Open Access Open Access  Restricted Access Subscription Access

IoT Fog Computing System: Dynamic Resource Allocation and Computation Off loading

Rakesh S, Asharani S

Abstract


For a fog computing system with numerous EH, MDs, a resource allocation and computation offloading mechanism is proposed in this study. A dynamic approach is proposed to tackle the problem under consideration across a series of time slots based on lyapunov optimization. We break down the original problem into three smaller challenges in order to answer the formulated problem. We can determine the best offloading technique by specifically converting the original, simplified problem into a GNEP and solving it with a semi-smooth Newton algorithm. The best subcarrier assignment method is then derived, and using the IPM algorithm, the best transmit power is then obtained. The average execution cost of the fog computing system can be reduced with such a procedure.

Full Text:

PDF

References


Sonali Mishra, “SQL Injection Detection using Machine Learning ”, from https:

//scholarworks.sjsu.edu/cgi/viewcontent.cgi?arti c le = 1727context = etdprojects, on 23 May 2019 pp.10 - 29.

BojkenShehu and Aleksander Xhuvani ,”A Literature Review and Comparative Analyses on SQL Injection: Vulnerabilities, Attacks and their Prevention and Detection Techniques” from https

://pdfs.semanticscholar.org , Vol. 11, Issue 4, No 1,July 2014 pp 20 - 34.

Suhaimi Ibrahim,” SQL Injection Detection and Prevention Techniques” from https

://pdfs.semanticscholar.org/ Volume 3, Number 7, August 2011 , pp 85 - 89.

G. Wassermann, Z. Su, “An analysis framework for security in web applications,” In: Proceedings of the FSE Workshop on Specification and Verification of Component-Based Systems, fromhttps://link.springer.com/chapter/1

1007/978 − 0 − 387 − 44599 − 15 SAVCBS, pp. 70–78, 2004.

Mei Junjin, “An Approach for SQL Injection Vulnerability Detection,” Proceedings. of the 6th Int. Conf. On Information Technology: New Generations, Las Vegas, Nevada, pp. 14-19, Apr. 2009.

G Buehrer, B.W. Weide, P.A.G Sivilotti, Using Parse Tree Validation to Prevent SQL Injection Attacks, in: 5th InternationalWorkshop on SoftWore Engineering and Middlere, Lisbon, Portugal, 2005, pp. 106-113.

Suhas G.K., Devananda S.N., Jagadeesh R., Pareek P.K., Dixit S. (2021) Recommendation-Based Interactivity Through Cross Platform Using Big Data. In: Tavares J.M.R.S., Chakrabarti S., Bhattacharya A., Ghatak S. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_60

N R, Deepak and G K, Dr. Suhas and B, Bhagappa and Kumar Pareek, Piyush, A Framework for Food recognition and predicting its Nutritional value through Convolution neural network (February 22, 2022). Available at SSRN: https://ssrn.com/abstract=4040968 or http://dx.doi.org/10.2139/ssrn.4040968


Refbacks

  • There are currently no refbacks.