SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
Improvement In Throughput For Power
Line Communication (PLC) For Smart
Meters Using Fog Computing Based Data
Aggregation Approach
In this topic, a framework for distributed data aggregation
approach with the help of fog computing architecture can be
proposed. With this approach the amount of data sent to the
centralized storage space will be limited and, therefore, the
capacity of PLC will be virtually improved without
compromising the functionality.
WWW.ThesisScientist.com
Fog Computing-based Face Identification
And Resolution Scheme In Internet Of
Things
The requirements for computation, communication and
storage capability are becoming higher and higher. To
solve this problem, a fog computing-based face
identification and resolution scheme can be proposed.
Face identifier will be firstly generated by identification
system model to identify an individual.
Dynamic Urban Surveillance Video Stream
Processing Using Fog Computing
Here, taking urban traffic surveillance as a case study,
a dynamic video stream processing scheme can be
proposed to meet the requirements of real-time
information processing and decision making.
Smart Human Security Framework Using
Internet Of Things, Cloud And Fog
Computing
In this topic, a security framework incorporating pervasive
and wearable computing, IOT, cloud and fog computing
can be provided to safeguard individuals and preclude any
mishap.
WWW.ThesisScientist.com
A Fog Computing Solution For Advanced
Metering Infrastructure
An implantable data storage-and-processing solution
for improving the existing smart meter infrastructure
can be proposed. The practicality of this solution will
be validated on a proof-of-concept test bed.
Fog Computing In Multi-tier Data Center
Networks: A Hierarchical Game
Approach
The network architecture with 3-layer model can be
modeled, where the FNs will be in the upper layer,
MDCOs in the middle layer, the DSSs in the bottom
layer. Based on the model, a hierarchical game can be
proposed.
User access mode selection in fog computing
based radio access networks
In this topic, the coverage probability and ergodic rate for
both F-AP users and device-to-device users can be
derived by taking into account the different nodes
locations, cache sizes as well as user access modes.
Particularly, the stochastic geometry tool will be used to
derive expressions
Health Fog: A Novel Framework For
Health And Wellness Applications
A framework of Health Fog can be proposed where
Fog computing will be used as an intermediary layer
between the cloud and end users. The design feature of
Health Fog will reduces the extra communication cost
Fog Computing Dynamic Load Balancing
Mechanism Based On Graph Repartitioning
This topic will research on the framework of the fog
computing, and adopts Cloud Atomization Technology to
turn physical nodes in different levels into virtual machine
nodes. On this basis, this topic will use the graph partitioning
theory to build the fog computing load balancing algorithm
based on dynamic graph partitioning.
WWW.ThesisScientist.com
Enhancement In Fog Detection And Free-
space Segmentation For Car Navigation
Here, a solution can be proposed thanks to a contrast
restoration approach on images grabbed by an in-vehicle
camera.
A Gateway Based Fog Computing
Architecture For Wireless Sensors And
Actuator Networks
In this topic, a gateway based fog computing architecture for
WSANs can be presented. This architecture will consist of
master nodes and slave nodes, and will manage virtual
gateway functions, flows, and resources.
A New Fog Removing Method Based On
The Degradation Model
A kind of algorithm can be introduced which will estimate
scene optical depth from several drop quality images based on
degradation model, and then the method will be applied to
drop quality image fog removing.
Steiner Tree Based Optimal Resource
Caching Scheme In Fog Computing
In this topic, a Steiner tree based caching scheme can be
proposed, in which the Fog servers, when caching resources,
will first produce a Steiner tree to minimize the total path
weight (or cost) such that the cost of resource caching using
this tree could be minimized.
A Radiative-Conductive Model For The
Prediction Of Radiation Fog
A conductive-radiative model can be used to predict the
formation and growth of radiation fog. This will be
accomplished by solving numerically the heat and mass
transport equations in conjunction with an approximate form
of the radiative transfer equation.
A Novel Mechanism Of Detection Of Denial
Of Service Attack (Dos) In VANET Using
Malicious And Irrelevant Packet Detection
Algorithm (MIPDA)
An Malicious and Irrelevant Packet Detection Algorithm
(MIPDA) can be proposed which will be used to analyze and
detect the Denial-of Service (DOS) attack.
Research on a Defogging Method of Fog-
Degrade Image Based on Depth Region
Segmentation
According to the effect of fog from images, a new defogging
method for image based on depth region segmentation can be
proposed in this topic. This method will reasonably apply the
fuzzy cluster analysis thinking, Construct the edge
characteristic vector based on multi resolution wavelet.
In this topic, an identity-based authentication scheme for
heterogeneous IOT can be proposed. The correctness of this
scheme will tested with the AVISPA tool .
Identity-based Authentication Scheme For
The Internet Of Things
Zone-code Based Optimal Connecting
Layer Scheme In Fog MMV
A novel topology scheme can be introduced in this topic for fog
computing, which will depend on Content-Addressable
Networks (CAN) and zone-code routing. The objective to our
approach is mapping servers in connecting layer in d-D space on
a 1-D space.
A Contrast Enhancement Method For Fog-
degraded Images
A fog-degraded image enhancement method can be
presented based on a human visual system (HVS). The
algorithm will utilize the HVS to segment a single fog-
degraded image into the Devries-Rose region, Weber
region, low-contrast, and saturation region with three
sub images.
Improving Web Sites Performance Using
Edge Servers In Fog Computing
Architecture
In this topic, web optimization within Fog Computing context
can be considered. The existing methods for web optimization
can be applied in a novel manner, such that these methods can
be combined with unique.
Efficient Fog Removal From Video
Here, a framework of real-time video processing for fog
removal using uncaliberated single camera system can be
proposed. Intelligent use of temporal redundancy present in
video frames paves the way for real-time implementation.
A Proximal Algorithm For Joint Resource
Allocation And Minimizing Carbon Footprint
In Geo-distributed Fog Computing
To solve the large scale optimization, a distributed
algorithm can be developed based on the proximal
algorithm and alternating direction method of
multipliers (ADMM).
Any queries?
You can find us at WWW.ThesisScientist.com

Contenu connexe

Tendances

Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)Iffat Anjum
 
Fog computing document
Fog computing documentFog computing document
Fog computing documentsravya raju
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEXAngelo Corsaro
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computingAhmed Banafa
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of ThingsS.Mostafa Sayyedi
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentationomkar parab
 
Sustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challengesSustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challengesAbdulMajidFarooqi
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation Anjana Shivangi
 
A Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsA Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsAM Publications
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptpriyanka reddy
 
Review of implementing fog computing
Review of implementing fog computingReview of implementing fog computing
Review of implementing fog computingeSAT Journals
 

Tendances (19)

Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Sustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challengesSustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challenges
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
A Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsA Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and Solutions
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Review of implementing fog computing
Review of implementing fog computingReview of implementing fog computing
Review of implementing fog computing
 

En vedette

cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computingarchana lisbon
 
Fog computing
Fog computingFog computing
Fog computingAnkit_ap
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with FogAchu Anna
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloudpriyanka reddy
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsDr. Mazlan Abbas
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt sravya raju
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?Felix Grovit
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?Dr. Mazlan Abbas
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applicationsPasquale Puzio
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 

En vedette (16)

Face detection issues
Face detection issuesFace detection issues
Face detection issues
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 

Similaire à Latest Thesis Topics for Fog computing

Ieee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and AbstractIeee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and Abstracttsysglobalsolutions
 
Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...tsysglobalsolutions
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
M.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System ProjectsM.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System ProjectsVijay Karan
 
Psdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computingPsdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computingZTech Proje
 
M.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System ProjectsM.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System ProjectsVijay Karan
 
M phil-computer-science-parallel-and-distributed-system-projects
M phil-computer-science-parallel-and-distributed-system-projectsM phil-computer-science-parallel-and-distributed-system-projects
M phil-computer-science-parallel-and-distributed-system-projectsVijay Karan
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfHODCS6
 
An Effect of Compressive Sensing on Image Steganalysis
An Effect of Compressive Sensing on Image SteganalysisAn Effect of Compressive Sensing on Image Steganalysis
An Effect of Compressive Sensing on Image SteganalysisIRJET Journal
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...ijma
 
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...MDABDULMANNANMONDAL
 
IEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and AbstractIEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and Abstracttsysglobalsolutions
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementtsysglobalsolutions
 
REAL-TIME PEDESTRIAN DETECTION USING APACHE STORM IN A DISTRIBUTED ENVIRONMENT
REAL-TIME PEDESTRIAN DETECTION USING APACHE STORM IN A DISTRIBUTED ENVIRONMENTREAL-TIME PEDESTRIAN DETECTION USING APACHE STORM IN A DISTRIBUTED ENVIRONMENT
REAL-TIME PEDESTRIAN DETECTION USING APACHE STORM IN A DISTRIBUTED ENVIRONMENTcscpconf
 
Real-Time Pedestrian Detection Using Apache Storm in a Distributed Environment
Real-Time Pedestrian Detection Using Apache Storm in a Distributed Environment Real-Time Pedestrian Detection Using Apache Storm in a Distributed Environment
Real-Time Pedestrian Detection Using Apache Storm in a Distributed Environment csandit
 
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...IRJET Journal
 
Software defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular cloudsSoftware defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular cloudsredpel dot com
 

Similaire à Latest Thesis Topics for Fog computing (20)

Latest Research Topics on Cloud Computing
Latest Research Topics on Cloud ComputingLatest Research Topics on Cloud Computing
Latest Research Topics on Cloud Computing
 
Matlab 2013 14 papers astract
Matlab 2013 14 papers astractMatlab 2013 14 papers astract
Matlab 2013 14 papers astract
 
Ieee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and AbstractIeee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and Abstract
 
Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
M.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System ProjectsM.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System Projects
 
Psdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computingPsdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computing
 
M.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System ProjectsM.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System Projects
 
M phil-computer-science-parallel-and-distributed-system-projects
M phil-computer-science-parallel-and-distributed-system-projectsM phil-computer-science-parallel-and-distributed-system-projects
M phil-computer-science-parallel-and-distributed-system-projects
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdf
 
V01 i010405
V01 i010405V01 i010405
V01 i010405
 
An Effect of Compressive Sensing on Image Steganalysis
An Effect of Compressive Sensing on Image SteganalysisAn Effect of Compressive Sensing on Image Steganalysis
An Effect of Compressive Sensing on Image Steganalysis
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
 
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
 
IEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and AbstractIEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and Abstract
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service management
 
REAL-TIME PEDESTRIAN DETECTION USING APACHE STORM IN A DISTRIBUTED ENVIRONMENT
REAL-TIME PEDESTRIAN DETECTION USING APACHE STORM IN A DISTRIBUTED ENVIRONMENTREAL-TIME PEDESTRIAN DETECTION USING APACHE STORM IN A DISTRIBUTED ENVIRONMENT
REAL-TIME PEDESTRIAN DETECTION USING APACHE STORM IN A DISTRIBUTED ENVIRONMENT
 
Real-Time Pedestrian Detection Using Apache Storm in a Distributed Environment
Real-Time Pedestrian Detection Using Apache Storm in a Distributed Environment Real-Time Pedestrian Detection Using Apache Storm in a Distributed Environment
Real-Time Pedestrian Detection Using Apache Storm in a Distributed Environment
 
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...
 
Software defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular cloudsSoftware defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular clouds
 

Plus de Thesis Scientist Private Limited

Latest Research Topics On Flying Ad-Hoc Networks (FANETs):
Latest Research Topics On Flying Ad-Hoc Networks (FANETs):Latest Research Topics On Flying Ad-Hoc Networks (FANETs):
Latest Research Topics On Flying Ad-Hoc Networks (FANETs):Thesis Scientist Private Limited
 

Plus de Thesis Scientist Private Limited (20)

HTML guide for beginners
HTML guide for beginnersHTML guide for beginners
HTML guide for beginners
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
How to write a Great Research Paper?
How to write a Great Research Paper?How to write a Great Research Paper?
How to write a Great Research Paper?
 
Research Process design
Research Process designResearch Process design
Research Process design
 
How to write a good Dissertation/ Thesis
How to write a good Dissertation/ ThesisHow to write a good Dissertation/ Thesis
How to write a good Dissertation/ Thesis
 
How to write a Research Paper
How to write a Research PaperHow to write a Research Paper
How to write a Research Paper
 
Internet security tips for Businesses
Internet security tips for BusinessesInternet security tips for Businesses
Internet security tips for Businesses
 
How to deal with a Compulsive liar
How to deal with a Compulsive liarHow to deal with a Compulsive liar
How to deal with a Compulsive liar
 
Driverless car Google
Driverless car GoogleDriverless car Google
Driverless car Google
 
Podcast tips beginners
Podcast tips beginnersPodcast tips beginners
Podcast tips beginners
 
Vastu for Career Success
Vastu for Career SuccessVastu for Career Success
Vastu for Career Success
 
Reliance jio broadband
Reliance jio broadbandReliance jio broadband
Reliance jio broadband
 
Job Satisfaction definition
Job Satisfaction definitionJob Satisfaction definition
Job Satisfaction definition
 
Mistakes in Advertising
Mistakes in AdvertisingMistakes in Advertising
Mistakes in Advertising
 
Contributor in a sentence
Contributor in a sentenceContributor in a sentence
Contributor in a sentence
 
Different Routing protocols
Different Routing protocolsDifferent Routing protocols
Different Routing protocols
 
Ad hoc network routing protocols
Ad hoc network routing protocolsAd hoc network routing protocols
Ad hoc network routing protocols
 
IPTV Thesis
IPTV ThesisIPTV Thesis
IPTV Thesis
 
Latest Research Topics On Flying Ad-Hoc Networks (FANETs):
Latest Research Topics On Flying Ad-Hoc Networks (FANETs):Latest Research Topics On Flying Ad-Hoc Networks (FANETs):
Latest Research Topics On Flying Ad-Hoc Networks (FANETs):
 
Project report format computer science
Project report format computer scienceProject report format computer science
Project report format computer science
 

Dernier

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesMayuraD1
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxNadaHaitham1
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesRAJNEESHKUMAR341697
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxMuhammadAsimMuhammad6
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 

Dernier (20)

"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Engineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planesEngineering Drawing focus on projection of planes
Engineering Drawing focus on projection of planes
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced LoadsFEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 

Latest Thesis Topics for Fog computing

  • 1.
  • 2. Improvement In Throughput For Power Line Communication (PLC) For Smart Meters Using Fog Computing Based Data Aggregation Approach In this topic, a framework for distributed data aggregation approach with the help of fog computing architecture can be proposed. With this approach the amount of data sent to the centralized storage space will be limited and, therefore, the capacity of PLC will be virtually improved without compromising the functionality. WWW.ThesisScientist.com
  • 3. Fog Computing-based Face Identification And Resolution Scheme In Internet Of Things The requirements for computation, communication and storage capability are becoming higher and higher. To solve this problem, a fog computing-based face identification and resolution scheme can be proposed. Face identifier will be firstly generated by identification system model to identify an individual.
  • 4. Dynamic Urban Surveillance Video Stream Processing Using Fog Computing Here, taking urban traffic surveillance as a case study, a dynamic video stream processing scheme can be proposed to meet the requirements of real-time information processing and decision making.
  • 5. Smart Human Security Framework Using Internet Of Things, Cloud And Fog Computing In this topic, a security framework incorporating pervasive and wearable computing, IOT, cloud and fog computing can be provided to safeguard individuals and preclude any mishap. WWW.ThesisScientist.com
  • 6. A Fog Computing Solution For Advanced Metering Infrastructure An implantable data storage-and-processing solution for improving the existing smart meter infrastructure can be proposed. The practicality of this solution will be validated on a proof-of-concept test bed.
  • 7. Fog Computing In Multi-tier Data Center Networks: A Hierarchical Game Approach The network architecture with 3-layer model can be modeled, where the FNs will be in the upper layer, MDCOs in the middle layer, the DSSs in the bottom layer. Based on the model, a hierarchical game can be proposed.
  • 8. User access mode selection in fog computing based radio access networks In this topic, the coverage probability and ergodic rate for both F-AP users and device-to-device users can be derived by taking into account the different nodes locations, cache sizes as well as user access modes. Particularly, the stochastic geometry tool will be used to derive expressions
  • 9. Health Fog: A Novel Framework For Health And Wellness Applications A framework of Health Fog can be proposed where Fog computing will be used as an intermediary layer between the cloud and end users. The design feature of Health Fog will reduces the extra communication cost
  • 10. Fog Computing Dynamic Load Balancing Mechanism Based On Graph Repartitioning This topic will research on the framework of the fog computing, and adopts Cloud Atomization Technology to turn physical nodes in different levels into virtual machine nodes. On this basis, this topic will use the graph partitioning theory to build the fog computing load balancing algorithm based on dynamic graph partitioning. WWW.ThesisScientist.com
  • 11. Enhancement In Fog Detection And Free- space Segmentation For Car Navigation Here, a solution can be proposed thanks to a contrast restoration approach on images grabbed by an in-vehicle camera.
  • 12. A Gateway Based Fog Computing Architecture For Wireless Sensors And Actuator Networks In this topic, a gateway based fog computing architecture for WSANs can be presented. This architecture will consist of master nodes and slave nodes, and will manage virtual gateway functions, flows, and resources.
  • 13. A New Fog Removing Method Based On The Degradation Model A kind of algorithm can be introduced which will estimate scene optical depth from several drop quality images based on degradation model, and then the method will be applied to drop quality image fog removing.
  • 14. Steiner Tree Based Optimal Resource Caching Scheme In Fog Computing In this topic, a Steiner tree based caching scheme can be proposed, in which the Fog servers, when caching resources, will first produce a Steiner tree to minimize the total path weight (or cost) such that the cost of resource caching using this tree could be minimized.
  • 15. A Radiative-Conductive Model For The Prediction Of Radiation Fog A conductive-radiative model can be used to predict the formation and growth of radiation fog. This will be accomplished by solving numerically the heat and mass transport equations in conjunction with an approximate form of the radiative transfer equation.
  • 16. A Novel Mechanism Of Detection Of Denial Of Service Attack (Dos) In VANET Using Malicious And Irrelevant Packet Detection Algorithm (MIPDA) An Malicious and Irrelevant Packet Detection Algorithm (MIPDA) can be proposed which will be used to analyze and detect the Denial-of Service (DOS) attack.
  • 17. Research on a Defogging Method of Fog- Degrade Image Based on Depth Region Segmentation According to the effect of fog from images, a new defogging method for image based on depth region segmentation can be proposed in this topic. This method will reasonably apply the fuzzy cluster analysis thinking, Construct the edge characteristic vector based on multi resolution wavelet.
  • 18. In this topic, an identity-based authentication scheme for heterogeneous IOT can be proposed. The correctness of this scheme will tested with the AVISPA tool . Identity-based Authentication Scheme For The Internet Of Things
  • 19. Zone-code Based Optimal Connecting Layer Scheme In Fog MMV A novel topology scheme can be introduced in this topic for fog computing, which will depend on Content-Addressable Networks (CAN) and zone-code routing. The objective to our approach is mapping servers in connecting layer in d-D space on a 1-D space.
  • 20. A Contrast Enhancement Method For Fog- degraded Images A fog-degraded image enhancement method can be presented based on a human visual system (HVS). The algorithm will utilize the HVS to segment a single fog- degraded image into the Devries-Rose region, Weber region, low-contrast, and saturation region with three sub images.
  • 21. Improving Web Sites Performance Using Edge Servers In Fog Computing Architecture In this topic, web optimization within Fog Computing context can be considered. The existing methods for web optimization can be applied in a novel manner, such that these methods can be combined with unique.
  • 22. Efficient Fog Removal From Video Here, a framework of real-time video processing for fog removal using uncaliberated single camera system can be proposed. Intelligent use of temporal redundancy present in video frames paves the way for real-time implementation.
  • 23. A Proximal Algorithm For Joint Resource Allocation And Minimizing Carbon Footprint In Geo-distributed Fog Computing To solve the large scale optimization, a distributed algorithm can be developed based on the proximal algorithm and alternating direction method of multipliers (ADMM).
  • 24. Any queries? You can find us at WWW.ThesisScientist.com