Skip to main content

Mobile Edge Computing Meets AI

Edited by:
Maqbool Khan: Software Competence Center Hagenberg, Austria
Qiang HeSwinburne University of Technology, Australia
Shui Yu: University of Technology Sydney, Australia
Wajid RafiqueUniversity of Calgary, Canada

Submission Status: Open   |   Submission Deadline: Closed

Journal of Cloud Computing is calling for submissions to our Collection on 'Mobile Edge Computing Meets AI.' This Collection aims to highlight the cutting-edge research and applications in this field. 

About the collection

As a supplement of traditional cloud computing technology, mobile edge computing (MEC) has  recently emerged as a promising computing paradigm that offers end-users with low latency in  their access to applications deployed at the edge of the cloud, e.g., smart assistant, driverless cars,  smart manufacturing, etc. However, continuous monitoring and data collection by the smart  devices in MEC clients or servers have been generating an unprecedented volume of data which  create a main source of big data. How to deal with the big data from MEC applications in an  efficient, economical and secure manner is still a fundamental challenge. 

Recently, machine learning powered Artificial Intelligence (AI) has been recognized as a key  technology to realize intelligent data analyses. Therefore, AI has provided a promising way to  cope with the massive and heterogeneous data produced by MEC terminals. However, the  adaptation of AI-based approaches is highly demanded to achieve their full potentials in supporting the MEC applications, as MEC service systems often suffer from limited computing  capabilities, high energy cost and fast-changing context environment. Therefore, it still requires  challenging efforts to minimize the gap between MEC applications and AI technology.  

This Collection aims to highlight the cutting-edge research and applications related to the  “Mobile Edge Computing Meets AI”. Specific topics of interest include but are not limited to the  following: 

  • AI-based algorithms for MEC systems 
  • Smart collection, pre-processing and integration of MEC data 
  • Multi-modality MEC data fusion based on AI 
  • Intelligent scheduling or offloading of MEC data/resources 
  • QoS modeling and optimization of MEC services 
  • Smart communication among MEC clients and servers 
  • Security, trust and privacy-preservation of MEC applications 
  • Blockchain-powered MEC applications 
  • Architecture, models and protocols of hybrid Cloud-Fog-Edge 
  • AI-powered energy optimization and cost minimization in MEC 
  1. Mobile edge computing (MEC) reduces the latency for end users to access applications deployed at the edge by offloading tasks to the edge. With the popularity of e-commerce and the expansion of business scale,...

    Authors: Xiao Zheng, Muhammad Tahir, Khursheed Aurangzeb, Muhammad Shahid Anwar, Muhammad Aamir, Ahmad Farzan and Rizwan Ullah
    Citation: Journal of Cloud Computing 2024 13:117
  2. The effective functioning and regulation of power systems crucially rely on the coordination of distance and directional overcurrent relays. Accurate fault detection and successful clearing sequences require s...

    Authors: Mohammadreza Aminian, Mehdi Jafari Shahbazzadeh and Mahdiyeh Eslami
    Citation: Journal of Cloud Computing 2024 13:109
  3. The Internet of Things (IoT) devices spawn growing diverse social platforms and online data at the network edge, propelling the development of cross-platform applications. To integrate cross-platform data, use...

    Authors: Rui Huang, Tinghuai Ma, Huan Rong, Kai Huang, Nan Bi, Ping Liu and Tao Du
    Citation: Journal of Cloud Computing 2024 13:107
  4. Film and movie genres play a pivotal role in captivating relevant audiences across interactive multimedia platforms. With a focus on entertainment, streaming providers are increasingly prioritizing the automat...

    Authors: Fangru Lin, Jie Yuan, Zhiwei Chen and Maryam Abiri
    Citation: Journal of Cloud Computing 2024 13:104
  5. The application of blockchain technology to the field of e-commerce has solved many dilemmas, such as low transparency of transactions, hidden risks of data security and high payment costs. Mobile edge computi...

    Authors: Guangshun Li, Haoyang Wu, Junhua Wu and Zhenqiang Li
    Citation: Journal of Cloud Computing 2024 13:97
  6. Sensitive data identification represents the initial and crucial step in safeguarding sensitive information. With the ongoing evolution of the industrial internet, including its interconnectivity across variou...

    Authors: Xinjian Zhao, Guoquan Yuan, Shuhan Qiu, Chenwei Xu and Shanming Wei
    Citation: Journal of Cloud Computing 2024 13:96
  7. The integration of new Internet of Things (IoT) applications and services heavily relies on task offloading to external devices due to the constrained computing and battery resources of IoT devices. Up to now,...

    Authors: Gorka Nieto, Idoia de la Iglesia, Unai Lopez-Novoa and Cristina Perfecto
    Citation: Journal of Cloud Computing 2024 13:94
  8. Patient-focused healthcare applications are important to patients because they offer a range of advantages that add value and improve the overall healthcare experience. The 5G networks, along with Mobile Edge ...

    Authors: Yazeed Yasin Ghadi, Syed Faisal Abbas Shah, Tehseen Mazhar, Tariq Shahzad, Khmaies Ouahada and Habib Hamam
    Citation: Journal of Cloud Computing 2024 13:93
  9. The recent advancements in automated lung cancer diagnosis through the application of Convolutional Neural Networks (CNN) on Computed Tomography (CT) scans have marked a significant leap in medical imaging and...

    Authors: Chengping Zhang, Muhammad Aamir, Yurong Guan, Muna Al-Razgan, Emad Mahrous Awwad, Rizwan Ullah, Uzair Aslam Bhatti and Yazeed Yasin Ghadi
    Citation: Journal of Cloud Computing 2024 13:91

    The Correction to this article has been published in Journal of Cloud Computing 2024 13:111

  10. In the field of remote sensing image interpretation, automatically extracting water body information from high-resolution images is a key task. However, facing the complex multi-scale features in high-resoluti...

    Authors: Ziwen Zhang, Qi Liu, Xiaodong Liu, Yonghong Zhang, Zihao Du and Xuefei Cao
    Citation: Journal of Cloud Computing 2024 13:76
  11. The increasing popularity of various intelligent sensor and mobile communication technologies has enabled quick health physique sensing, monitoring, collection and analyses of students, which significantly pro...

    Authors: Yanjie Li, Liqin Kang, Zhaojin Li, Fugao Jiang, Nan Bi, Tao Du and Maryam Abiri
    Citation: Journal of Cloud Computing 2024 13:73
  12. Mobile edge computing (MEC) is a novel computing paradigm that pushes computation and storage resources to the edge of the network. The interconnection of edge servers forms small-scale data centers, enabling ...

    Authors: Xin He, Feifan Liang, Weibei Fan, Junchang Wang, Lei Han, Fu Xiao and Wanchun Dou
    Citation: Journal of Cloud Computing 2024 13:72
  13. Traditional delivery route planning faces challenges in reducing logistics costs and improving customer satisfaction with growing customer demand and complex road traffic, especially in uncertain supply chain ...

    Authors: Gaoxian Peng, Yiping Wen, Wanchun Dou, Tiancai Li, Xiaolong Xu and Qing Ye
    Citation: Journal of Cloud Computing 2024 13:69
  14. Powered by data-driven technologies, precision agriculture offers immense productivity and sustainability benefits. However, fragmentation across farmlands necessitates distributed transparent automation. We d...

    Authors: Qing He, Hua Zhao, Yu Feng, Zehao Wang, Zhaofeng Ning and Tingwei Luo
    Citation: Journal of Cloud Computing 2024 13:66
  15. The integration of multi-source sensors based AIoT (Artificial Intelligence of Things) technologies into air quality measurement and forecasting is becoming increasingly critical in the fields of sustainable a...

    Authors: Mughair Aslam Bhatti, Zhiyao Song, Uzair Aslam Bhatti and Syam M. S
    Citation: Journal of Cloud Computing 2024 13:65
  16. Bitcoin exchange security is crucial because of MEC's widespread use. Cryptojacking has compromised MEC app security and bitcoin exchange ecosystem functionality. This paper propose a cutting-edge neural netwo...

    Authors: Uma Rani, Sunil Kumar, Neeraj Dahiya, Kamna Solanki, Shanu Rakesh Kuttan, Sajid Shah, Momina Shaheen and Faizan Ahmad
    Citation: Journal of Cloud Computing 2024 13:63
  17. Deep learning achieves an outstanding success in the edge scene due to the appearance of lightweight neural network. However, a number of works show that these networks are vulnerable for adversarial examples,...

    Authors: Weiwei Miao, Yuanyi Xia, Rui Zhang, Xinjian Zhao, Qianmu Li, Tao Wang and Shunmei Meng
    Citation: Journal of Cloud Computing 2024 13:61
  18. Given the prohibited operating zones, losses, and valve point effects in power systems, energy optimization analysis in such systems includes numerous non-convex and non-smooth parameters, such as economic dis...

    Authors: Zhiqing Bai, Caizhong Li, Javad Pourzamani, Xuan Yang and Dejuan Li
    Citation: Journal of Cloud Computing 2024 13:59
  19. In Mobile Edge Computing, the framework of federated learning can enable collaborative learning models across edge nodes, without necessitating the direct exchange of data from edge nodes. It addresses signifi...

    Authors: Momina Shaheen, Muhammad S. Farooq and Tariq Umer
    Citation: Journal of Cloud Computing 2024 13:52
  20. The integration of edge intelligence (EI) in animation design, particularly when dealing with large models, represents a significant advancement in the field of computer graphics and animation. This survey aim...

    Authors: Jing Zhu, Chuanjiang Hu, Edris Khezri and Mohd Mustafa Mohd Ghazali
    Citation: Journal of Cloud Computing 2024 13:48

    The Correction to this article has been published in Journal of Cloud Computing 2024 13:87

  21. Automatic target tracking in emerging remote sensing video-generating tools based on microwave imaging technology and radars has been investigated in this paper. A moving target tracking system is proposed to ...

    Authors: Meiyan Li, Qinyong Wang and Yuwei Liao
    Citation: Journal of Cloud Computing 2024 13:47
  22. With the rapid development of the Internet of Medical Things (IoMT) and the increasing concern for personal health, sharing Electronic Medical Record (EMR) data is widely recognized as a crucial method for enh...

    Authors: Guijiang Liu, Haibo Xie, Wenming Wang and Haiping Huang
    Citation: Journal of Cloud Computing 2024 13:44
  23. The Smart Grid (SG) heavily depends on the Advanced Metering Infrastructure (AMI) technology, which has shown its vulnerability to intrusions. To effectively monitor and raise alarms in response to anomalous a...

    Authors: Noshina Tariq, Amjad Alsirhani, Mamoona Humayun, Faeiz Alserhani and Momina Shaheen
    Citation: Journal of Cloud Computing 2024 13:43
  24. Mobile edge computing (MEC) has revolutionized the way of teaching in universities. It enables more interactive and immersive experiences in the classroom, enhancing student engagement and learning outcomes. A...

    Authors: Huiling Zhang, Huatao Wu, Zhengde Li, Wenwen Gong and Yan Yan
    Citation: Journal of Cloud Computing 2024 13:38
  25. Blockchain technologies (BCT) are utilized in healthcare to facilitate a smart and secure transmission of patient data. BCT solutions, however, are unable to store data produced by IoT devices in smart healthc...

    Authors: Mamoona Humayun, Amjad Alsirhani, Faeiz Alserhani, Momina Shaheen and Ghadah Alwakid
    Citation: Journal of Cloud Computing 2024 13:37
  26. With the exponential growth of various data interactions on network systems, network intrusions are also increasing. The emergence of edge computing technology brings a new solution to network security. Howeve...

    Authors: Yue Yang, Jieren Cheng, Zhaowu Liu, Huimin Li and Ganglou Xu
    Citation: Journal of Cloud Computing 2024 13:31
  27. The substantial computational demands associated with Deep Neural Network (DNN)-based camera relocalization during the reasoning process impede their integration into autonomous vehicles. Cost and energy effic...

    Authors: Dengbo Li, Hanning Zhang, Jieren Cheng and Bernie Liu
    Citation: Journal of Cloud Computing 2024 13:25
  28. A small object Lentinus Edodes logs contamination detection method (SRW-YOLO) based on improved YOLOv7 in edge-cloud computing environment was proposed to address the problem of the difficulty in the detection...

    Authors: Xuefei Chen, Shouxin Sun, Chao Chen, Xinlong Song, Qiulan Wu and Feng Zhang
    Citation: Journal of Cloud Computing 2024 13:14
  29. P2P-based Edge Cloud (PEC) is widely used in Internet of Things (IoT). Inevitably, the sensor data routing technology has a significant impact on the performance of PEC. Due to its prevalence and complexity, t...

    Authors: Biao Dong and Jinhui Chen
    Citation: Journal of Cloud Computing 2024 13:13
  30. With the development of artificial intelligence technology and edge computing technology, deep learning-based automatic modulation classification (AI-based AMC) deployed at edge devices using centralised or di...

    Authors: Bo Xu, Uzair Aslam Bhatti, Hao Tang, Jialin Yan, Shulei Wu, Nadia Sarhan, Emad Mahrous Awwad, Syam M. S. and Yazeed Yasin Ghadi
    Citation: Journal of Cloud Computing 2024 13:10
  31. Intelligent Transport System (ITS) is a typical class of Cyber-Physical Systems (CPS), and due to the special characteristics of such systems, higher requirements are placed on system security. Runtime verific...

    Authors: Yu Zhang, Sijie Xu, Hongyi Chen, Uzair Aslam Bhatt and Mengxing Huang
    Citation: Journal of Cloud Computing 2024 13:6
  32. Automated techniques for evaluating sports activities inside dynamic frames are highly dependent on advanced sports analysis by smart machines. The monitoring of individuals and the discerning of athletic purs...

    Authors: Lei Xiao, Yang Cao, Yihe Gai, Edris Khezri, Juntong Liu and Mingzhu Yang
    Citation: Journal of Cloud Computing 2023 12:167

Submission Guidelines

Back to top

This Collection welcomes submission of Research Articles. 

Before submitting your manuscript, please ensure you have read our submission guidelines. Articles for this Collection should be submitted via our submission system. During the submission process, under the section additional information, you will be asked whether you are submitting to a Collection, please select "Mobile Edge Computing Meets AI" from the dropdown menu.

Articles will undergo the journal’s standard peer-review process and are subject to all of the journal’s standard policies. Articles will be added to the Collection as they are published.

The Editors have no competing interests with the submissions which they handle through the peer review process. The peer review of any submissions for which the Editors have competing interests is handled by another Editorial Board Member who has no competing interests.