Energy efficient techniques for iot application on resource aware fog computing paradigm
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.11Keywords:
Resource aware, IoT application, fog computing paradigm, latency, network, Energy Efficient TechniqueDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
During the rapid emergence of the IoT environment, computing is widespread in all domains and undergoes tiny changes on an everyday basis that lead to momentous shifts in the development and deployment of applications. Network infrastructure can be utilized efficiently in large volumes of data by deploying the applications. IoT applications constitute different types of modules that run together with interdependency and run on the cloud conventionally in the data center. The research study proposes a framework for a resource-aware fog computing paradigm using a Module mapping algorithm, lower bound algorithm, Application Module and Network Node and resource-aware algorithm. Fog computing is employed for deploying IoT applications that are sensitive to latency. The incoming data is processed by fog computing by utilizing the available resources by reducing the amount of data sent to the server. The optimum performance can be achieved by connecting the appropriate sensor node to the parent node. The proposed algorithm reduces energy consumption and latency. Comparative analysis is performed for the proposed and conventional fog computing paradigm.Abstract
How to Cite
Downloads
Similar Articles
- J. M. Aslam, K. M. Kumar, Enhancing cloud data security: User-centric approaches and advanced mechanisms , The Scientific Temper: Vol. 15 No. 01 (2024): The Scientific Temper
- Neeraj, Anita Singhrova, A critical review of blockchain-based authentication techniques , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- Sruthy M.S, R. Suganya, An efficient key establishment for pervasive healthcare monitoring , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Thangatharani T, M. Subalakshmi, Development of an adaptive machine learning framework for real-time anomaly detection in cybersecurity , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- Susithra N, Rajalakshmi K, Ashwath P, Performance analysis of compressive sensing and reconstruction by LASSO and OMP for audio signal processing applications , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- S. Hemalatha, N. Vanjulavalli, K. Sujith, R. Surendiran, Chaotic-based optimization, based feature selection with shallow neural network technique for effective identification of intrusion detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Sharada C, T N Ravi, S Panneer Arokiara, Lancaster sliced regressive keyword extraction based semantic analytics on social media documents , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- S. Hemalatha, N. Vanjulavalli, K. Sujith, R. Surendiran, Effective gorilla troops optimization-based hierarchical clustering with HOP field neural network for intrusion detection , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Kumari Neha, Amrita ., Quantum programming: Working with IBM’S qiskit tool , The Scientific Temper: Vol. 14 No. 01 (2023): The Scientific Temper
- Bayelign A. Zelalem, Ayalew A. Abebe, Evaluating supply chain management practice among micro and small manufacturing enterprise in southwest, Ethiopia , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
<< < 5 6 7 8 9 10 11 12 13 14 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper

