Energy efficient techniques for iot application on resource aware fog computing paradigm
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.11Keywords:
Resource aware, IoT application, fog computing paradigm, latency, network, Energy Efficient TechniqueDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
During the rapid emergence of the IoT environment, computing is widespread in all domains and undergoes tiny changes on an everyday basis that lead to momentous shifts in the development and deployment of applications. Network infrastructure can be utilized efficiently in large volumes of data by deploying the applications. IoT applications constitute different types of modules that run together with interdependency and run on the cloud conventionally in the data center. The research study proposes a framework for a resource-aware fog computing paradigm using a Module mapping algorithm, lower bound algorithm, Application Module and Network Node and resource-aware algorithm. Fog computing is employed for deploying IoT applications that are sensitive to latency. The incoming data is processed by fog computing by utilizing the available resources by reducing the amount of data sent to the server. The optimum performance can be achieved by connecting the appropriate sensor node to the parent node. The proposed algorithm reduces energy consumption and latency. Comparative analysis is performed for the proposed and conventional fog computing paradigm.Abstract
How to Cite
Downloads
Similar Articles
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Optimizing IoT application deployment with fog - cloud paradigm: A resource-aware approach , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- R. Rita Jenifer, V. Sinthu Janita, Energy-aware Security Optimized Elliptic Curve Digital Signature Algorithm for Universal IoT Networks , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- Sheena Edavalath, Manikandasaran S. Sundaram, Cost-based resource allocation method for efficient allocation of resources in a heterogeneous cloud environment , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- M. Ragul, A. Aloysius, V. Arul Kumar, Enhancing IoT blockchain scalability through the eepos consensus algorithm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- R. Sridevi, V. S. J. Prakash, Load aware active low energy adaptive clustering hierarchy for IoT-WSN , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Yasodha V, V. Sinthu Janita, AI-driven IoT routing: A hybrid deep reinforcement learning and shrike optimization framework for energy-efficient communication , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- V. Umadevi, S. Ranganathan, IoT based energy aware local approximated MapReduce fuzzy clustering for smart healthcare data transmission , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- M. Prabhu, A. Chandrabose, Improving the resource allocation with enhanced learning in wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Chinnadurai U, A. Vinayagam, Energy efficient routing with cluster approach in wireless networks – A literature review , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- V. Baby Deepa, R. Jeya, Dynamic resource allocation with otpimization techniques for qos in cloud computing , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper

