A Review of Research Opportunities in Fog and IoT
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2021, Vol 9, Issue 6
Abstract
Within the cloud-to-things gamut, Fog is an embryonic design for storing data, performing computations, controlling applications that allocate many of such facilities to the end users. It is applicable to both wireline and mobile situations, spans software as well as hardware, sits on the edge of the network as well as among end-users and across access networks, and encompasses control as well as data planes. The review spots the most noteworthy applications of fog computing. It supports an increasing number of applications as an architecture that includes fifth-generation (5G) wireless systems, the Internet of Things (IoT), and integrated artificial intelligence (AI). The possibilities and problems of fog are summarized in this survey study, which focuses mainly on the networking environment of IoT. Fog is an important edge's stems from the conventional cloud's inadequacies as well as the development of new possibilities for the IoT, 5G, and embedded AI.
Authors and Affiliations
Pankaj Saraswat, Swapnil Raj
Deep Learning-Based Chip Power Prediction and Optimization: An Intelligent EDA Approach
This paper explores the integration of deep learning techniques in Electronic Design Automation (EDA) tools, focusing on chip power prediction and optimization. We investigate the application of advanced AI technologies,...
Risk Management in Infrastructure Projects
Management of risks in the infrastructure projects has been categorized of utmost importance to the process of management so that the project objectives and motives in terms of time, cost, quality may be accomplished. Th...
Optimization of Random Forest Algorithm for Breast Cancer Detection
Today, cancer is a big issue and the most common disease all over the world. Cancer starts due to the abnormal growth of cells in your body. So, cancer takes place anywhere in the body. There are more than 100 types of c...
Use of Smart Intrusion Detection System for Enhancing the Security in Hierarchical Wireless Sensor Network
Trusted environment provides safety measures for the sensor network. There are many problems that occur during the management of resources. Memory management and computation overhead or CPU usage are the major issues. Se...
Pitch Estimation and Analysis of speech signal
Speech is the principal form of human communication since it began from day one when human beings start to communicate. The rate of vibration produce by the vocal cords is called a fundamental frequency (F0) or pitch per...