Energy efficient techniques for iot application on resource aware fog computing paradigm
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.11Keywords:
Resource aware, IoT application, fog computing paradigm, latency, network, Energy Efficient TechniqueDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
During the rapid emergence of the IoT environment, computing is widespread in all domains and undergoes tiny changes on an everyday basis that lead to momentous shifts in the development and deployment of applications. Network infrastructure can be utilized efficiently in large volumes of data by deploying the applications. IoT applications constitute different types of modules that run together with interdependency and run on the cloud conventionally in the data center. The research study proposes a framework for a resource-aware fog computing paradigm using a Module mapping algorithm, lower bound algorithm, Application Module and Network Node and resource-aware algorithm. Fog computing is employed for deploying IoT applications that are sensitive to latency. The incoming data is processed by fog computing by utilizing the available resources by reducing the amount of data sent to the server. The optimum performance can be achieved by connecting the appropriate sensor node to the parent node. The proposed algorithm reduces energy consumption and latency. Comparative analysis is performed for the proposed and conventional fog computing paradigm.Abstract
How to Cite
Downloads
Similar Articles
- K. Sreenivasulu, Sampath S, Arepalli Gopi, Deepak Kartikey, S. Bharathidasan, Neelam Labhade Kumar, Advancing device and network security for enhanced privacy , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- A. Jabeen, A. R. M. Shanavas, Hazard regressive multipoint elitist spiral search optimization for resource efficient task scheduling in cloud computing , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RRFSE: RNN biased random forest and SVM ensemble for RPL DDoS in IoT-WSN environment , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- V. Selvi, T. S. Poornappriya, R. Balasubramani, Cloud computing research productivity and collaboration: A scientometric perspective , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Akanksha Singh, Nand Kumar, Analysis of renewable energy and economic growth of Germany , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- M. Monika, J. Merline Vinotha, A resilient supply chain model integrating demand variability and carbon emissions in imperfect production systems , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- L. Amudavalli, K. Muthuramalingam, Energy-efficient location-based routing protocol for wireless sensor networks using teaching-learning soccer league optimization (TLSLO) , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- B. S. E. Zoraida, J. Jasmine Christina Magdalene, Smart grid precision: Evaluating machine learning models for forecasting of energy consumption from a smart grid , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- A. Jabeen, AR Mohamed Shanavas, Bradley Terry Brownboost and Lemke flower pollinated resource efficient task scheduling in cloud computing , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- M. Prabhu, A. Chandrabose, Optimization based energy aware scheduling in wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper

