <surname>Chen</surname></string-name></person-group>, &#x201C;<article-title>Chaotic multi-swarm whale optimizer boosted support vector machine for medical diagnosis</article-title>,&#x201D; <source>Applied Soft Computing</source>, vol. <volume>8</volume>, no. <issue>5</issue>, pp. <fpage>105946</fpage>&#x2013;<lpage>105958</lpage>, <year>2020</year>.</mixed-citation></ref>
<ref id="ref-19"><label>[19]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X.</given-names> <surname>Yin</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Li</surname></string-name> and <string-name><given-names>S.</given-names> <surname>Lin</surname></string-name></person-group>, &#x201C;<article-title>A novel hierarchical data aggregation with particle swarm optimization for internet of things</article-title>,&#x201D; <source>Mobile Networks and Applications</source>, vol. <volume>24</volume>, no. <issue>6</issue>, pp. <fpage>1994</fpage>&#x2013;<lpage>2001</lpage>, <year>2019</year>.</mixed-citation></ref>
<ref id="ref-20"><label>[20]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>O.</given-names> <surname>Alfarraj</surname></string-name></person-group>, &#x201C;<article-title>A machine learning-assisted data aggregation and offloading system for cloud&#x2013;IoT communication</article-title>,&#x201D; <source>Peer-to-Peer Networking and Applications</source>, vol. <volume>14</volume>, no. <issue>4</issue>, pp. <fpage>2554</fpage>&#x2013;<lpage>2564</lpage>, <year>2021</year>.</mixed-citation></ref>
<ref id="ref-21"><label>[21]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X. R.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>W. F.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Sun</surname></string-name>, <string-name><given-names>X. M.</given-names> <surname>Sun</surname></string-name> and <string-name><given-names>S. K.</given-names> <surname>Jha</surname></string-name></person-group>, &#x201C;<article-title>A robust 3-D medical watermarking based on wavelet transform for data protection</article-title>,&#x201D; <source>Computer Systems Science &#x0026; Engineering</source>, vol. <volume>41</volume>, no. <issue>3</issue>, pp. <fpage>1043</fpage>&#x2013;<lpage>1056</lpage>, <year>2022</year>.</mixed-citation></ref>
<ref id="ref-22"><label>[22]</label><mixed-citation publication-type="journal"><person-group person-group-type="author"><string-name><given-names>X. R.</given-names> <surname>Zhang</surname></string-name>, <string-name><given-names>X.</given-names> <surname>Sun</surname></string-name>, <string-name><given-names>X. M.</given-names> <surname>Sun</surname></string-name>, <string-name><given-names>W.</given-names> <surname>Sun</surname></string-name> and <string-name><given-names>S. K.</given-names> <surname>Jha</surname></string-name></person-group>, &#x201C;<article-title>Robust reversible audio watermarking scheme for telemedicine and privacy protection</article-title>,&#x201D; <source>Computers, Materials &#x0026; Continua</source>, vol. <volume>71</volume>, no. <issue>2</issue>, pp. <fpage>3035</fpage>&#x2013;<lpage>3050</lpage>, <year>2022</year>.</mixed-citation></ref>
</ref-list>
</back>
</article>