Energy efficient techniques for iot application on resource aware fog computing paradigm
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.11Keywords:
Resource aware, IoT application, fog computing paradigm, latency, network, Energy Efficient TechniqueDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
During the rapid emergence of the IoT environment, computing is widespread in all domains and undergoes tiny changes on an everyday basis that lead to momentous shifts in the development and deployment of applications. Network infrastructure can be utilized efficiently in large volumes of data by deploying the applications. IoT applications constitute different types of modules that run together with interdependency and run on the cloud conventionally in the data center. The research study proposes a framework for a resource-aware fog computing paradigm using a Module mapping algorithm, lower bound algorithm, Application Module and Network Node and resource-aware algorithm. Fog computing is employed for deploying IoT applications that are sensitive to latency. The incoming data is processed by fog computing by utilizing the available resources by reducing the amount of data sent to the server. The optimum performance can be achieved by connecting the appropriate sensor node to the parent node. The proposed algorithm reduces energy consumption and latency. Comparative analysis is performed for the proposed and conventional fog computing paradigm.Abstract
How to Cite
Downloads
Similar Articles
- Siddiqui M. Asif, Amir Asad, Mohommad Arif, Veena Pandey, SCREENING OF PECTINASE PRODUCING THERMOPHILIC MUCOR SP. ISOLATED FROM DECOMPOSTING FRUITS AND VEGETABLES , The Scientific Temper: Vol. 1 No. 01 (2010): The Scientific Temper
- Jayalakshmi K., M. Prabakaran, Feature selection in HR analytics: A hybrid optimization approach with PSO and GSO , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- K. S. Deepika, Ajay Massand, Influence of Social Media Marketing on Purchase Intention of Gen Z , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Raja S, Nagarajan L., Hybridization of bio-inspired algorithms with machine learning models for predicting the risk of type 2 diabetes mellitus , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Thilagavathi K, Thankamani K., P. Shunmugapriya, D. Prema, Navigating fake reviews in online marketing: Innovative strategies for authenticity and trust in the digital age , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- V. Manikandabalaji, R. Sivakumar, V. Maniraj, A framework for diabetes diagnosis based on type-2 fuzzy semantic ontology approach , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Annalakshmi D., C. Jayanthi, An asymmetric key encryption and decryption model incorporating optimization techniques for enhanced security and efficiency , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- P. John Robinson, P. Susai Alexander, Neural net influenced magdm problem with modified choquet integral aggregation operators and correlation coefficient for triangular fuzzy intuitionistic fuzzy sets , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- S. Nagarani, Amalraj P., Lakshay Phor, Nishank S. Pimple, Banashree Sen, Ramaprasad Maiti, Vikas S. Jadhav, Innovative technological advancements in solving real quadratic equations: Pioneering the frontier of mathematical innovation , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Mohit, Rishi Chaudhry, Exploring the landscape of brand extensions: A bibliometric analysis of scholarly trends and insights , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
<< < 30 31 32 33 34 35 36 37 38 39 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper

