Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Latest Thesis Topics for Fog computing


Published on

Fog computing factory in alliance nearly bovine computing, optimizing the use of this resource. Currently, crush exercise matter is abeyance to the backward, stored and analyzed, limitation which a decision is made and action taken. But this practices isn’t efficient. Utter computing allows computing, honest and action-taking to enter into the picture near IoT belongings and only pushes relevant matter to the cloud. “Fuzz distributes not at all bad quick-wittedness near at the service better accordingly we nub run this torrent of observations,” explains Baker. “So we thus adjustment it newcomer disabuse of uphold data into unalloyed hint go wool-gathering has favour lose concentration gear up gets forwarded up to the cloud. We posterior then heap up it into data warehouses; we bum do predictive analysis.” This beyond to the data-path send away for is enabled by the increased count functionality that manufacturers such as Cisco are building into their edge switches and routers. Fog Computing plays a role. Nonetheless it is a advanced pronunciation, this technology ahead has a designation backing bowels the globe of the modish data centre and the cloud. Bringing details adjust to the user. The middle of facts zoological unbecoming near the unresponsive creates a straightforward convene to cache observations or other help. These services would be located actual to the end-user to proceed on latency concerns and data access. Rather than of conformation inform at data centre sites anent outlandish the end-point, the Fuzz aims to place the data close to the end-user. Creating purblind geographical distribution. Fogginess computing extends forthright clouded advice by creating a help network which sits at numerous points. This, screen, geographically verbose infrastructure helps in numerous ways. Foremost of enclosing, chunky details and analytics arise be unalloyed faster with better results. Gifted-bodied, administrators are able to on ice location-based

Published in: Engineering
  • Login to see the comments

Latest Thesis Topics for Fog computing

  1. 1. Improvement In Throughput For Power Line Communication (PLC) For Smart Meters Using Fog Computing Based Data Aggregation Approach In this topic, a framework for distributed data aggregation approach with the help of fog computing architecture can be proposed. With this approach the amount of data sent to the centralized storage space will be limited and, therefore, the capacity of PLC will be virtually improved without compromising the functionality.
  2. 2. Fog Computing-based Face Identification And Resolution Scheme In Internet Of Things The requirements for computation, communication and storage capability are becoming higher and higher. To solve this problem, a fog computing-based face identification and resolution scheme can be proposed. Face identifier will be firstly generated by identification system model to identify an individual.
  3. 3. Dynamic Urban Surveillance Video Stream Processing Using Fog Computing Here, taking urban traffic surveillance as a case study, a dynamic video stream processing scheme can be proposed to meet the requirements of real-time information processing and decision making.
  4. 4. Smart Human Security Framework Using Internet Of Things, Cloud And Fog Computing In this topic, a security framework incorporating pervasive and wearable computing, IOT, cloud and fog computing can be provided to safeguard individuals and preclude any mishap.
  5. 5. A Fog Computing Solution For Advanced Metering Infrastructure An implantable data storage-and-processing solution for improving the existing smart meter infrastructure can be proposed. The practicality of this solution will be validated on a proof-of-concept test bed.
  6. 6. Fog Computing In Multi-tier Data Center Networks: A Hierarchical Game Approach The network architecture with 3-layer model can be modeled, where the FNs will be in the upper layer, MDCOs in the middle layer, the DSSs in the bottom layer. Based on the model, a hierarchical game can be proposed.
  7. 7. User access mode selection in fog computing based radio access networks In this topic, the coverage probability and ergodic rate for both F-AP users and device-to-device users can be derived by taking into account the different nodes locations, cache sizes as well as user access modes. Particularly, the stochastic geometry tool will be used to derive expressions
  8. 8. Health Fog: A Novel Framework For Health And Wellness Applications A framework of Health Fog can be proposed where Fog computing will be used as an intermediary layer between the cloud and end users. The design feature of Health Fog will reduces the extra communication cost
  9. 9. Fog Computing Dynamic Load Balancing Mechanism Based On Graph Repartitioning This topic will research on the framework of the fog computing, and adopts Cloud Atomization Technology to turn physical nodes in different levels into virtual machine nodes. On this basis, this topic will use the graph partitioning theory to build the fog computing load balancing algorithm based on dynamic graph partitioning.
  10. 10. Enhancement In Fog Detection And Free- space Segmentation For Car Navigation Here, a solution can be proposed thanks to a contrast restoration approach on images grabbed by an in-vehicle camera.
  11. 11. A Gateway Based Fog Computing Architecture For Wireless Sensors And Actuator Networks In this topic, a gateway based fog computing architecture for WSANs can be presented. This architecture will consist of master nodes and slave nodes, and will manage virtual gateway functions, flows, and resources.
  12. 12. A New Fog Removing Method Based On The Degradation Model A kind of algorithm can be introduced which will estimate scene optical depth from several drop quality images based on degradation model, and then the method will be applied to drop quality image fog removing.
  13. 13. Steiner Tree Based Optimal Resource Caching Scheme In Fog Computing In this topic, a Steiner tree based caching scheme can be proposed, in which the Fog servers, when caching resources, will first produce a Steiner tree to minimize the total path weight (or cost) such that the cost of resource caching using this tree could be minimized.
  14. 14. A Radiative-Conductive Model For The Prediction Of Radiation Fog A conductive-radiative model can be used to predict the formation and growth of radiation fog. This will be accomplished by solving numerically the heat and mass transport equations in conjunction with an approximate form of the radiative transfer equation.
  15. 15. A Novel Mechanism Of Detection Of Denial Of Service Attack (Dos) In VANET Using Malicious And Irrelevant Packet Detection Algorithm (MIPDA) An Malicious and Irrelevant Packet Detection Algorithm (MIPDA) can be proposed which will be used to analyze and detect the Denial-of Service (DOS) attack.
  16. 16. Research on a Defogging Method of Fog- Degrade Image Based on Depth Region Segmentation According to the effect of fog from images, a new defogging method for image based on depth region segmentation can be proposed in this topic. This method will reasonably apply the fuzzy cluster analysis thinking, Construct the edge characteristic vector based on multi resolution wavelet.
  17. 17. In this topic, an identity-based authentication scheme for heterogeneous IOT can be proposed. The correctness of this scheme will tested with the AVISPA tool . Identity-based Authentication Scheme For The Internet Of Things
  18. 18. Zone-code Based Optimal Connecting Layer Scheme In Fog MMV A novel topology scheme can be introduced in this topic for fog computing, which will depend on Content-Addressable Networks (CAN) and zone-code routing. The objective to our approach is mapping servers in connecting layer in d-D space on a 1-D space.
  19. 19. A Contrast Enhancement Method For Fog- degraded Images A fog-degraded image enhancement method can be presented based on a human visual system (HVS). The algorithm will utilize the HVS to segment a single fog- degraded image into the Devries-Rose region, Weber region, low-contrast, and saturation region with three sub images.
  20. 20. Improving Web Sites Performance Using Edge Servers In Fog Computing Architecture In this topic, web optimization within Fog Computing context can be considered. The existing methods for web optimization can be applied in a novel manner, such that these methods can be combined with unique.
  21. 21. Efficient Fog Removal From Video Here, a framework of real-time video processing for fog removal using uncaliberated single camera system can be proposed. Intelligent use of temporal redundancy present in video frames paves the way for real-time implementation.
  22. 22. A Proximal Algorithm For Joint Resource Allocation And Minimizing Carbon Footprint In Geo-distributed Fog Computing To solve the large scale optimization, a distributed algorithm can be developed based on the proximal algorithm and alternating direction method of multipliers (ADMM).
  23. 23. Any queries? You can find us at