International Journal of Fog Computing
Latest Publications


TOTAL DOCUMENTS

28
(FIVE YEARS 20)

H-INDEX

5
(FIVE YEARS 2)

Published By Igi Global

2572-4894, 2572-4908

2021 ◽  
Vol 4 (1) ◽  
pp. 1-17
Author(s):  
Hewan Shrestha ◽  
Puviyarai T. ◽  
Sana Sodanapalli ◽  
Chandramohan Dhasarathan

The emerging trend of internet of things in recent times is a blessing for various industries in the world. With the increasing amount of data generated by these devices, it makes it difficult for proper data flow and computation over the regular cloud architecture. Fog computing is a great alternative for cloud computing as it supports computation in devices over a large distributed geographical area, which is a plus for fog computing. Having applications in various domains including healthcare, logistics, design, marketing, manufacturing, and many more, fog computing is a great boon for the future. Evolving fog computing in various domains with different methods and techniques has shaped a clear future for it. Applicability of fog computing in vehicular communications and storage-as-a-service has made the term more popular these days. It is a review of all the possible fog computing-enabled applications and their future scope. It also prepares a basis for further research into fog computing domain-enabled services with low latency and minimum costs.


2021 ◽  
Vol 4 (1) ◽  
pp. 18-36
Author(s):  
Kelly M. Torres ◽  
Aubrey Statti

Advanced technologies are changing the educational and organizational landscape. Technologies such as augmented reality are providing professionals access to technology-enhanced activities that promote greater acquisition of new concepts through immersive learning experiences. Prior research conducted on augmented reality has resulted in findings that demonstrate numerous benefits associated with its use including increasing learner levels of motivation, content knowledge, and critical and problem-solving skills. These tools have been implemented at all levels of education and across a range of professional settings. This article will explore how the inclusion of these tools provide employees access to cutting-edge technologies that promote skill growth and improve efficacy in their professional responsibilities and how fog computing has the capability enhance this technology.


2021 ◽  
Vol 4 (1) ◽  
pp. 37-51
Author(s):  
Sana Sodanapalli ◽  
Hewan Shrestha ◽  
Chandramohan Dhasarathan ◽  
Puviyarasi T. ◽  
Sam Goundar

Edge computing is an exciting new approach to network architecture that helps organizations break beyond the limitations imposed by traditional cloud-based networks. It has emerged as a viable and important architecture that supports distributed computing to deploy compute and storage resources closer to the data source. Edge and fog computing addresses three principles of network limitations of bandwidth, latency, congestion, and reliability. The research community sees edge computing at manufacturing, farming, network optimization, workplace safety, improved healthcare, transportation, etc. The promise of this technology will be realized through addressing new research challenges in the IoT paradigm and the design of highly-efficient communication technology with minimum cost and effort.


2020 ◽  
Vol 3 (2) ◽  
pp. 21-30
Author(s):  
Jitendra Kumar ◽  
Mohammed Ammar ◽  
Shah Abhay Kantilal ◽  
Vaishali R. Thakare

Cloud is a collective term for a large number of developments and possibilities. Various data can be stored by the large amount of people onto the cloud storage facility without any bound of limitations as it provides tremendous space. Open systems like Android (Google Apps) still face many day- to-day security threats or attacks. With recent demand, cloud computing has raised security concerns for both service providers and consumers. Major issues like data transfer over wireless network across the globe have to be protected from unauthorized usage over the cloud as altered data can lead to great loss. In this regard, data auditing along with integrity, dynamic capabilities, and privacy preserving, and plays as an important role for preventing data from various cloud attacks which is considered in this work. The work also includes efficient auditor which plays a crucial role in securing the cloud environment. This paper presents a review on the cloud computing concepts and security issues inherent within the context of cloud computing and cloud infrastructure.


2020 ◽  
Vol 3 (2) ◽  
pp. 46-54
Author(s):  
Abhinandan V. ◽  
Aishwarya C. A. ◽  
Arshiya Sultana

Online reviews play a vital role in today's business and commerce. In the world of e-commerce, reviews are the best signs of success and failure. Businesses that have good reviews get a lot of free exposure on websites and pages that have good reviews show up at the top of the search results. Fake reviews are everywhere online. Online fake reviews are the reviews which are written by someone who has not actually used the product or the services. Because of the cut-throat competition, sellers are now willing to resort to unfair means to make their product stand out. This work introduces some supervised machine learning techniques to detect fake online reviews and also be able to block the malicious users who post such reviews.


2020 ◽  
Vol 3 (2) ◽  
pp. 1-20
Author(s):  
Tanweer Alam

Exploring the unique blockchain-internet of things (IoT) framework may be an attractive structure for enhancing communications efficiency in the 5G networks. The wireless communication would have been the largest research area that allows users to communicate with each other. Nowadays, high-speed, smart, efficient with many technologies, such as low power consumption, and so on, appear to be available to communicate with each other in today's globe. Throughout this framework, the expansion of fog features is enabled for physical objects within IoT. Several of the challenging issues in the field of wireless communications would be to build a new blockchain-based virtualization system across the IoT architecture. The main purpose of this framework is to connect blockchain technology to the IoT and fogging or maintains the IoT cryptography secured when transactions occurred. This strengthens blockchain and fog to build an effective IoT communication system. The recommended method is an important estimation of the extensive work.


2020 ◽  
Vol 3 (2) ◽  
pp. 31-45
Author(s):  
Monica S. Kumar ◽  
Swathi K. Bhat ◽  
Vaishali R. Thakare

Brain tumor segmentation and detection is one of the most critical parts in the field of medical regions. Tumor is a cancer type that can be visible in any part of the body in case of primary and secondary tumor. The different type of brain tumor is glioma, benign, malignant, meningioma. This research helps in retrieving the tumor region in the brain with the help of 2D MRI images. The system predicts using MATLAB which is a programming platform and analyze the tumor from different method like canny edge, Otsu's binary, fuzzy c-means (FCM), and k-means clustering to improve the borders using the pixel technique. Using convolution neural network (CNN), neural network, and natural language processing, the system detects brain tumor based on the pre-processing and post-processing feature. Moreover, the authors figure out which tumor affected is the most important feature to protect the lifespan in the initial stages. Finally, it acknowledges the result in the mail format to the doctor or patient.


2020 ◽  
Vol 3 (1) ◽  
pp. 75-105 ◽  
Author(s):  
Rahul Neware ◽  
Urmila Shrawankar

Fog computing spreads the cloud administrations and services to the edge of the system, and brings processing, communications and reserving, and storage capacity closer to edge gadgets and end-clients and, in the process, aims at enhancing versatility, low latency, transfer speed and safety and protection. This article takes an extensive and wide-ranging view of fog computing, covering several aspects. At the outset is the many-layered structural design of fog computing and its attributes. After that, chief advances like communication and inter-exchange, computing, etc. are delineated, while showing how these backup and facilitate the installations and various applications. Following that, it is shown that how, despite fog computing being a feature-rich platform, it is dogged by its susceptibility to several security, privacy, and safety concerns, which stem from the nature of its widely distributed and open architecture. Finally, some suggestions are advanced to address some of the safety challenges discussed so as to propel the further growth of fog computing.


2020 ◽  
Vol 3 (1) ◽  
pp. 1-21 ◽  
Author(s):  
Basetty Mallikarjuna

The main aim of Internet of Things (IoT) is to get every “thing” (sensors, smart cameras, wearable devices, and smart home appliances) to connect to the internet. Henceforth to produce the high volume of data required for data processing between IoT devices, large storage and the huge number of applications to offer cloud computing as a service. The purpose of IoT-based-cloud is to manage the resources, and effective utilization of tasks in cloud. The end user applications are essential to enhance the QoS parameters. As per the QoS parameters, the service provider makes the speed up of tasks. There is a requirement for assigning responsibilities based on priority. The cloud services are increased to the network edge, and the planned model is under the Fog computing paradigm to reduce the makespan of time. The priority based fuzzy scheduling approach is brought by the dynamic feedback-based mechanism. The planned mechanism is verified with the diverse prevailing algorithms and evidenced that planned methodology is supported by effective results.


2020 ◽  
Vol 3 (1) ◽  
pp. 41-63 ◽  
Author(s):  
Basetty Mallikarjuna

In this article, the proposed feedback-based resource management approach provides data processing, huge computation, large storage, and networking services between Internet of Things (IoT)-based Cloud data centers and the end-users. The real-time applications of IoT, such as smart city, smart home, health care management systems, traffic management systems, and transportation management systems, require less response time and latency to process the huge amount of data. The proposed feedback-based resource management plan provides a novel resource management technique, consisting of an integrated architecture and maintains the service-level agreement (SLA). It can optimize energy consumption, response time, network bandwidth, security, and reduce latency. The experimental results are tested with the IFogSim tool kit and have proved that the proposed approach is effective and suitable for smart communication in IoT-based cloud.


Sign in / Sign up

Export Citation Format

Share Document