SlideShare a Scribd company logo
1 of 24
Download to read offline
Improvement In Throughput For Power
Line Communication (PLC) For Smart
Meters Using Fog Computing Based Data
Aggregation Approach
In this topic, a framework for distributed data aggregation
approach with the help of fog computing architecture can be
proposed. With this approach the amount of data sent to the
centralized storage space will be limited and, therefore, the
capacity of PLC will be virtually improved without
compromising the functionality.
WWW.ThesisScientist.com
Fog Computing-based Face Identification
And Resolution Scheme In Internet Of
Things
The requirements for computation, communication and
storage capability are becoming higher and higher. To
solve this problem, a fog computing-based face
identification and resolution scheme can be proposed.
Face identifier will be firstly generated by identification
system model to identify an individual.
Dynamic Urban Surveillance Video Stream
Processing Using Fog Computing
Here, taking urban traffic surveillance as a case study,
a dynamic video stream processing scheme can be
proposed to meet the requirements of real-time
information processing and decision making.
Smart Human Security Framework Using
Internet Of Things, Cloud And Fog
Computing
In this topic, a security framework incorporating pervasive
and wearable computing, IOT, cloud and fog computing
can be provided to safeguard individuals and preclude any
mishap.
WWW.ThesisScientist.com
A Fog Computing Solution For Advanced
Metering Infrastructure
An implantable data storage-and-processing solution
for improving the existing smart meter infrastructure
can be proposed. The practicality of this solution will
be validated on a proof-of-concept test bed.
Fog Computing In Multi-tier Data Center
Networks: A Hierarchical Game
Approach
The network architecture with 3-layer model can be
modeled, where the FNs will be in the upper layer,
MDCOs in the middle layer, the DSSs in the bottom
layer. Based on the model, a hierarchical game can be
proposed.
User access mode selection in fog computing
based radio access networks
In this topic, the coverage probability and ergodic rate for
both F-AP users and device-to-device users can be
derived by taking into account the different nodes
locations, cache sizes as well as user access modes.
Particularly, the stochastic geometry tool will be used to
derive expressions
Health Fog: A Novel Framework For
Health And Wellness Applications
A framework of Health Fog can be proposed where
Fog computing will be used as an intermediary layer
between the cloud and end users. The design feature of
Health Fog will reduces the extra communication cost
Fog Computing Dynamic Load Balancing
Mechanism Based On Graph Repartitioning
This topic will research on the framework of the fog
computing, and adopts Cloud Atomization Technology to
turn physical nodes in different levels into virtual machine
nodes. On this basis, this topic will use the graph partitioning
theory to build the fog computing load balancing algorithm
based on dynamic graph partitioning.
WWW.ThesisScientist.com
Enhancement In Fog Detection And Free-
space Segmentation For Car Navigation
Here, a solution can be proposed thanks to a contrast
restoration approach on images grabbed by an in-vehicle
camera.
A Gateway Based Fog Computing
Architecture For Wireless Sensors And
Actuator Networks
In this topic, a gateway based fog computing architecture for
WSANs can be presented. This architecture will consist of
master nodes and slave nodes, and will manage virtual
gateway functions, flows, and resources.
A New Fog Removing Method Based On
The Degradation Model
A kind of algorithm can be introduced which will estimate
scene optical depth from several drop quality images based on
degradation model, and then the method will be applied to
drop quality image fog removing.
Steiner Tree Based Optimal Resource
Caching Scheme In Fog Computing
In this topic, a Steiner tree based caching scheme can be
proposed, in which the Fog servers, when caching resources,
will first produce a Steiner tree to minimize the total path
weight (or cost) such that the cost of resource caching using
this tree could be minimized.
A Radiative-Conductive Model For The
Prediction Of Radiation Fog
A conductive-radiative model can be used to predict the
formation and growth of radiation fog. This will be
accomplished by solving numerically the heat and mass
transport equations in conjunction with an approximate form
of the radiative transfer equation.
A Novel Mechanism Of Detection Of Denial
Of Service Attack (Dos) In VANET Using
Malicious And Irrelevant Packet Detection
Algorithm (MIPDA)
An Malicious and Irrelevant Packet Detection Algorithm
(MIPDA) can be proposed which will be used to analyze and
detect the Denial-of Service (DOS) attack.
Research on a Defogging Method of Fog-
Degrade Image Based on Depth Region
Segmentation
According to the effect of fog from images, a new defogging
method for image based on depth region segmentation can be
proposed in this topic. This method will reasonably apply the
fuzzy cluster analysis thinking, Construct the edge
characteristic vector based on multi resolution wavelet.
In this topic, an identity-based authentication scheme for
heterogeneous IOT can be proposed. The correctness of this
scheme will tested with the AVISPA tool .
Identity-based Authentication Scheme For
The Internet Of Things
Zone-code Based Optimal Connecting
Layer Scheme In Fog MMV
A novel topology scheme can be introduced in this topic for fog
computing, which will depend on Content-Addressable
Networks (CAN) and zone-code routing. The objective to our
approach is mapping servers in connecting layer in d-D space on
a 1-D space.
A Contrast Enhancement Method For Fog-
degraded Images
A fog-degraded image enhancement method can be
presented based on a human visual system (HVS). The
algorithm will utilize the HVS to segment a single fog-
degraded image into the Devries-Rose region, Weber
region, low-contrast, and saturation region with three
sub images.
Improving Web Sites Performance Using
Edge Servers In Fog Computing
Architecture
In this topic, web optimization within Fog Computing context
can be considered. The existing methods for web optimization
can be applied in a novel manner, such that these methods can
be combined with unique.
Efficient Fog Removal From Video
Here, a framework of real-time video processing for fog
removal using uncaliberated single camera system can be
proposed. Intelligent use of temporal redundancy present in
video frames paves the way for real-time implementation.
A Proximal Algorithm For Joint Resource
Allocation And Minimizing Carbon Footprint
In Geo-distributed Fog Computing
To solve the large scale optimization, a distributed
algorithm can be developed based on the proximal
algorithm and alternating direction method of
multipliers (ADMM).
Any queries?
You can find us at WWW.ThesisScientist.com

More Related Content

What's hot

FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
Anjana Shivangi
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
priyanka reddy
 

What's hot (19)

Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Fog Computing with VORTEX
Fog Computing with VORTEXFog Computing with VORTEX
Fog Computing with VORTEX
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog Computing and the Internet of Things
Fog Computing and the Internet of ThingsFog Computing and the Internet of Things
Fog Computing and the Internet of Things
 
Fog computing paper presentation
Fog computing paper presentationFog computing paper presentation
Fog computing paper presentation
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Sustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challengesSustainability and fog computing applications, advantages and challenges
Sustainability and fog computing applications, advantages and challenges
 
FOG COMPUTING- Presentation
FOG COMPUTING- Presentation FOG COMPUTING- Presentation
FOG COMPUTING- Presentation
 
Seminar ppt fog comp
Seminar ppt fog compSeminar ppt fog comp
Seminar ppt fog comp
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
A Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and SolutionsA Study on Cloud and Fog Computing Security Issues and Solutions
A Study on Cloud and Fog Computing Security Issues and Solutions
 
Fog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud pptFog computing provide security to data in cloud ppt
Fog computing provide security to data in cloud ppt
 
Fog computing
Fog computingFog computing
Fog computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Review of implementing fog computing
Review of implementing fog computingReview of implementing fog computing
Review of implementing fog computing
 

Viewers also liked

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 

Viewers also liked (16)

Face detection issues
Face detection issuesFace detection issues
Face detection issues
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Fog computing
Fog computingFog computing
Fog computing
 
Security Issues of IoT with Fog
Security Issues of IoT with FogSecurity Issues of IoT with Fog
Security Issues of IoT with Fog
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Internet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and ApplicationsInternet of Things (IOT) - Technology and Applications
Internet of Things (IOT) - Technology and Applications
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
fog computing ppt
fog computing ppt fog computing ppt
fog computing ppt
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
What is the Internet of Things?
What is the Internet of Things?What is the Internet of Things?
What is the Internet of Things?
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?What exactly is the "Internet of Things"?
What exactly is the "Internet of Things"?
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 

Similar to Latest Thesis Topics for Fog computing

Psdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computingPsdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computing
ZTech Proje
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
ijma
 
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
MDABDULMANNANMONDAL
 

Similar to Latest Thesis Topics for Fog computing (20)

Latest Research Topics on Cloud Computing
Latest Research Topics on Cloud ComputingLatest Research Topics on Cloud Computing
Latest Research Topics on Cloud Computing
 
Matlab 2013 14 papers astract
Matlab 2013 14 papers astractMatlab 2013 14 papers astract
Matlab 2013 14 papers astract
 
Ieee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and AbstractIeee transactions 2018 on wireless communications Title and Abstract
Ieee transactions 2018 on wireless communications Title and Abstract
 
Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...Ieee transactions 2018 topics on wireless communications for final year stude...
Ieee transactions 2018 topics on wireless communications for final year stude...
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
M.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System ProjectsM.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System Projects
 
Psdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computingPsdot 1 optimization of resource provisioning cost in cloud computing
Psdot 1 optimization of resource provisioning cost in cloud computing
 
M.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System ProjectsM.Phil Computer Science Parallel and Distributed System Projects
M.Phil Computer Science Parallel and Distributed System Projects
 
M phil-computer-science-parallel-and-distributed-system-projects
M phil-computer-science-parallel-and-distributed-system-projectsM phil-computer-science-parallel-and-distributed-system-projects
M phil-computer-science-parallel-and-distributed-system-projects
 
Computing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdfComputing_Paradigms_An_Overview.pdf
Computing_Paradigms_An_Overview.pdf
 
V01 i010405
V01 i010405V01 i010405
V01 i010405
 
An Effect of Compressive Sensing on Image Steganalysis
An Effect of Compressive Sensing on Image SteganalysisAn Effect of Compressive Sensing on Image Steganalysis
An Effect of Compressive Sensing on Image Steganalysis
 
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
JOINT IMAGE WATERMARKING, COMPRESSION AND ENCRYPTION BASED ON COMPRESSED SENS...
 
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
Stereo Correspondence Estimation by Two Dimensional Real Time Spiral Search A...
 
IEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and AbstractIEEE Cloud computing 2016 Title and Abstract
IEEE Cloud computing 2016 Title and Abstract
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service management
 
REAL-TIME PEDESTRIAN DETECTION USING APACHE STORM IN A DISTRIBUTED ENVIRONMENT
REAL-TIME PEDESTRIAN DETECTION USING APACHE STORM IN A DISTRIBUTED ENVIRONMENTREAL-TIME PEDESTRIAN DETECTION USING APACHE STORM IN A DISTRIBUTED ENVIRONMENT
REAL-TIME PEDESTRIAN DETECTION USING APACHE STORM IN A DISTRIBUTED ENVIRONMENT
 
Real-Time Pedestrian Detection Using Apache Storm in a Distributed Environment
Real-Time Pedestrian Detection Using Apache Storm in a Distributed Environment Real-Time Pedestrian Detection Using Apache Storm in a Distributed Environment
Real-Time Pedestrian Detection Using Apache Storm in a Distributed Environment
 
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...
IRJET- Design of Low Complexity Channel Estimation and Reduced BER in 5G Mass...
 
Software defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular cloudsSoftware defined networking with pseudonym systems for secure vehicular clouds
Software defined networking with pseudonym systems for secure vehicular clouds
 

More from Thesis Scientist Private Limited

More from Thesis Scientist Private Limited (20)

HTML guide for beginners
HTML guide for beginnersHTML guide for beginners
HTML guide for beginners
 
Ransomware attacks 2017
Ransomware attacks 2017Ransomware attacks 2017
Ransomware attacks 2017
 
How to write a Great Research Paper?
How to write a Great Research Paper?How to write a Great Research Paper?
How to write a Great Research Paper?
 
Research Process design
Research Process designResearch Process design
Research Process design
 
How to write a good Dissertation/ Thesis
How to write a good Dissertation/ ThesisHow to write a good Dissertation/ Thesis
How to write a good Dissertation/ Thesis
 
How to write a Research Paper
How to write a Research PaperHow to write a Research Paper
How to write a Research Paper
 
Internet security tips for Businesses
Internet security tips for BusinessesInternet security tips for Businesses
Internet security tips for Businesses
 
How to deal with a Compulsive liar
How to deal with a Compulsive liarHow to deal with a Compulsive liar
How to deal with a Compulsive liar
 
Driverless car Google
Driverless car GoogleDriverless car Google
Driverless car Google
 
Podcast tips beginners
Podcast tips beginnersPodcast tips beginners
Podcast tips beginners
 
Vastu for Career Success
Vastu for Career SuccessVastu for Career Success
Vastu for Career Success
 
Reliance jio broadband
Reliance jio broadbandReliance jio broadband
Reliance jio broadband
 
Job Satisfaction definition
Job Satisfaction definitionJob Satisfaction definition
Job Satisfaction definition
 
Mistakes in Advertising
Mistakes in AdvertisingMistakes in Advertising
Mistakes in Advertising
 
Contributor in a sentence
Contributor in a sentenceContributor in a sentence
Contributor in a sentence
 
Different Routing protocols
Different Routing protocolsDifferent Routing protocols
Different Routing protocols
 
Ad hoc network routing protocols
Ad hoc network routing protocolsAd hoc network routing protocols
Ad hoc network routing protocols
 
IPTV Thesis
IPTV ThesisIPTV Thesis
IPTV Thesis
 
Latest Research Topics On Flying Ad-Hoc Networks (FANETs):
Latest Research Topics On Flying Ad-Hoc Networks (FANETs):Latest Research Topics On Flying Ad-Hoc Networks (FANETs):
Latest Research Topics On Flying Ad-Hoc Networks (FANETs):
 
Project report format computer science
Project report format computer scienceProject report format computer science
Project report format computer science
 

Recently uploaded

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
Kamal Acharya
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 

Recently uploaded (20)

Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakesDeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Wadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptxWadi Rum luxhotel lodge Analysis case study.pptx
Wadi Rum luxhotel lodge Analysis case study.pptx
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptxOrlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
Orlando’s Arnold Palmer Hospital Layout Strategy-1.pptx
 
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech CivilMoment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 

Latest Thesis Topics for Fog computing

  • 1.
  • 2. Improvement In Throughput For Power Line Communication (PLC) For Smart Meters Using Fog Computing Based Data Aggregation Approach In this topic, a framework for distributed data aggregation approach with the help of fog computing architecture can be proposed. With this approach the amount of data sent to the centralized storage space will be limited and, therefore, the capacity of PLC will be virtually improved without compromising the functionality. WWW.ThesisScientist.com
  • 3. Fog Computing-based Face Identification And Resolution Scheme In Internet Of Things The requirements for computation, communication and storage capability are becoming higher and higher. To solve this problem, a fog computing-based face identification and resolution scheme can be proposed. Face identifier will be firstly generated by identification system model to identify an individual.
  • 4. Dynamic Urban Surveillance Video Stream Processing Using Fog Computing Here, taking urban traffic surveillance as a case study, a dynamic video stream processing scheme can be proposed to meet the requirements of real-time information processing and decision making.
  • 5. Smart Human Security Framework Using Internet Of Things, Cloud And Fog Computing In this topic, a security framework incorporating pervasive and wearable computing, IOT, cloud and fog computing can be provided to safeguard individuals and preclude any mishap. WWW.ThesisScientist.com
  • 6. A Fog Computing Solution For Advanced Metering Infrastructure An implantable data storage-and-processing solution for improving the existing smart meter infrastructure can be proposed. The practicality of this solution will be validated on a proof-of-concept test bed.
  • 7. Fog Computing In Multi-tier Data Center Networks: A Hierarchical Game Approach The network architecture with 3-layer model can be modeled, where the FNs will be in the upper layer, MDCOs in the middle layer, the DSSs in the bottom layer. Based on the model, a hierarchical game can be proposed.
  • 8. User access mode selection in fog computing based radio access networks In this topic, the coverage probability and ergodic rate for both F-AP users and device-to-device users can be derived by taking into account the different nodes locations, cache sizes as well as user access modes. Particularly, the stochastic geometry tool will be used to derive expressions
  • 9. Health Fog: A Novel Framework For Health And Wellness Applications A framework of Health Fog can be proposed where Fog computing will be used as an intermediary layer between the cloud and end users. The design feature of Health Fog will reduces the extra communication cost
  • 10. Fog Computing Dynamic Load Balancing Mechanism Based On Graph Repartitioning This topic will research on the framework of the fog computing, and adopts Cloud Atomization Technology to turn physical nodes in different levels into virtual machine nodes. On this basis, this topic will use the graph partitioning theory to build the fog computing load balancing algorithm based on dynamic graph partitioning. WWW.ThesisScientist.com
  • 11. Enhancement In Fog Detection And Free- space Segmentation For Car Navigation Here, a solution can be proposed thanks to a contrast restoration approach on images grabbed by an in-vehicle camera.
  • 12. A Gateway Based Fog Computing Architecture For Wireless Sensors And Actuator Networks In this topic, a gateway based fog computing architecture for WSANs can be presented. This architecture will consist of master nodes and slave nodes, and will manage virtual gateway functions, flows, and resources.
  • 13. A New Fog Removing Method Based On The Degradation Model A kind of algorithm can be introduced which will estimate scene optical depth from several drop quality images based on degradation model, and then the method will be applied to drop quality image fog removing.
  • 14. Steiner Tree Based Optimal Resource Caching Scheme In Fog Computing In this topic, a Steiner tree based caching scheme can be proposed, in which the Fog servers, when caching resources, will first produce a Steiner tree to minimize the total path weight (or cost) such that the cost of resource caching using this tree could be minimized.
  • 15. A Radiative-Conductive Model For The Prediction Of Radiation Fog A conductive-radiative model can be used to predict the formation and growth of radiation fog. This will be accomplished by solving numerically the heat and mass transport equations in conjunction with an approximate form of the radiative transfer equation.
  • 16. A Novel Mechanism Of Detection Of Denial Of Service Attack (Dos) In VANET Using Malicious And Irrelevant Packet Detection Algorithm (MIPDA) An Malicious and Irrelevant Packet Detection Algorithm (MIPDA) can be proposed which will be used to analyze and detect the Denial-of Service (DOS) attack.
  • 17. Research on a Defogging Method of Fog- Degrade Image Based on Depth Region Segmentation According to the effect of fog from images, a new defogging method for image based on depth region segmentation can be proposed in this topic. This method will reasonably apply the fuzzy cluster analysis thinking, Construct the edge characteristic vector based on multi resolution wavelet.
  • 18. In this topic, an identity-based authentication scheme for heterogeneous IOT can be proposed. The correctness of this scheme will tested with the AVISPA tool . Identity-based Authentication Scheme For The Internet Of Things
  • 19. Zone-code Based Optimal Connecting Layer Scheme In Fog MMV A novel topology scheme can be introduced in this topic for fog computing, which will depend on Content-Addressable Networks (CAN) and zone-code routing. The objective to our approach is mapping servers in connecting layer in d-D space on a 1-D space.
  • 20. A Contrast Enhancement Method For Fog- degraded Images A fog-degraded image enhancement method can be presented based on a human visual system (HVS). The algorithm will utilize the HVS to segment a single fog- degraded image into the Devries-Rose region, Weber region, low-contrast, and saturation region with three sub images.
  • 21. Improving Web Sites Performance Using Edge Servers In Fog Computing Architecture In this topic, web optimization within Fog Computing context can be considered. The existing methods for web optimization can be applied in a novel manner, such that these methods can be combined with unique.
  • 22. Efficient Fog Removal From Video Here, a framework of real-time video processing for fog removal using uncaliberated single camera system can be proposed. Intelligent use of temporal redundancy present in video frames paves the way for real-time implementation.
  • 23. A Proximal Algorithm For Joint Resource Allocation And Minimizing Carbon Footprint In Geo-distributed Fog Computing To solve the large scale optimization, a distributed algorithm can be developed based on the proximal algorithm and alternating direction method of multipliers (ADMM).
  • 24. Any queries? You can find us at WWW.ThesisScientist.com