Energy efficient techniques for iot application on resource aware fog computing paradigm
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.2.11Keywords:
Resource aware, IoT application, fog computing paradigm, latency, network, Energy Efficient TechniqueDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
During the rapid emergence of the IoT environment, computing is widespread in all domains and undergoes tiny changes on an everyday basis that lead to momentous shifts in the development and deployment of applications. Network infrastructure can be utilized efficiently in large volumes of data by deploying the applications. IoT applications constitute different types of modules that run together with interdependency and run on the cloud conventionally in the data center. The research study proposes a framework for a resource-aware fog computing paradigm using a Module mapping algorithm, lower bound algorithm, Application Module and Network Node and resource-aware algorithm. Fog computing is employed for deploying IoT applications that are sensitive to latency. The incoming data is processed by fog computing by utilizing the available resources by reducing the amount of data sent to the server. The optimum performance can be achieved by connecting the appropriate sensor node to the parent node. The proposed algorithm reduces energy consumption and latency. Comparative analysis is performed for the proposed and conventional fog computing paradigm.Abstract
How to Cite
Downloads
Similar Articles
- A. Rukmani, C. Jayanthi, Fuzzy optimization trust aware clustering approach for the detection of malicious node in the wireless sensor networks , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Karthik Baburaj, Navaneeth kattil Madathil, Roshini Barkur, NLP Based Voice Assistant Usage on Consumer Shopping , The Scientific Temper: Vol. 16 No. Spl-2 (2025): The Scientific Temper
- Deepika M, Antonitte Vinoline I, An integrated inventory system for profit maximization considering partial demand satisfaction , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- Rahat Yezdani, S. M. K. Quadri, A PPR-based energy-efficient VM consolidation in cloud computing , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- M. Iniyan, A. Banumathi, Brower blowfish nash secured stochastic neural network based disease diagnosis for medical WBAN in cloud environment , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Aruljothi Rajasekaran, Jemima Priyadarsini R., ECDS: Enhanced Cloud Data Security Technique to Protect Data Being Stored in Cloud Infrastructure , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- A. Anand, A. Nisha Jebaseeli, AI-driven real-time performance optimization and comparison of virtual machines and containers in cloud environments , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- M. Iniyan, A. Banumathi, The WBANs: Steps towards a comprehensive analysis of wireless body area networks , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- A. Kalaiselvi, A. Chandrabose, Fuzzy logic-driven scheduling for cloud computing operations: a dynamic and adaptive approach , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Jonnakuti V. G. Rama Rao, Muthuvel Balasubramanian, Chaladi S. Gangabhavani, Mutyala A. Devi, Kona D. Devi, A TLBO algorithm-based optimal sizing in a standalone hybrid renewable energy system , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper

