Optimizing IoT application deployment with fog - cloud paradigm: A resource-aware approach
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.4.32Keywords:
Internet of Things, Cloud computing, Fog Computing, Fog-Cloud Paradigm, Cluster head selection algorithm, Network utilization, Energy consumptionDimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Fog computing is the architecture that most researchers use to build latency-sensitive Internet of Things (IoT) applications. By placing resource-constrained fog devices near the network’s edge, fog computing design delivers less delay than the cloud computing paradigm. Fog nodes use the available resources to process the incoming data, which lowers the data amount that needs to be transferred to the server of the cloud. A system contains fog devices with various levels of computing power. The best system performance is only possible when the appropriate sensor nodes are connected to the parent fog node. In this study, we introduce a cluster head selection algorithm for effective network resource utilization through application deployment in a fog-cloud environment for internet of things-based applications. With the introduction of fog computing, the processing is animatedly dispersed through the cloud layers and fog, enabling the deployment of an application’s modules closer to the foundation of fog-layer devices. The method is general and may be used with various network topologies and a broad range of standardized IoT applications, regardless of load.Abstract
How to Cite
Downloads
Similar Articles
- P. Pattunnarajam, Janani G, A. Vijayaraj, Sathiya Priya S, Enhanced routing strategy of wireless sensor network based on fifth generation communication technology , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Jayalakshmi K., M. Prabakaran, Feature selection in HR analytics: A hybrid optimization approach with PSO and GSO , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Sreenath M.V. Reddy, D. Annapurna, Anand Narasimhamurthy, Influence node analysis based on neighborhood influence vote rank method in social network , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Arunachalaprabu G, Fathima Bibi K, A pattern-driven Huffman encoding and positional encoding for DNA compression , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- C. Premila Rosy, Clustering of cancer text documents in the medical field using machine learning heuristics , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- Anita M, Shakila S, Stochastic kernelized discriminant extreme learning machine classifier for big data predictive analytics , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A.P. Asha Sapna, C. Anbalagan, Towards a better living environment-compressive strength and water absorption testing of mini compressed stabilized earth blocks and fired bricks , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Rupesh Mandal, Bobby Sharma, Dibyajyoti Chutia , Smart flood monitoring in Guwahati city: A LoRa-based AIoT and edge computing sensor framework , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Sanjeev Kumar, Saurabh Charaya, Rachna Mehta, Multi-Metric Evaluation Framework for Machine Learning-Based Load Prediction in e-Governance Systems , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper
- Neeraj, Anita Singhrova, A critical review of blockchain-based authentication techniques , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
<< < 8 9 10 11 12 13 14 15 16 17 > >>
You may also start an advanced similarity search for this article.

