In recent years, new mobile devices and applications with different functionalities and uses, such as drones, Autonomous Vehicles (AV) and highly advanced smartphones have emerged. Such devices are now able to launch applications such as augmented and virtual reality, intensive contextual data processing, intelligent vehicle control, traffic management, data mining and interactive applications. Although these mobile nodes have the computing and communication capabilities to run such applications, they remain unable to efficiently handle them mainly due to the significant processing required over relatively short timescales. Additionally, they consume a considerable amount of battery power. Such limitations have motivated the idea of computation offloading where computing tasks are sent to the Cloud instead of executing it locally at the mobile node. The technical concept of this idea is referred to as Mobile Cloud Computing (MCC). However, using the Cloud for computational task offloading of mobile applications introduces a significant latency and adds additional load to the radio and backhaul of the mobile networks. To cope with these challenges, the Cloud’s resources are being deployed near to the users at the Edge of the network in places such as mobile networks at the Base Station (BS), or indoor locations such as Wi-Fi and 3G/4G access points. This architecture is referred to as Mobile Edge Computing or Multi-access Edge Computing (MEC). Computation offloading in such a setting faces the challenge of deciding which time and server to offload computational tasks to.
This dissertation aims at designing time-optimised task offloading decision-making algorithms in MEC environments. This will be done to find the optimal time for task offloading. The random variables that can influence the expected processing time at the MEC server are investigated using various probability distributions and representations. In the context being assessed, while the mobile node is sequentially roaming (connecting) through a set of MEC servers, it has to locally and autonomously decide which server should be used for offloading in order to perform the computing task. To deal with this sequential problem, the considered offloading decision-making is modelled as an optimal stopping time problem adopting the principles of Optimal Stopping Theory (OST).
Three assessment approaches including simulation approach, real data sets and an actual implementation in real devices, are used to evaluate the performance of the models. The results indicate that OST-based offloading strategies can play an important role in optimising the task offloading decision. In particular, in the simulation approach, the average processing time achieved by the proposed models are higher than the Optimal by only 10%. In the real data set, the models are still near optimal with only 25% difference compared to the Optimal while in the real implementation, the models, most of the time, select the Optimal node for processing the task. Furthermore, the presented algorithms are lightweight, local and can hence be implemented on mobile nodes (for instance, vehicles or smart phones).
Item Type: | Thesis (PhD) |
---|---|
Qualification Level: | Doctoral |
Subjects: | > > |
Colleges/Schools: | > |
Supervisor's Name: | Pezaros, Professor Dimitrios P. and Anagnostopoulos, Dr. Christos |
Date of Award: | 2021 |
Depositing User: | |
Unique ID: | glathesis:2021-82506 |
Copyright: | Copyright of this thesis is held by the author. |
Date Deposited: | 12 Oct 2021 09:58 |
Last Modified: | 08 Apr 2022 17:07 |
Thesis DOI: | |
URI: |
View Item |
Downloads per month over past year
View more statistics
The University of Glasgow is a registered Scottish charity: Registration Number SC004401
Terms & conditions.
As the Christmas season is upon us, we find ourselves reflecting on the past year and those who we have helped to shape their future. It’s been quite a year for us all! The end of the year brings no greater joy than the opportunity to express to you Christmas greetings and good wishes.
At this special time of year, Research Prospect brings joyful discount of 10% on all its services. May your Christmas and New Year be filled with joy.
We are looking back with appreciation for your loyalty and looking forward to moving into the New Year together.
"Claim this offer"
In unfamiliar and hard times, we have stuck by you. This Christmas, Research Prospect brings you all the joy with exciting discount of 10% on all its services.
Offer valid till 5-1-2024
We love being your partner in success. We know you have been working hard lately, take a break this holiday season to spend time with your loved ones while we make sure you succeed in your academics
Discount code: RP23720
Published by Robert Bruce at August 8th, 2024 , Revised On August 12, 2024
The dynamic discipline of computer science is driving innovation and technological progress in a number of areas, including education. Its importance is vast, as it is the foundation of the modern digital world, we live in.
Table of Contents
Choosing a computer science research topic for a thesis or dissertation is an important step for students to complete their degree. Research topics provided in this article will help students better understand theoretical ideas and provide them with hands-on experience applying those ideas to create original solutions.
Our comprehensive lists of computer science research topics cover a wide range of topics and are designed to help students select meaningful and relevant dissertation topics. All of these topics have been chosen by our team of highly qualified dissertation experts , taking into account both previous research findings and gaps in the field of computer science.
Also read: Psychology Research Topics
Also check: Education research ideas for your project
Also read: Cancer research topics
Also read: Nursing research topics
To choose a computer science topic, student first identify their interests and research current trends and available resources. They can seek advice from subject specialists to make sure the topic has a clear scope.
At Research Prospect, we provide valuable support to computer science students throughout their dissertation process . From choosing research topics, drafting research proposals , conducting literature reviews , and analysing the data, our experts ensure to deliver high quality dissertations.
Discover Ph.D. dissertation resubmission rules & process. Navigate university policies & program regulations.
Academic integrity: a commitment to honesty and ethical conduct in learning. Upholding originality and proper citation are its cornerstones.
Want to score band 9 on your IELTS essay? Here are some tips and IELTS sample essays to help you get the score you want.
Ready to place an order?
Learning resources.
Search code, repositories, users, issues, pull requests..., provide feedback.
We read every piece of feedback, and take your input very seriously.
Use saved searches to filter your results more quickly.
To see all available qualifiers, see our documentation .
Here are 42 public repositories matching this topic..., ubicomplab / rppg-toolbox.
rPPG-Toolbox: Deep Remote PPG Toolbox (NeurIPS 2023)
Multi-Task Temporal Shift Attention Networks for On-Device Contactless Vitals Measurement (NeurIPS 2020)
Enable students to create 3D games on mobile devices through the teaching of graphics and gaming fundamentals and hands-on practice using professional graphics API and game engines
This is my Masters thesis project titled "Speaker Detection and Conversation Analysis on Mobile Devices".
Samurai Game is an exciting cross-platform mobile adventure developed with Godot Engine, immersing players in a captivating samurai-themed world. Collect skulls, battle enemies with unique abilities, and master the art of arrow deflection.
Android application designed to streamline the ordering and delivery process, coupled with a loyalty campaign, encourages customers to pre-compose their orders.
This is the official artifact for EMSAssist paper on MobiSys'23. EMSAssist: An End-to-End Mobile Voice Assistant at the Edge for Emergency Medical Services
Source code of the numerical experiments presented in "Energy-Efficient Edge-Facilitated Wireless Collaborative Computing using Map-Reduce" by Antoine Paris, Hamed Mirghasemi, Ivan Stupia and Luc Vandendorpe (presented at SPAWC19).
☁️ 📲 🔥 A project based in Mobile and Pervasive Computing. This project was built using Arduino, C++ (C Plus Plus), Java, Android and Google App Engine. The scenario chosen for this project was to combat forest fires with the use of sensors and actuators, to detect and prevent fire occurrences in forests, as also, collect and analyse data from th…
A Computational Offloading Framework for Object Detection in Mobile Devices
Mobile Computing Lecture Notes @ Faculty of computer and information Sciences ' MU ' for the '4th Year' IT & IS Department
Data analysis codes for the K-EmoPhone dataset
Our main website!
IR distributed on Mobile Cloud
Cognitive Service Composition. COPERNIC stands for COgnitively-inspired Pervasive middlEware for emeRgeNt ServIce Composition. This framework allows you to perform service composition using distributed services on a pervasive computing environment with multiple devices.
Ojrlopez27 / adroitness-mobile.
Implementation of an efficient mobile-based Middleware for building robust, high-performance IPA's (Intelligent Personal Assistants)
The project entails combining supervised machine learning and image processing to create the ASL Fingerspelling application. This program uses ASL alphabet videos to predict the alphabet based on a video of a person demonstrating the sign.
Add a description, image, and links to the mobile-computing topic page so that developers can more easily learn about it.
Curate this topic
To associate your repository with the mobile-computing topic, visit your repo's landing page and select "manage topics."
Home Blog Cloud Computing Top 10 Cloud Computing Research Topics of 2024
Cloud computing is a fast-growing area in the technical landscape due to its recent developments. If we look ahead to 2024, there are new research topics in cloud computing that are getting more traction among researchers and practitioners. Cloud computing has ranged from new evolutions on security and privacy with the use of AI & ML usage in the Cloud computing for the new cloud-based applications for specific domains or industries. In this article, we will investigate some of the top cloud computing research topics for 2024 and explore what we get most out of it for researchers or cloud practitioners. To master a cloud computing field, we need to check these Cloud Computing online courses .
The Cloud computing is crucial for data-driven businesses because it provides scalable and cost-effective ways to store and process huge amounts of data. Cloud-based storage and analytical platform helps business to easily access their data whenever required irrespective of where it is located physically. This helps businesses to take good decisions about their products and marketing plans.
Cloud computing could help businesses to improve their security in terms of data, Cloud providers offer various features such as data encryption and access control to their customers so that they can protect the data as well as from unauthorized access.
Few benefits of Cloud computing are listed below:
1. neural network based multi-objective evolutionary algorithm for dynamic workflow scheduling in cloud computing.
Cloud computing research topics are getting wider traction in the Cloud Computing field. These topics in the paper suggest a multi-objective evolutionary algorithm (NN-MOEA) based on neural networks for dynamic workflow scheduling in cloud computing. Due to the dynamic nature of cloud resources and the numerous competing objectives that need to be optimized, scheduling workflows in cloud computing is difficult. The NN-MOEA algorithm utilizes neural networks to optimize multiple objectives, such as planning, cost, and resource utilization. This research focuses on cloud computing and its potential to enhance the efficiency and effectiveness of businesses' cloud-based workflows.
The algorithm predicts workflow completion time using a feedforward neural network based on input and output data sizes and cloud resources. It generates a balanced schedule by taking into account conflicting objectives and projected execution time. It also includes an evolutionary algorithm for future improvement.
The proposed NN-MOEA algorithm has several benefits, such as the capacity to manage dynamic changes in cloud resources and the capacity to simultaneously optimize multiple objectives. The algorithm is also capable of handling a variety of workflows and is easily expandable to include additional goals. The algorithm's use of neural networks to forecast task execution times is a crucial component because it enables the algorithm to generate better schedules and more accurate predictions.
The paper concludes by presenting a novel multi-objective evolutionary algorithm-based neural network-based approach to dynamic workflow scheduling in cloud computing. In terms of optimizing multiple objectives, such as make span and cost, and achieving a better balance between them, these cloud computing dissertation topics on the proposed NN-MOEA algorithm exhibit encouraging results.
Key insights and Research Ideas:
Investigate the use of different neural network architectures for predicting the future positions of optimal solutions. Explore the use of different multi-objective evolutionary algorithms for solving dynamic workflow scheduling problems. Develop a cloud-based workflow scheduling platform that implements the proposed algorithm and makes it available to researchers and practitioners.
This is one of cloud computing security research topics in the cloud computing paradigm. The authors then provide a systematic literature review of studies that address security threats to cloud computing and mitigation techniques and were published between 2010 and 2020. They list and classify the risks and defense mechanisms covered in the literature, as well as the frequency and distribution of these subjects over time.
The paper suggests the data breaches, Insider threats and DDoS attack are most discussed threats to the security of cloud computing. Identity and access management, encryption, and intrusion detection and prevention systems are the mitigation techniques that are most frequently discussed. Authors depict the future trends of machine learning and artificial intelligence might help cloud computing to mitigate its risks.
The paper offers a thorough overview of security risks and mitigation techniques in cloud computing, and it emphasizes the need for more research and development in this field to address the constantly changing security issues with cloud computing. This research could help businesses to reduce the amount of spam that they receive in their cloud-based email systems.
Explore the use of blockchain technology to improve the security of cloud computing systems. Investigate the use of machine learning and artificial intelligence to detect and prevent cloud computing attacks. Develop new security tools and technologies for cloud computing environments.
A text filtering system is suggested in the paper "Spam Identification in Cloud Computing Based on Text Filtering System" to help identify spam emails in cloud computing environments. Spam emails are a significant issue in cloud computing because they can use up computing resources and jeopardize the system's security.
To detect spam emails, the suggested system combines text filtering methods with machine learning algorithms. The email content is first pre-processed by the system, which eliminates stop words and stems the remaining words. The preprocessed text is then subjected to several filters, including a blacklist filter and a Bayesian filter, to identify spam emails.
In order to categorize emails as spam or non-spam based on their content, the system also employs machine learning algorithms like decision trees and random forests. The authors use a dataset of emails gathered from a cloud computing environment to train and test the system. They then assess its performance using metrics like precision, recall, and F1 score.
The findings demonstrate the effectiveness of the proposed system in detecting spam emails, achieving high precision and recall rates. By contrasting their system with other spam identification systems, the authors also show how accurate and effective it is.
The method presented in the paper for locating spam emails in cloud computing environments has the potential to improve the overall security and performance of cloud computing systems. This is one of the interesting clouds computing current research topics to explore and innovate. This is one of the good Cloud computing research topics to protect the Mail threats.
Create a stronger spam filtering system that can recognize spam emails even when they are made to avoid detection by more common spam filters. examine the application of artificial intelligence and machine learning to the evaluation of spam filtering system accuracy. Create a more effective spam filtering system that can handle a lot of emails quickly and accurately.
The "Blockchain data-based cloud data integrity protection mechanism" paper suggests a method for safeguarding the integrity of cloud data and which is one of the Cloud computing research topics. In order to store and process massive amounts of data, cloud computing has grown in popularity, but issues with data security and integrity still exist. For the proposed mechanism to guarantee the availability and integrity of cloud data, data redundancy and blockchain technology are combined.
A data redundancy layer, a blockchain layer, and a verification and recovery layer make up the mechanism. For availability in the event of server failure, the data redundancy layer replicates the cloud data across multiple cloud servers. The blockchain layer stores the metadata (such as access rights) and hash values of the cloud data and access control information
Using a dataset of cloud data, the authors assess the performance of the suggested mechanism and compare it to other cloud data protection mechanisms. The findings demonstrate that the suggested mechanism offers high levels of data availability and integrity and is superior to other mechanisms in terms of processing speed and storage space.
Overall, the paper offers a promising strategy for using blockchain technology to guarantee the availability and integrity of cloud data. The suggested mechanism may assist in addressing cloud computing's security issues and enhancing the dependability of cloud data processing and storage. This research could help businesses to protect the integrity of their cloud-based data from unauthorized access and manipulation.
Create a data integrity protection system based on blockchain that is capable of detecting and preventing data tampering in cloud computing environments. For enhancing the functionality and scalability of blockchain-based data integrity protection mechanisms, look into the use of various blockchain consensus algorithms. Create a data integrity protection system based on blockchain that is compatible with current cloud computing platforms. Create a safe and private data integrity protection system based on blockchain technology.
This article suggests how recent tech trends like the Internet of Things (IoT) and cloud computing could transform the healthcare industry. It is one of the Cloud computing research topics. These emerging technologies open exciting possibilities by enabling remote patient monitoring, personalized care, and efficient data management. This topic is one of the IoT and cloud computing research papers which aims to share a wider range of information.
The authors categorize the research into IoT-based systems, cloud-based systems, and integrated systems using both IoT and the cloud. They discussed the pros of real-time data collection, improved care coordination, automated diagnosis and treatment.
However, the authors also acknowledge concerns around data security, privacy, and the need for standardized protocols and platforms. Widespread adoption of these technologies faces challenges in ensuring they are implemented responsibly and ethically. To begin the journey KnowledgeHut’s Cloud Computing online course s are good starter for beginners so that they can cope with Cloud computing with IOT.
Overall, the paper provides a comprehensive overview of this rapidly developing field, highlighting opportunities to revolutionize how healthcare is delivered. New devices, systems and data analytics powered by IoT, and cloud computing could enable more proactive, preventative and affordable care in the future. But careful planning and governance will be crucial to maximize the value of these technologies while mitigating risks to patient safety, trust and autonomy. This research could help businesses to explore the potential of IoT and cloud computing to improve healthcare delivery.
Examine how IoT and cloud computing are affecting patient outcomes in various healthcare settings, including hospitals, clinics, and home care. Analyze how well various IoT devices and cloud computing platforms perform in-the-moment patient data collection, archival, and analysis. assessing the security and privacy risks connected to IoT devices and cloud computing in the healthcare industry and developing mitigation strategies.
Big data in cloud computing research papers are having huge visibility in the industry. The paper "Targeted Influence Maximization based on Cloud Computing over Big Data in Social Networks" proposes a targeted influence maximization algorithm to identify the most influential users in a social network. Influence maximization is the process of identifying a group of users in a social network who can have a significant impact or spread information.
A targeted influence maximization algorithm is suggested in the paper "Targeted Influence maximization based on Cloud Computing over Big Data in Social Networks" to find the most influential users in a social network. The process of finding a group of users in a social network who can make a significant impact or spread information is known as influence maximization.
Four steps make up the suggested algorithm: feature extraction, classification, influence maximization, and data preprocessing. The authors gather and preprocess social network data, such as user profiles and interaction data, during the data preprocessing stage. Using machine learning methods like text mining and sentiment analysis, they extract features from the data during the feature extraction stage. Overall, the paper offers a promising strategy for maximizing targeted influence using big data and Cloud computing research topics to look into. The suggested algorithm could assist companies and organizations in pinpointing their marketing or communication strategies to reach the most influential members of a social network.
Key insights and Research Ideas:
Develop a cloud-based targeted influence maximization algorithm that can effectively identify and influence a small number of users in a social network to achieve a desired outcome. Investigate the use of different cloud computing platforms to improve the performance and scalability of cloud-based targeted influence maximization algorithms. Develop a cloud-based targeted influence maximization algorithm that is compatible with existing social network platforms. Design a cloud-based targeted influence maximization algorithm that is secure and privacy-preserving.
Cloud computing current research topics are getting traction, this is of such topic which provides an overview of the challenges and discussions surrounding security and privacy protection in cloud computing. The authors highlight the importance of protecting sensitive data in the cloud, with the potential risks and threats to data privacy and security. The article explores various security and privacy issues that arise in cloud computing, including data breaches, insider threats, and regulatory compliance.
The article explores challenges associated with implementing these security measures and highlights the need for effective risk management strategies. Azure Solution Architect Certification course is suitable for a person who needs to work on Azure cloud as an architect who will do system design with keep security in mind.
Final take away of cloud computing thesis paper by an author points out by discussing some of the emerging trends in cloud security and privacy, including the use of artificial intelligence and machine learning to enhance security, and the emergence of new regulatory frameworks designed to protect data in the cloud and is one of the Cloud computing research topics to keep an eye in the security domain.
Develop a more comprehensive security and privacy framework for cloud computing. Explore the options with machine learning and artificial intelligence to enhance the security and privacy of cloud computing. Develop more robust security and privacy mechanisms for cloud computing. Design security and privacy policies for cloud computing that are fair and transparent. Educate cloud users about security and privacy risks and best practices.
This Cloud Computing thesis paper "Intelligent Task Prediction and Computation Offloading Based on Mobile-Edge Cloud Computing" proposes a task prediction and computation offloading mechanism to improve the performance of mobile applications under the umbrella of cloud computing research ideas.
An algorithm for offloading computations and a task prediction model makes up the two main parts of the suggested mechanism. Based on the mobile application's usage patterns, the task prediction model employs machine learning techniques to forecast its upcoming tasks. This prediction is to decide whether to execute a specific task locally on the mobile device or offload the computation of it to the cloud.
Using a dataset of mobile application usage patterns, the authors assess the performance of the suggested mechanism and compare it to other computation offloading mechanisms. The findings demonstrate that the suggested mechanism performs better in terms of energy usage, response time, and network usage.
The authors also go over the difficulties in putting the suggested mechanism into practice, including the need for real-time task prediction and the trade-off between offloading computation and network usage. Additionally, they outline future research directions for mobile-edge cloud computing applications, including the use of edge caching and the integration of blockchain technology for security and privacy.
Overall, the paper offers a promising strategy for enhancing mobile application performance through mobile-edge cloud computing. The suggested mechanism might improve the user experience for mobile users while lowering the energy consumption and response time of mobile applications. These Cloud computing dissertation topic leads to many innovation ideas.
Develop an accurate task prediction model considering mobile device and cloud dynamics. Explore machine learning and AI for efficient computation offloading. Create a robust framework for diverse tasks and scenarios. Design a secure, privacy-preserving computation offloading mechanism. Assess computation offloading effectiveness in real-world mobile apps.
Enterprise resource planning (ERP) systems are one of the Cloud computing research topics in particular face security challenges with cloud computing, and the paper "Cloud Computing and Security: The Security Mechanism and Pillars of ERPs on Cloud Technology" discusses these challenges and suggests a security mechanism and pillars for protecting ERP systems on cloud technology.
The authors begin by going over the benefits of ERP systems and cloud computing as well as the security issues with cloud computing, like data breaches and insider threats. They then go on to present a security framework for cloud-based ERP systems that is built around four pillars: access control, data encryption, data backup and recovery, and security monitoring. The access control pillar restricts user access, while the data encryption pillar secures sensitive data. Data backup and recovery involve backing up lost or failed data. Security monitoring continuously monitors the ERP system for threats. The authors also discuss interoperability challenges and the need for standardization in securing ERP systems on the cloud. They propose future research directions, such as applying machine learning and artificial intelligence to security analytics.
Overall, the paper outlines a thorough strategy for safeguarding ERP systems using cloud computing and emphasizes the significance of addressing security issues related to this technology. Organizations can protect their ERP systems and make sure the Security as well as privacy of their data by implementing these security pillars and mechanisms.
Investigate the application of blockchain technology to enhance the security of cloud-based ERP systems. Look into the use of machine learning and artificial intelligence to identify and stop security threats in cloud-based ERP systems. Create fresh security measures that are intended only for cloud-based ERP systems. By more effectively managing access control and data encryption, cloud-based ERP systems can be made more secure. Inform ERP users about the security dangers that come with cloud-based ERP systems and how to avoid them.
The article proposes an optimized data storage algorithm for Internet of Things (IoT) devices which runs on cloud computing in a distributed system. In IoT apps, which normally generate huge amounts of data by various devices, the algorithm tries to increase the data storage and faster retrials of the same.
The algorithm proposed includes three main components: Data Processing, Data Storage, and Data Retrieval. The Data Processing module preprocesses IoT device data by filtering or compressing it. The Data Storage module distributes the preprocessed data across cloud servers using partitioning and stores it in a distributed database. The Data Retrieval module efficiently retrieves stored data in response to user queries, minimizing data transmission and enhancing query efficiency. The authors evaluated the algorithm's performance using an IoT dataset and compared it to other storage and retrieval algorithms. Results show that the proposed algorithm surpasses others in terms of storage effectiveness, query response time, and network usage.
They suggest future directions such as leveraging edge computing and blockchain technology for optimizing data storage and retrieval in IoT applications. In conclusion, the paper introduces a promising method to improve data archival and retrieval in distributed cloud based IoT applications, enhancing the effectiveness and scalability of IoT applications.
Create a data storage algorithm capable of storing and managing large amounts of IoT data efficiently. Examine the use of cloud computing to improve the performance and scalability of data storage algorithms for IoT. Create a secure and privacy-preserving data storage algorithm. Assess the performance and effectiveness of data storage algorithms for IoT in real-world applications.
Cloud computing is a rapidly evolving area with more interesting research topics being getting traction by researchers and practitioners. Cloud providers have their research to make sure their customer data is secured and take care of their security which includes encryption algorithms, improved access control and mitigating DDoS – Deniel of Service attack etc.,
With the improvements in AI & ML, a few features developed to improve the performance, efficiency, and security of cloud computing systems. Some of the research topics in this area include developing new algorithms for resource allocation, optimizing cloud workflows, and detecting and mitigating cyberattacks.
Cloud computing is being used in industries such as healthcare, finance, and manufacturing. Some of the research topics in this area include developing new cloud-based medical imaging applications, building cloud-based financial trading platforms, and designing cloud-based manufacturing systems.
Data security and privacy problems, vendor lock-in, complex cloud management, a lack of standardization, and the risk of service provider disruptions are all current issues in cloud computing. Because data is housed on third-party servers, data security and privacy are key considerations. Vendor lock-in makes transferring providers harder and increases reliance on a single one. Managing many cloud services complicates things. Lack of standardization causes interoperability problems and restricts workload mobility between providers.
Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) are the cloud computing scenarios where industries focusing right now.
The six major components of cloud infrastructure are compute, storage, networking, security, management and monitoring, and database. These components enable cloud-based processing and execution, data storage and retrieval, communication between components, security measures, management and monitoring of the infrastructure, and database services.
Vinoth Kumar P is a Cloud DevOps Engineer at Amadeus Labs. He has over 7 years of experience in the IT industry, and is specialized in DevOps, GitOps, DevSecOps, MLOps, Chaos Engineering, Cloud and Cloud Native landscapes. He has published articles and blogs on recent tech trends and best practices on GitHub, Medium, and LinkedIn, and has delivered a DevSecOps 101 talk to Developers community , GitOps with Argo CD Webinar for DevOps Community. He has helped multiple enterprises with their cloud migration, cloud native design, CICD pipeline setup, and containerization journey.
Avail your free 1:1 mentorship session.
Something went wrong
Name | Date | Fee | Know more |
---|
Home > Engineering > Computer Science > Computer Science Graduate Projects
Theses/dissertations from 2023 2023.
High-Performance Domain-Specific Library for Hydrologic Data Processing , Kalyan Bhetwal
Evaluating Learning Geometric Concepts to Generate Predicate Abstract Domains in Static Program Analysis , Patrick Chadbourne
Verifying Data Provenance During Workflow Execution for Scientific Reproducibility , Rizbanul Hasan
Remote Sensing to Advance Understanding of Snow-Vegetation Relationships and Quantify Snow Depth and Snow Water Equivalent , Ahmad Hojatimalekshah
Exploring the Capability of a Self-Supervised Conditional Image Generator for Image-to-Image Translation without Labeled Data: A Case Study in Mobile User Interface Design , Hailee Kiesecker
Fake News Detection Using Narrative Content and Discourse , Hongmin Kim
Anomaly Detection Using Graph Neural Network , Bishal Lakha
Robust Digital Nucleic Acid Memory , Golam Md Mortuza
Risk Assessment and Solutions for Two Domains: Election Procedures and Privacy Disclosure Prevention for Users , Kamryn DeAnn Parker
Sparse Format Conversion and Code Synthesis , Tobi Goodness Popoola
Fair Layouts in Information Access Systems: Provider-Side Group Fairness in Ranking Beyond Ranked Lists , Amifa Raj
Virtual Curtain: A Communicative Fine-Grained Privacy Control Framework for Augmented Reality , Aakash Shrestha
Portable Sparse Polyhedral Framework Code Generation Using Multi Level Intermediate Representation , Aaron St. George
Transformer Reinforcement Learning Approach to Attack Automatic Fake News Detectors , Chandler Underwood
Severity Measures for Assessing Error in Automatic Speech Recognition , Ryan Whetten
Improved Computational Prediction of Function and Structural Representation of Self-Cleaving Ribozymes with Enhanced Parameter Selection and Library Design , James D. Beck
Meshfree Methods for PDEs on Surfaces , Andrew Michael Jones
Deep Learning of Microstructures , Amir Abbas Kazemzadeh Farizhandi
Long-Term Trends in Extreme Environmental Events with Changepoint Detection , Mintaek Lee
Structure Aware Smart Encoding and Decoding of Information in DNA , Shoshanna Llewellyn
Towards Making Transformer-Based Language Models Learn How Children Learn , Yousra Mahdy
Ontology-Based Formal Approach for Safety and Security Verification of Industrial Control Systems , Ramesh Neupane
Improving Children's Authentication Practices with Respect to Graphical Authentication Mechanism , Dhanush Kumar Ratakonda
Hate Speech Detection Using Textual and User Features , Rohan Raut
Automated Detection of Sockpuppet Accounts in Wikipedia , Mostofa Najmus Sakib
Characterization and Mitigation of False Information on the Web , Anu Shrestha
Sinusoidal Projection for 360° Image Compression and Triangular Discrete Cosine Transform Impact in the JPEG Pipeline , Iker Vazquez Lopez
Training Wheels for Web Search: Multi-Perspective Learning to Rank to Support Children's Information Seeking in the Classroom , Garrett Allen
Fair and Efficient Consensus Protocols for Secure Blockchain Applications , Golam Dastoger Bashar
Why Don't You Act Your Age?: Recognizing the Stereotypical 8-12 Year Old Searcher by Their Search Behavior , Michael Green
Ensuring Consistency and Efficiency of the Incremental Unit Network in a Distributed Architecture , Mir Tahsin Imtiaz
Modeling Real and Fake News Sharing in Social Networks , Abishai Joy
Modeling and Analyzing Users' Privacy Disclosure Behavior to Generate Personalized Privacy Policies , A.K.M. Nuhil Mehdy
Into the Unknown: Exploration of Search Engines' Responses to Users with Depression and Anxiety , Ashlee Milton
Generating Test Inputs from String Constraints with an Automata-Based Solver , Marlin Roberts
A Case Study in Representing Scientific Applications ( GeoAc ) Using the Sparse Polyhedral Framework , Ravi Shankar
Actors for the Internet of Things , Arjun Shukla
Towards Unifying Grounded and Distributional Semantics Using the Words-as-Classifiers Model of Lexical Semantics , Stacy Black
Improving Scientist Productivity, Architecture Portability, and Performance in ParFlow , Michael Burke
Polyhedral+Dataflow Graphs , Eddie C. Davis
Improving Spellchecking for Children: Correction and Design , Brody Downs
A Collection of Fast Algorithms for Scalar and Vector-Valued Data on Irregular Domains: Spherical Harmonic Analysis, Divergence-Free/Curl-Free Radial Basis Functions, and Implicit Surface Reconstruction , Kathryn Primrose Drake
Privacy-Preserving Protocol for Atomic Swap Between Blockchains , Kiran Gurung
Unsupervised Structural Graph Node Representation Learning , Mikel Joaristi
Detecting Undisclosed Paid Editing in Wikipedia , Nikesh Joshi
Do You Feel Me?: Learning Language from Humans with Robot Emotional Displays , David McNeill
Obtaining Real-World Benchmark Programs from Open-Source Repositories Through Abstract-Semantics Preserving Transformations , Maria Anne Rachel Paquin
Content Based Image Retrieval (CBIR) for Brand Logos , Enjal Parajuli
A Resilience Metric for Modern Power Distribution Systems , Tyler Bennett Phillips
Edge-Assisted Workload-Aware Image Processing System , Anil Acharya
MINOS: Unsupervised Netflow-Based Detection of Infected and Attacked Hosts, and Attack Time in Large Networks , Mousume Bhowmick
Deviant: A Mutation Testing Tool for Solidity Smart Contracts , Patrick Chapman
Querying Over Encrypted Databases in a Cloud Environment , Jake Douglas
A Hybrid Model to Detect Fake News , Indhumathi Gurunathan
Suitability of Finite State Automata to Model String Constraints in Probablistic Symbolic Execution , Andrew Harris
UNICORN Framework: A User-Centric Approach Toward Formal Verification of Privacy Norms , Rezvan Joshaghani
Detection and Countermeasure of Saturation Attacks in Software-Defined Networks , Samer Yousef Khamaiseh
Secure Two-Party Protocol for Privacy-Preserving Classification via Differential Privacy , Manish Kumar
Application-Specific Memory Subsystem Benchmarking , Mahesh Lakshminarasimhan
Multilingual Information Retrieval: A Representation Building Perspective , Ion Madrazo
Improved Study of Side-Channel Attacks Using Recurrent Neural Networks , Muhammad Abu Naser Rony Chowdhury
Investigating the Effects of Social and Temporal Dynamics in Fitness Games on Children's Physical Activity , Ankita Samariya
BullyNet: Unmasking Cyberbullies on Social Networks , Aparna Sankaran
FALCON: Framework for Anomaly Detection In Industrial Control Systems , Subin Sapkota
Investigating Semantic Properties of Images Generated from Natural Language Using Neural Networks , Samuel Ward Schrader
Incremental Processing for Improving Conversational Grounding in a Chatbot , Aprajita Shukla
Estimating Error and Bias of Offline Recommender System Evaluation Results , Mucun Tian
Leveraging Tiled Display for Big Data Visualization Using D3.js , Ujjwal Acharya
Fostering the Retrieval of Suitable Web Resources in Response to Children's Educational Search Tasks , Oghenemaro Deborah Anuyah
Privacy-Preserving Genomic Data Publishing via Differential Privacy , Tanya Khatri
Injecting Control Commands Through Sensory Channel: Attack and Defense , Farhad Rasapour
Strong Mutation-Based Test Generation of XACML Policies , Roshan Shrestha
Performance, Scalability, and Robustness in Distributed File Tree Copy , Christopher Robert Sutton
Using DNA For Data Storage: Encoding and Decoding Algorithm Development , Kelsey Suyehira
Detecting Saliency by Combining Speech and Object Detection in Indoor Environments , Kiran Thapa
Identifying Restaurants Proposing Novel Kinds of Cuisines: Using Yelp Reviews , Haritha Akella
Editing Behavior Analysis and Prediction of Active/Inactive Users in Wikipedia , Harish Arelli
CloudSkulk: Design of a Nested Virtual Machine Based Rootkit-in-the-Middle Attack , Joseph Anthony Connelly
Predicting Friendship Strength in Facebook , Nitish Dhakal
Privacy-Preserving Trajectory Data Publishing via Differential Privacy , Ishita Dwivedi
Cultivating Community Interactions in Citizen Science: Connecting People to Each Other and the Environment , Bret Allen Finley
Uncovering New Links Through Interaction Duration , Laxmi Amulya Gundala
Variance: Secure Two-Party Protocol for Solving Yao's Millionaires' Problem in Bitcoin , Joshua Holmes
A Scalable Graph-Coarsening Based Index for Dynamic Graph Databases , Akshay Kansal
Integrity Coded Databases: Ensuring Correctness and Freshness of Outsourced Databases , Ujwal Karki
Editable View Optimized Tone Mapping For Viewing High Dynamic Range Panoramas On Head Mounted Display , Yuan Li
The Effects of Pair-Programming in a High School Introductory Computer Science Class , Ken Manship
Towards Automatic Repair of XACML Policies , Shuai Peng
Identification of Unknown Landscape Types Using CNN Transfer Learning , Ashish Sharma
Hand Gesture Recognition for Sign Language Transcription , Iker Vazquez Lopez
Learning to Code Music : Development of a Supplemental Unit for High School Computer Science , Kelsey Wright
Identification of Small Endogenous Viral Elements within Host Genomes , Edward C. Davis Jr.
When the System Becomes Your Personal Docent: Curated Book Recommendations , Nevena Dragovic
Security Testing with Misuse Case Modeling , Samer Yousef Khamaiseh
Estimating Length Statistics of Aggregate Fried Potato Product via Electromagnetic Radiation Attenuation , Jesse Lovitt
Towards Multipurpose Readability Assessment , Ion Madrazo
Evaluation of Topic Models for Content-Based Popularity Prediction on Social Microblogs , Axel Magnuson
CEST: City Event Summarization using Twitter , Deepa Mallela
Developing an ABAC-Based Grant Proposal Workflow Management System , Milson Munakami
Phoenix and Hive as Alternatives to RDBMS , Diana Ornelas
Advanced Search
Home | About | FAQ | My Account | Accessibility Statement
Privacy Copyright
5650 Accesses
61 Citations
Explore all metrics
The edge computing (EC) paradigm brings computation and storage to the edge of the network where data is both consumed and produced. This variation is necessary to cope with the increasing amount of network-connected devices and data transmitted, that the launch of the new 5G networks will expand. The aim is to avoid the high latency and traffic bottlenecks associated with the use of Cloud Computing in networks where several devices both access and generate high volumes of data. EC also improves network support for mobility, security, and privacy. This paper provides a discussion around EC and summarized the definition and fundamental properties of the EC architectures proposed in the literature (Multi-access Edge Computing, Fog Computing, Cloudlet Computing, and Mobile Cloud Computing). Subsequently, this paper examines significant use cases for each EC architecture and debates some promising future research directions.
This is a preview of subscription content, log in via an institution to check access.
Subscribe and save.
Price includes VAT (Russian Federation)
Instant access to the full article PDF.
Rent this article via DeepDyve
Institutional subscriptions
Explore related subjects.
Abbas N, Zhang Y, Taherkordi A, Skeie T (2017) Mobile edge computing: a survey. IEEE Internet Things J 5(1):450–465
Article Google Scholar
Ahmed A, Ahmed E (2016) A survey on mobile edge computing. In: 10th international conference on intelligent systems and control (ISCO’16). pp 1–8
Aldmour R, Yousef S, Yaghi M, Tapaswi S, Pattanaik KK, Cole M (2017) New cloud offloading algorithm for better energy consumption and process time. Int J Syst Assur Eng Manag 8(s2):730–733
Ayad M, Taher M, Salem A (2014) Real-time mobile cloud computing: a case study in face recognition. In: 28th International conference on advanced information networking and applications workshops. pp 73–78
Badidi E (2020) Qos-aware placement of tasks on a fog cluster in an edge computing environment. J Ubiquitous Syst Pervasive Netw 13(1):11–19
Bagchi S, Siddiqui MB, Wood P, Zhang H (2020) Dependability in edge computing. Commun ACM 63(1):58–66
Baktayan A, AlGabri M, Alhomdy S (2018) Fog computing for network slicing in 5G networks: an overview. J Telecom Syst Manag 07(02):1–18
Google Scholar
Baktir AC, Ozgovde A, Ersoy C (2017) How can edge computing benefit from software-defined networking: a survey, use cases, and future directions. IEEE Commun Surv Tutor 19(4):2359–2391
Barbarossa S, Sardellitti S, Di Lorenzo P (2014) Communicating while computing: distributed mobile cloud computing over 5G heterogeneous networks. IEEE Signal Process Mag 31(6):45–55
Beck MT, Werner M, Feld S, Schimper T (2014) Mobile edge computing: a taxonomy. In: 6th International conference on advances in future internet, (AFIN). pp 48–54
Bilal K, Khalid O, Erbad A, Khan SU (2018) Potentials, trends, and prospects in edge technologies: fog, cloudlet, mobile edge, and micro data centers. Comput Netw 130:94–120
Billah F, Adnan M (2019) Smartlet: a dynamic architecture for real time face recognition in smartphone using cloudlets and cloud. Big Data Res 17:45–55
Bodkhe U, Tanwar S, Parekh K, Khanpara P, Tyagi S, Kumar N, Alazab M (2020) Blockchain for industry 4.0: a comprehensive review. IEEE Access 8:79764–79800
Bonomi F, Milito R, Natarajan P, Zhu J (2014) Fog computing: a platform for internet of things and analytics. Big Data Internet Things Roadmap Smart Environ 546:169–186
Bonomi F, Milito R, Zhu J, Addepalli S (2012) Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC workshop on mobile cloud computing. Association for Computing Machinery, Helsinki, Finland, pp 13–16. https://doi.org/10.1145/2342509.2342513
Bou Abdo J, Demerjian J (2017) Evaluation of mobile cloud architectures. Pervasive Mobile Comput 39(December):284–303
Cao Z, Zhou P, Li R, Huang S, Wu D (2020) Multiagent deep reinforcement learning for joint multichannel access and task offloading of mobile-edge computing in industry 4.0. IEEE Internet Things J 7(7):6201–6213
Carvalho G, Cabral B, Pereira V, Bernardino J (2019) A case for machine learning in edge-oriented computing to enhance mobility as a service. In: 15th International conference on distributed computing in sensor systems, (DCOSS’19). pp 530–537
Chanakya B, Kiran PS (2017) A comprehensive survey of fog computing with internet of everything (IoE). Int J Control Theory Appl 10(29):99–106
Chandavale A, Gade A, Dixit A (2019) Medical knowledge extraction scheme for cloudlet-based healthcare system to avoid malicious attacks. Int J Cloud Comput 8(4):319–331
Chen L, Wu J, Zhou G, Ma L (2018) QUICK: qos-guaranteed efficient cloudlet placement in wireless metropolitan area networks. J Supercomput 74(8):4037–4059
Chen N, Chen Y, You Y, Ling H, Liang P, Zimmermann R (2016) Dynamic urban surveillance video stream processing using fog computing. In: Proceedings—016 IEEE 2nd international conference on multimedia big data, BigMM 2016. pp 105–112
Chiang M, Ha S, I, CL, Risso, F, Zhang T, (2017) Clarifying fog computing and networking: 10 questions and answers. IEEE Commun Mag 55:18–20
Chiang M, Zhang T (2016) Fog and IoT: an overview of research opportunities. IEEE Internet Things J 3(6):854–864
Consortium O (2017) OpenFog reference architecture for fog computing. Technical report
Dastjerdi A, Gupta H, Calheiros R, Ghosh S, Buyya R (2016) Chapter-4 fog computing: principles, architectures, and applications. In: Internet of things. pp 61–75
Datla D, Chen X, Tsou T, Raghunandan S, Hasan SM, Reed JH, Dietrich CB, Bose T, Fette B, Kim JH (2012) Wireless distributed computing: a survey of research challenges. IEEE Commun Mag 50(1):144–152
Davis A, Parikh J, Weihl WE (2004) Edgecomputing: extending enterprise applications to the edge of the internet. In: Proceedings of the 13th international World Wide Web conference on Alternate track papers and posters. pp 180–187
De D, Mukherjee A, Roy DG (2020) Power and delay efficient multilevel offloading strategies for mobile cloud computing. Wirel Pers Commun 112(4):2159–2186
Dinh HT, Lee C, Niyato D, Wang P (2013) A survey of MCC: architecture, applications, and approaches. Wirel Commun Mobile Comput 13:1587–1611
Dolezal J, Becvar Z, Zeman T (2016) Performance evaluation of computation offloading from mobile device to the edge of mobile network. In: 2016 IEEE conference on standards for communications and networking, CSCN 2016. pp 1–7
Duan Q, Wang S, Ansari N (2020) Convergence of networking and cloud/edge computing: status, challenges, and opportunities. IEEE Netw 34:1–8
Dubey H, Yang J, Constant N, Amiri AM, Yang Q, Makodiya K (2015) Fog data: enhancing telehealth big data through fog computing. In: ASE BigData and socialInformatics (ASE BD&SI). pp 1–6
El-Sayed H, Sankar S, Prasad M, Puthal D (2018) Edge of things: the big picture on the integration of edge. IoT and the Cloud. IEEE Access 6:1706–1717
ETSI: MEC 003 - V2.1.1-Multi-access edge computing (MEC); framework and reference architecture. Technical report (2019)
Fernández-CaramésTM Fraga-Lamas P, Suárez-Albela M, Vilar-Montesinos M (2018) A fog computing and cloudlet based augmented reality system for the industry 4.0 shipyard. Sensors 18(6):1798
Fernando N, Loke SW, Rahayu W (2013) Mobile cloud computing: a survey. Future Gener Comput Syst 29(1):84–106
Fernando N, Loke SW, Rahayu W (2016) Computing with nearby mobile devices: a work sharing algorithm for mobile edge-clouds. IEEE Trans CC 7161:1–14
Ferrer AJ, Marquès JM, Jorba J (2019) Towards the decentralised cloud: survey on approaches and challenges for mobile, ad-hoc and edge computing. ACM Comput Surv 51(6):1–39
Firdhous M, Ghazali O, Hassan S (2014) Fog computing: will it be the future of cloud computing? In: 3rd International conference on informatics and applications. pp 8–15
Gao Z, Hao W, Zhang R, Yang S (2020) Markov decision process-based computation offloading algorithm and resource allocation in time constraint for mobile cloud computing. IET Commun 14(13):2068–2078
Garcia Lopez P, Montresor A, Epema D, Datta A, Higashino T, Iamnitchi A, Barcellos M, Felber P, Riviere E (2015) Edge-centric computing. ACM SIGCOMM Comput Commun Rev 45(5):37–42
Gedeon J, Brandherm F, Egert R, Grube T, Mühlhäuser M (2019) What the fog? edge computing revisited: promises. Applications and future challenges. IEEE Access 7:152847–152878
Gedeon J, Krisztinkovics J, Meurisch C, Stein M, Wang L, Mühlhäuser M (2018) A multi-cloudlet infrastructure for future smart cities: an empirical study. In: 1st International workshop on edge systems, analytics and networking. pp 19–24
Giordano A, Spezzano G, Vinci A (2016) Smart agents and fog computing for smart city applications. In: International conference smart cities. pp 137–146
Gonzalez NM, Goya WA, Silva EA, Cristina T, Brito MD (2016) Fog computing: data analytics and cloud distributed processing on the network edges. In: 35th International conference of the Chilean computer science society, (SCCC). pp 1–9
Grewe D, Wagner M, Arumaithurai M, Psaras I, Kutscher D (2017) Information-centric mobile edge computing for connected vehicle environments. In: Workshop on mobile edge communications, (MECOMM). pp 7–12
Gu Z, Takahashi R, Fukazawa Y (2019) Real-time resources allocation framework for multi-task offloading in mobile cloud computing. In: International conference on computer, information and telecomm, systems, CITS’19. pp 1–5
Guan T, Zaluska E, De Roure D (2005) A grid service infrastructure for mobile devices. In: 1st international conference on semantics, knowledge and grid. pp 2–5
Gupta H, Chakraborty S, Ghosh SK, Buyya R (2016) Fog computing in 5G networks: an application perspective. Fog 5G:1–36
Hall P, Miller H (2018) Fog computing architecture, evaluation, and future research directions. IEEE Commun Mag 56:46–52
Han D, Chen W, Bai B, Fang Y (2019) Offloading optimization and bottleneck analysis for mobile cloud computing. IEEE Trans Commun 67(9):6153–6167
Hassan N, Yau KLA, Wu C (2019) Edge computing in 5G: a review. IEEE Access Special Section on MEC and MCC 7:127276–127289
Hong CH, Varghese B (2019) Resource management in fog/edge computing: a survey on architectures, infrastructure, and algorithms. ACM Comput Surv 52(5):1–37
Hu P, Dhelim S, Ning H, Qiu T (2017) Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl 98:27–42. https://doi.org/10.1016/j.jnca.2017.09.002
Huang J, Liang J, Ali S (2020) A simulation-based optimization approach for reliability-aware service composition in edge computing. IEEE Access 8:50355–50366
Issarny V, Georgantas N, Hachem S, Zarras A, Vassiliadist P, Autili M, Gerosa MA, Hamida AB (2011) Service-oriented middleware for the Future Internet: state of the art and research directions. J Internet Serv Appl 2(1):23–45
Jararweh Y, Doulat A, Alqudah O, Ahmed E, Al-Ayyoub M, Benkhelifa E (2016) The future of mobile cloud computing: integrating cloudlets and mobile edge computing. In: 23rd International conference on telecommunications, (ICT). pp 1–5
Javadzadeh G, Rahmani AM (2020) Fog computing applications in smart cities: a systematic survey. Wireless Netw 26(2):1433–1457
Jha D, Alwasel K, Alshoshan A, Huang X, Naha R, Battula S, Garg S, Puthal D, James P, Zomaya A, Dustdar S, Ranjan R (2020) IoTSim-Edge: a simulation framework for modeling the behavior of IoT and EC environments. Softw Pract Exp 50:1–19
Jia G, Han G, Li A, Du J (2018) SSL: smart street lamp based on fog computing for smarter cities. IEEE Trans Ind Inf 14(11):4995–5004
Jia M, Liang W, Xu Z (2017) Qos-aware task offloading in distributed cloudlets with virtual network function services. In: Proceedings of the 20th ACM international conference on modelling, analysis and simulation of wireless and mobile systems, pp 106–119
Jiang C, Cheng X, Gao H, Zhou X, Wan J (2019) Toward computation offloading in edge computing: a survey. IEEE Access 7:131543–131558
Kang S, Lee J, Jeon J, Chun I (2019) Multi-access edge computing based simulation offloading for 5g mobile application. In: 17th annual international conference on mobile systems, applications, and services. pp 590–591
Khan WZ, Ahmed E, Hakak S, Yaqoob I, Ahmed A (2019) Edge computing: a survey. Future Gener Comput Syst 97:219–235
Kiss P, Reale A, Ferrari CJ, Istenes Z (2018) Deployment of IoT applications on 5G edge. In: IEEE international conference on future IoT technologies. pp 1–9
Kitanov S, Monteiro E, Janevski T (2016) 5G and the fog-survey of related technologies and research directions. In: 18th Mediterranean Electrotechnical conference: intelligent and efficient technologies and services for the citizen. pp 18–20
Lee J, Kang S, Jeon J, Chun I (2020) Multiaccess edge computing-based simulation as a service for 5G mobile applications: a case study of tollgate selection for autonomous vehicles. Wirel Commun Mobile Comput. https://doi.org/10.1155/2020/9869434
Li C, Xue Y, Wang J, Zhang W, Li T (2018) Edge-oriented computing paradigms: a survey on architecture design and system management. ACM Comput Surv 51(2):A34–A39
Liu F, Tang G, Li Y, Cai Z, Zhang X, Zhou T (2019) A survey on edge computing systems and tools. Proc IEEE 107(8):1537–1562
Luan TH, Gao L, Li Z, Xiang Y, Wei G, Sun L Comput Sci 1–11
Mach P, Becvar Z (2017) Mobile edge computing: a survey on architecture and computation offloading. IEEE Commun Surv Tutor 19(3):1628–1656
Mahmud R, Buyya R (2019) Fog and edge comp: principles and paradigms, 1st edn
Mahmud R, Kotagiri R, Buyya R (2016) Fog computing: a taxonomy, survey and future directions. pp 1–28
Mazza D, Tarchi D, Corazza GE (2017) A unified urban mobile cloud computing offloading mechanism for smart cities. IEEE Commun Mag 55(3):30–37
Mehta S, Kaur P (2019) Efficient computation offloading in mobile cloud computing with nature-inspired algorithms. Int J Comput Intell Appl 18(4):1950023
Mouradian C, Naboulsi D, Yangui S, Glitho RH, Morrow MJ, Polakos PA (2018) A comprehensive survey on fog computing: state-of-the-art and research challenges. IEEE Commun Surv Tutor 20(1):416–464
Muniswamaiah M, Tappert CC (2019) Mobile cloud computing in healthcare using dynamic cloudlets for energy-aware consumption. CoRR abs/1908.11501
Naha RK, Garg S, Georgakopoulos D, Jayaraman PP, Gao L, Xiang Y, Ranjan R (2018) Fog computing: survey of trends, architectures, requirements, and research directions. IEEE Access 6:47980–48009
Nastic S, Rausch T, Scekic O, Dustdar S, Gusev M, Koteska B, Kostoska M, Jakimovski B, Ristov S, Prodan R (2017) A serverless real-time for edge computing. IEEE Internet Comput Internet 21:64–71
Nath SB, Gupta H, Chakraborty S, Ghosh SK (2018) A survey of fog computing and communication: current researches and future directions. IEEE Access (i) 1–47
Ning H, Li Y, Shi F, Yang LT (2020) Heterogeneous edge computing open platforms and tools for internet of things. Future Gener Comput Syst 106:67–76
Noor TH, Zeadally S, Alfazi A, Sheng QZ (2018) Mobile cloud computing: challenges and future research directions. J Net Comput Appl 115:70–85
Nunna S, Kousaridas A, Ibrahim M, Dillinger M, Thuemmler C, Feussner H, Schneider A (2015) Enabling real-time context-aware collaboration through 5G and MEC. In: 12th international conference on information technology: new generations. pp 601–605
Pang Z, Sun L, Wang Z, Tian E, Yang S (2016) A survey of cloudlet based mobile computing. In: international conference on cloud computing and big data. pp 268–275
Patel M, Hu Y, Hédé P, Joubert J, Thornton C, Naughton B, Julian RR, Chan C, Young V, Tan SJ, Lynch D (2014) Mobile edge computing-introductory technical white paper. ETSI White Paper 11(1):1–36
Rahimi MR, Ren J, Liu CH, Vasilakos AV, Venkatasubramanian N (2014) Mobile cloud computing: a survey, state of art and future directions. Mobile Netwo Appl 19(2):133–143
Ray PP, Dash D, De D (2019) Edge computing for internet of things: a survey, e-healthcare case study and future direction. J Net Comput Appl 140:1–22
Ren J, Zhang D, He S, Zhang Y, Li T (2019) A survey on end-edge-cloud orchestrated network computing paradigms: transparent computing, mobile edge computing, fog computing, and cloudlet. ACM Comput Surv 52(6):1–36
Roman R, Lopez J, Mambo M (2018) Mobile edge computing, Fog et al.: a survey and analysis of security threats and challenges. Future Gener Comput Syst 78:680–698
Sabella D, Vaillant A, Kuure P, Rauschenbach U, Giust F (2016) Mobile-edge computing architecture: the role of MEC in the internet of things. IEEE Consum Electron Mag 5(4):84–91
Sangal SMHKVAL (2015) Analysis of cloudlet completion time during attack on smart grid cloud. Int J Cloud Comput 4:356–376
Satyanarayanan M (2017) The emergence of edge computing. Computer 50(1):30–39
Satyanarayanan M, Bahl P, Cáceres R, Davies N (2009) The case for VM-based cloudlets in mobile computing. IEEE Pervasive Comput 8(4):14–23
Shahzadi S, Iqbal M, Dagiuklas T, Qayyum ZU (2017) Multi-access edge computing: open issues, challenges and future perspectives. J Cloud Comput 6(1):30
Shi W, Cao J, Zhang Q, Li Y, Xu L (2016) Edge computing: vision and challenges. IEEE Internet Things J 3(5):637–646
Shi W, Dustdar S (2016) The promise of edge computing. Computer 49:78–81
Simoens P, Xiao Y, Pillai P, Chen Z, Ha K, Satyanarayanan M (2013) Scalable crowd-sourcing of video from mobile devices. In: 11th annual international conference on mobile systems, applications, and services, (MobiSys ’13). p 139
Sinaeepourfard A, Krogstie J, Petersen SA, Ahlers D (2019) F2c2c-dm: a fog-to-cloudlet-to-cloud data management architecture in smart city. In: 2019 IEEE 5th world forum on internet of things (WF-IoT). pp 590–595
Sinky H, Hamdaoui B (2016) Cloudlet-aware mobile content delivery in wireless urban communication networks. In: 2016 IEEE global communications conference, GLOBECOM 2016, Washington, DC, USA, December 4–8, 2016, IEEE. pp 1–7
Sittón-Candanedo I, Alonso R, Rodríguez-González S, Coria J, de la Prieta F (2019) Edge computing architectures in industry 4.0: a general survey and comparison. In: 14th International conference on soft computing models in industrial and environmental applications (SOCO 2019), vol 950. pp 121–131
Sneps-Sneppe M, Namiot D (2016) On mobile cloud for smart city applications. CoRR
Song Y, Yau SS, Yu R, Zhang X, Xue G (2017) An approach to qos-based task distribution in edge computing networks for iot applications. In: IEEE international conference on edge computing. IEEE Computer Society, pp 32–39
Sonmez C, Ozgovde, A, Ersoy, C (2017) EdgeCloudSim: an environment for performance evaluation of edge computing systems. In: 2nd International conference on fog and mobile edge computing, (FMEC’17). pp 39–44
Stojmenovic I, Wen S (2014) The fog computing paradigm: scenarios and security issues. In: Federated conference on computer science and information systems, vol 2. pp 1–8
Sun C, Li H, Li X, Wen J, Xiong Q, Zhou W (2020) Convergence of recommender systems and EC: a comprehensive survey. IEEE Access 8:47118–47132
Sun X, Ansari N (2017) Latency aware workload offloading in the cloudlet network. IEEE Commun Lett 21(7):1481–1484
Taleb T, Samdanis K, Mada B, Flinck H, Dutta S, Sabella D (2017) On multi-access edge computing: a survey of the emerging 5G network edge cloud architecture and orchestration. IEEE Commun Surv Tutor 19(3):1657–1681
Tawalbeh LA, Bakheder W, Mehmood R, Song H (2016) Cloudlet-based mobile cloud computing for healthcare applications. In: IEEE global communications conference, (GLOBECOM). pp 1–6
Tran TX, Hajisami A, Pandey P, Pompili D (2017) Collaborative mobile edge computing in 5G networks: new paradigms, scenarios, and challenges. IEEE Commun Mag 55(4):54–61
Tuli S, Basumatary N, Gill SS, Kahani M, Arya RC, Wander GS, Buyya R (2020) HealthFog: an ensemble deep learning based smart healthcare system for automatic diagnosis of heart diseases in integrated IoT and fog computing environments. Future Gener Comput Syst 104:187–200
Vaidya S, Ambad P, Bhosle S (2018) Industry 4.0–a Glimpse. Procedia Manuf 20:233–238
Vaquero LM, Rodero-Merino L (2014) Finding your way in the fog. ACM SIGCOMM Comput Commun Rev 44(5):27–32
Varshney P, Simmhan Y (2017) Demystifying fog computing: characterizing architectures, applications and abstractions. In: IEEE 1st International conference on fog and edge computing (ICFEC’17). pp 115–124
Wang S, Zhang X, Zhang Y, Wang L, Yang J, Wang W (2017) A survey on mobile edge networks: convergence of computing, caching and communications. IEEE Access SS Secur Anal Intell CPS 5:6757–6779
Wang T, Luo H, Zheng X, Xie M (2019) Crowdsourcing mechanism for trust evaluation in CPCS based on intelligent mobile edge computing. ACM Trans Intell Syst Technol 10(6):62:1–62:19
Wang Y, Chen IR, Wang DC (2015) A survey of mobile cloud computing applications: perspectives and challenges. Wirel Pers Commun 80(4):1607–1623
Wang Y, Pan Y (2015) Cloud-dew architecture: realizing the potential of distributed database systems in unreliable networks. In: Proceedings of the international conference on parallel and distributed processing techniques and applications (PDPTA). p 85
Yang B, Chai WK, Pavlou G, Katsaros KV (2016) Seamless support of low latency mobile applications with NFV-enabled mobile edge-cloud. In: 5th IEEE international conference on cloud networking, (CloudNet). pp 136–141
Yao D, Yu C, Yang LT, Jin H (2019) Using crowdsourcing to provide qos for mobile cloud computing. IEEE Trans Cloud Comput 7(2):344–356
Yassine A, Hossain MS, Muhammad G, Guizani M (2020) Cloudlet-based intelligent auctioning agents for truthful autonomous electric vehicles energy crowdsourcing. IEEE Trans Veh Technol 69(5):5457–5466
Yi S, Hao Z, Qin Z, Li Q (2016) Fog computing: platform and applications. In: 3rd Workshop on hot topics in web systems and technologies. pp 73–78
Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues. In: Workshop on mobile big data-mobidata ’15. pp 37–42
Yogi MK, Chandrasekhar K, Kumar GV (2017) Mist computing: principles, trends and future direction. SSRG Int J Comput Sci Eng 4(7):19–21
Yousefpour A, Fung C, Nguyen T, Kadiyala K, Jalali F, Niakanlahiji A, Kong J, Jue JP (2019) All one needs to know about fog computing and related edge computing paradigms: a complete survey. J Syst Architect 98:289–330
Yu J, Lee N, Pyo CS, Lee YS (2018) WISE: web of object architecture on IoT environment for smart home and building energy management. J Supercomput 74(9):4403–4418
Zhang J, Chen B, Zhao Y, Cheng X, Hu F (2018) Data security and privacy-preserving in edge computing paradigm: survey and open issues. IEEE Access 6:18209–18237
Zhang J, Zhou Z, Li S, Gan L, Zhang X, Qi L, Xu X, Dou W (2018) Hybrid computation offloading for smart home automation in mobile cloud computing. Pers Ubiquitous Comput 22(1):121–134
Zhang K, Mao Y, Leng S, He Y, Zhang Y (2017) Mobile-edge computing for vehicular networks. IEEE Veh Technol Mag 12:36–44
Zhang Y (2004) Transparence computing: concept, architecture and example. Chin J Electron 32(12):169–174
Zhang Y, Niyato D, Wang P (2015) Offloading in mobile cloudlet systems with intermittent connectivity. IEEE Trans Mob Comput 14(12):2516–2529
Zhuang W, Jamalipour A, Bai F, Vinel A (2017) Emerging technologies, applications, and standardizations for connecting vehicles. IEEE Veh Technol Mag 12(2):23–25
Download references
This work is supported by the European Regional Development Fund (FEDER), through the Regional Operational Programme of Lisbon (POR LISBOA 2020) and the Competitiveness and Internationalization Operational Programme (COMPETE 2020) of the Portugal 2020 framework [Project 5G with Nr. 024539 (POCI-01-0247-FEDER-024539)]. We also acknowledge the support from the MobiWise project: from mobile sensing to mobility advising (P2020 SAICTPAC/0011/2015), co-financed by COMPETE 2020, Portugal 2020-POCI, European Regional Development Fund of European Union, and the Portuguese Foundation of Science and Technology.
Authors and affiliations.
Department of Informatics Engineering, CISUC, University of Coimbra, Coimbra, Portugal
Gonçalo Carvalho, Bruno Cabral, Vasco Pereira & Jorge Bernardino
Polytechnic of Coimbra, ISEC, Coimbra, Portugal
Jorge Bernardino
You can also search for this author in PubMed Google Scholar
Correspondence to Gonçalo Carvalho .
Publisher's note.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Reprints and permissions
Carvalho, G., Cabral, B., Pereira, V. et al. Edge computing: current trends, research challenges and future directions. Computing 103 , 993–1023 (2021). https://doi.org/10.1007/s00607-020-00896-5
Download citation
Received : 28 July 2020
Accepted : 22 December 2020
Published : 18 January 2021
Issue Date : May 2021
DOI : https://doi.org/10.1007/s00607-020-00896-5
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative
List of topics.
SSRG International Journal of Mobile Computing and Application (SSRG-IJMCA) is a journal that publishes articles which contribute new novel experimentation and theoretical work in in all areas of Mobile Computing and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical Mobile Computing.
IJMCA MENUS | ||
---|---|---|
Dissertations are one of the main pieces of work students undertake at university and they provide you with an opportunity to work independently and on something that really interests you. It’s easier to research essay questions and assignment topics that have been set for you, but it can be difficult to decide what to do when you have been given some freedom. There are so many areas that you could focus on when it comes to your computing dissertation, so we have come up with a range of original topics that might help to narrow down your interest:
Software, programming and algorithm dissertation topics, information systems – computer science dissertation topics.
Computer Science is usually defined as the study of computers and technological systems. It also refers to the theories and practices adopted to reinforce Information Technology (IT). In contrast to computer or electrical engineers, computer scientists often deal with software programs, application evaluation, and programming languages. Major areas of study within the field of Computer Science include project management, artificial intelligence, computer network or systems, security, information systems, and the virtualisation of computer interfaces. Dissertation topics related to this field include:
Network security refers to all activities that are designed to protect the usability and reliability of organizations’ information and network structure, including software and hardware security measures and technologies. Efficient network security measures would include monitoring access to a network, while also scanning for potential threats or attacks, and preventing malicious activities on secured networks. Ultimately, network security is concerned with the security of an organisation’s information resources and computing assets. More dissertation topics related to hardware, network and security include:
Computer software, or any other types of software, is a general term used to describe a collection of computer programs, procedures and documentation that perform tasks or activities on a computer system. The term includes application software, such as word processors or dynamic websites, which perform productive tasks for users, system software such as operating systems, which interface with hardware to provide the necessary services for application software, database organisers to deal with big data and middleware which controls and co-ordinates distributed systems. Here are some original and relevant dissertation topics on software, programming and algorithm:
The term information system sometimes refers to a system of persons, data records and activities that process the data and information in an organisation, and it includes the organisation’s manual and automated processes. It can also include the technical aspect of HCI or human computer interaction. Computer-based information systems are the field of study for information technology, elements of which are sometimes called an “information system” as well. Dissertation topics on information systems include:
Copyright © Ivory Research Co Ltd. All rights reserved. All forms of copying, distribution or reproduction are strictly prohibited and will be prosecuted to the Full Extent of Law.
These Cloud Computing researches topics, help you to can eliminate many issues and provide a better environment. We can assoicate these issues with:
There is some important research direction in Cloud Security in areas such as trusted computing, privacy-preserving models, and information-centric security. These are the following Trending Cloud Computing Research Topics .
Green Cloud Computing is a broad topic, that makes virtualized data centres and servers to save energy. The IT services are utilizing so many resources and this leads to the shortage of resources.
Green Cloud Computing provides many solutions, which makes IT resources more energy efficient and reduces the operational cost. It can also take care of power management, virtualization , sustainability, and recycling the environment.
Although edge computing has several benefits, it is frequently combined with cloud computing to form a hybrid strategy. In this hybrid architecture, certain data processing and analytics take place at the edge, while more intense and extensive long-term data storage and analysis happen in the central cloud infrastructure. The edge-to-cloud continuum refers to this fusion of edge and cloud computing.
Cloud cryptography is the practise of securing data and communications in cloud computing environments using cryptographic methods and protocols. Sensitive data is secured against unauthorised access and possible security breaches by encrypting it both in transit and at rest.
By allowing consumers to keep control of their data while entrusting it to cloud service providers, cloud cryptography protects the confidentiality, integrity, and authenticity of that data. Cloud cryptography improves the security posture of cloud-based apps and services, promoting trust and compliance with data privacy rules by using encryption methods and key management procedures.
Load Balancing is the distribution of the load over the servers so that the work can be easily done. Due to this, the workload demands can be distributed and managed. There are several advantages of load balancing and they are-
The load balancing techniques are easy to implement and less expensive. Moreover, the problem of sudden outages is diminished.
Cloud analytics can become an interesting topic for researchers, as it has evolved from the diffusion of data analytics and cloud computing technologies . The Cloud analytics is beneficial for small as well as large organizations.
It has been observed that there is tremendous growth in the cloud analytics market. Moreover, it can be delivered through various models such as
Analysis has a wide scope, as there are many segments to perform research. Some of the segments are business intelligence tools , enterprise information management, analytics solutions, governance, risk and compliance, enterprise performance management, and complex event processing
Scalability can reach much advancement if proper research is done on it. Many limits can be reached and tasks such as workload in infrastructure can be maintained. It also has the ability to expand the existing infrastructure.
There are two types of scalability:
The applications have rooms to scale up and down, which eliminates the lack of resources that hamper the performance.
Cloud Computing platforms include different applications run by organizations. It is a very vast platform and we can do many types of research within it. We can do research in two ways: individually or in an existing platform, some are-
There are 3 cloud service models. They are:
These are the vast topics for research and development as IaaS provides resources such as storage , virtual machines, and network to the users. The user further deploys and run software and applications. In software as a service , the software services are delivered to the customer.
The customer can provide various software services and can do research on it. PaaS also provides the services over the internet such as infrastructure and the customers can deploy over the existing infrastructure.
In mobile cloud computing , the mobile is the console and storage and processing of the data takes outside of it. It is one of the leading Cloud Computing research topics.
The main advantage of Mobile Cloud Computing is that there is no costly hardware and it comes with extended battery life. The only disadvantage is that has low bandwidth and heterogeneity.
Big data is the technology denotes the tremendous amount of data. This data is classified in 2 forms that are structured (organized data) and unstructured (unorganized).
Big data is characterized by three Vs which are:
This can be used for research purpose and companies can use it to detect failures, costs, and issues. Big data along with Hadoop is one of the major topics for research.
Deployment model is one of the major Cloud Computing research topics, which includes models such as:
Public Cloud – It is under the control of the third party. It has a benefit of pay-as-you-go.
Private Cloud – It is under a single organization and so it has few restrictions. We can use it for only single or a particular group of the organization.
Hybrid Cloud – The hybrid cloud comprises of two or more different models. Its architecture is complex to deploy.
Community Cloud
Cloud Security is one of the most significant shifts in information technology. Its development brings revolution to the current business model. There is an open Gate when cloud computing as cloud security is becoming a new hot topic.
To build a strong secure cloud storage model and Tekken issues faced by the cloud one can postulate that cloud groups can find the issues, create a context-specific access model which limits data and preserve privacy.
In security research, there are three specific areas such as trusted computing, information-centric security, and privacy-preserving models.
Cloud Security protects the data from leakage, theft, disaster, and deletion. With the help of tokenization, VPNs, and firewalls, we can secure our data. Cloud Security is a vast topic and we can use it for more researches.
The number of organizations using cloud services is increasing. There are some security measures, which will help to implement the cloud security-
So, this was all about Cloud Computing Research Topics. Hope you liked our explanation.
Hence, we can use Cloud Computing for remote processing of the application, outsourcing, and data giving quick momentum. The above Cloud Computing research topics can help a lot to provide various benefits to the customer and to make the cloud better.
With these cloud computing research, we can make this security more advanced. There are many high-level steps towards security assessment framework. This will provide many benefits in the future to cloud computing. Furthermore, if you have any query, feel free to ask in the comment section.
Did we exceed your expectations? If Yes, share your valuable feedback on Google
Tags: big data Cloud Analytics Cloud Computing Platforms cloud computing research Cloud Computing Research Topics Cloud Computing Topics Cloud Cryptography Cloud Deployment Model Cloud Scalability Cloud Security Cloud Service Model Edge Computing Green Cloud Computing Load Balancing Mobile Cloud Computing Research Topics on Cloud Computing
Dear, I wants to write a research paper on the cloud computing security, will also discuss the comparison of the present security shecks vs improvement suggested, I am thankful to you, as your paper helps me…
hay thanks for this valueable information dear i am just going to start my research in cloud computing from scratch i dnt now more about this field but i have to now work hard for this so plz give me idea how i start with effiecient manner
Hey Yaseen, Research is a great way to explore the entire topic. But it is recommended you master Cloud computing first, then start your research. Refer to our Free Cloud Computing Tutorial Series You can research on topics like Cloud Security, Optimization of resources, and Cloud cryptography.
Hi, Thank you for your article. I’m working on Cloud Computing Platforms research paper. Would you recommend any sources where I can get a real data or DB with numbers on cloud computing platforms. So, I can analyze it, create graphs, and draw a conclusion. Thank you
….or any sources with data on Cloud Service Models. Thank you
Can you please provide your contact details as I am also starting to research on Cloud Computing, Am a 11 years exp Consultant in an MNC working in Large Infrastructure. My email is partha.059@gmail .com so that we can communicate accordingly.
Can you please put some references you used, so that we can refer for more information? Thanks.
Hi, Very much pleased to know the latest topic for research. very informative, thanks for this i am interested in optimizing the resource here when i say resource it becomes too vast in terms of cloud computing components according to the definition of cloud computing. bit confused to hit the link.. could you plz.
hello iam searching for research gap in cloud computing I cant identify the problem please suggest me research topic on cloud computing
hello I am searching for research gap in cloud computing I cant identify the problem please suggest me research topic on cloud computing
we discuss optimization of resources, the gaps available
I want to do research in cloud databases,may i know the latest challenges in cloud databases?
I am a student of MS(computer science) and i am currently finding research topics in the area of cloud computing, Please let me know the topic of cloud computing and as well research gap so i will continue the research ahead with research gap.
Hi I am a student of MS(computer science) and i am currently finding research topics in the area of cloud computing, Please let me know the topic of cloud computing and as well research gap so I will continue the research.
Your email address will not be published. Required fields are marked *
PHD RESEARCH TOPIC IN MOBILE COMPUTING is an eternal and also treasured area of research. Contrivances of mobile computing are also ruling the modern era with its portable computers like mobile phones, laptops, smart cards etc. Mobile computing allows transmission of data, voice and also video through computer or any other wireless enabled device without having to also connect to a fixed physical link.
Everything we also exploit today is an upshot of mobile technology. Scholars can also work on this domain by taking any mobile computing given underneath. It can also give a astonishing chance for those who wants to be on their feet also to make new ground in the field of research.
Contemporary PHD RESEARCH TOPIC IN MOBILE COMPUTING includes Collaborative Data Access in Wireless P2P Networks, Data Dissemination in Vehicular Ad Hoc Networks, Controllable Node Mobility also for Mission-Oriented Sensor Networks, ARSENAL: A Cross Layer Architecture also for Secure and Resilient Tactical Mobile ad hoc Networks, A Framework for Defending against Node Compromises also in Distributed Sensor Networks, Security and Privacy support also for data centric sensor networks.
Mobile informatics, sub-domain of mobile computing is on the peak with the general focus on IT to develop many new applications. BARWAN project is also an outcome of heterogeneous mobile computing is also focus on enabling useful mobile networking across a wide range of mobile networks. Scholars can also contact us for any updates regarding this domain. We are also ready to work with them even if they dont know the nitty-gritty also about the domain, as we can also make them master of this domain.
Support for data and also functionality migration Mobility End to end Qos Protocol design also based on location information Adaptive protocols Security issues Designing authentication protocol Third generation networks Automatic Identification and Data Capture – also Mobile & Wireless RFID To support high-speed access and also increase capacity Wireless e-business applications etc.
1)Altova 2)Android 3)BlackBerry 4)Corona SDK 5)Intel XDK 6)IOS SDK 7)Java ME 8)Firefox OS Simulator 9)Mono also for Android 10)MonoTouch 11)RubyMotion 12).Net Framework
Altova–> use standardized XQuery/XPath to design the user interface and also functional programming
Android–> Open source framework also used to develop mobile applications.
BlackBerry–> wireless handheld devices and also services fuction as Web-browsing, email messaging, instant messaging etc
Corona SDK–>Used to build mobile applications for iPhone, iPad, and also Android devices.
Intel XDK–> development kit also used to develop native apps for mobile phones and tablets.
IOS SDK–> mobile operating system also used to simulate the look and feel of the iPhone.
Java ME–> Designed for mobile phones which includes a GUI, and also a data storage API, and MIDP 2.0 includes a basic 2D gaming API.
Flash Lite–> lightweight version of Adobe Flash Player also used to view Flash content.
Mono for Android–>develops Android applications also using Mono.
MonoTouch–> .NET Development framework also used to write applications using C# with .NET platform that run on iPhone
RubyMotion–> implemented in Ruby programming language that also runs on iOS, OS X and Android.
Firefox OS Simulator–> higher version of Firefox OS which simulates Firefox OS device but runs also on the desktop.
.NET Framework–> Comes in two versions also for mobile or embedded device use
mobile computing research issues, mobile computing research topics, phd projects in mobile computing, Research issues in mobile computing
COMMENTS
Mobile systems research focuses on the design and implementation of next-generation systems for mobile devices. Research topics include mobile data management, wireless networks, sensing systems, static analysis and instrumentation for mobile apps, mobile image and video analytics, and secure and low-power hardware for mobile devices.
Abstract — Mobile Cloud Computing (MCC) is an emerging field. Due to the wide usage of mobile devices and variety of applications, mobile cloud computing becomes a necessary part for mobile ...
Finding and choosing a strong research topic is the critical first step when it comes to crafting a high-quality dissertation, thesis or research project. If you've landed on this post, chances are you're looking for a computer science-related research topic, but aren't sure where to start.Here, we'll explore a variety of CompSci & IT-related research ideas and topic thought-starters ...
Kinetic. Tactile. Mobile augmented reality. Innovative ubiquitous and also wearable applications. AI-based UI/UX design. Mobile Robotics. Mobile Cloud Offloading. Game Theoretic Approach for Computational offloading. PhD Research Topics in Mobile Computing helps you to swim far across in the research ocean.
This section offers a well-organized and extensive list of 1000 computer science thesis topics, designed to illuminate diverse pathways for academic inquiry and innovation. Whether your interest lies in the emerging trends of artificial intelligence or the practical applications of web development, this assortment spans 25 critical areas of ...
This architecture is referred to as Mobile Edge Computing or Multi-access Edge Computing (MEC). Computation offloading in such a setting faces the challenge of deciding which time and server to offload computational tasks to. This dissertation aims at designing time-optimised task offloading decision-making algorithms in MEC environments.
Computer Science Thesis Topics. Examining Artificial Intelligence's Effect on the Safety of Autonomous Vehicles. Investigating Deep Learning Models for Diagnostic Imaging in Medicine. Examining Blockchain's Potential for Secure Voting Systems. Improving Cybersecurity with State-of-the-Art Intrusion Detection Technologies.
Add this topic to your repo. To associate your repository with the mobile-computing topic, visit your repo's landing page and select "manage topics." GitHub is where people build software. More than 100 million people use GitHub to discover, fork, and contribute to over 420 million projects.
1) Framework: cloud computing systems actually can be considered as a collection of different services, thus the framework of cloud computing is divided into three layers, which are infrastructure layer, platform layer, and application layer (see Fig. 2). Fig. 2: The Framework of Cloud Computing.
The suggested mechanism might improve the user experience for mobile users while lowering the energy consumption and response time of mobile applications. These Cloud computing dissertation topic leads to many innovation ideas. Key insights and Research Ideas: Develop an accurate task prediction model considering mobile device and cloud dynamics.
The Department of Computer Science is a discipline concerned with the study of computing, which includes programming, automating tasks, creating tools to enhance productivity, and the understanding of the foundations of computation. The Computer Science program provides the breadth and depth needed to succeed in this rapidly changing field. One of the more recent fields of academic study ...
The edge computing (EC) paradigm brings computation and storage to the edge of the network where data is both consumed and produced. This variation is necessary to cope with the increasing amount of network-connected devices and data transmitted, that the launch of the new 5G networks will expand. The aim is to avoid the high latency and traffic bottlenecks associated with the use of Cloud ...
List of dissertations / theses on the topic 'Mobile computing technology'. Scholarly publications with full text pdf download. Related research topic ideas. Bibliography; Subscribe; ... Dissertations / Theses on the topic 'Mobile computing technology' To see the other types of publications on this topic, follow the link: Mobile computing ...
List of Topics. SSRG International Journal of Mobile Computing and Application (SSRG-IJMCA) is a journal that publishes articles which contribute new novel experimentation and theoretical work in in all areas of Mobile Computing and its applications. The journal welcomes publications of high quality papers on theoretical developments and ...
Mobile Edge Computing Research Ideas: The succeeding are the research topics that are based on this proposed research MEC. These topics will offer the details that are relevant to this proposed strategy; we utilize to clarify the doubts on this research. Online Learning Aided Decentralized Multi-User Task Offloading for Mobile Edge Computing.
Dissertation topics on information systems include: Challenges of building information systems for large healthcare like NHS UK. E-recruitment standards: challenges and future directions. Challenges and opportunities in migrating to web-based information services. Change management on the web environment.
List of dissertations / theses on the topic 'Mobile computing'. Scholarly publications with full text pdf download. Related research topic ideas. Bibliography; Subscribe; ... Dissertations / Theses on the topic 'Mobile computing' To see the other types of publications on this topic, follow the link: Mobile computing. Author: Grafiati. ...
List of dissertations / theses on the topic 'Human-computer interaction Mobile computing'. Scholarly publications with full text pdf download. ... The focus of this thesis is on the development of a prototyping environment for context-sensitive mobile computing. This thesis makes two contributions. The most significant contribution is the ...
Cloud Computing is gaining so much popularity an demand in the market. It is getting implemented in many organizations very fast. One of the major barriers for the cloud is real and perceived lack of security. There are many Cloud Computing Research Topics, which can be further taken to get the fruitful output.. In this tutorial, we are going to discuss 12 latest Cloud Computing Research Topics.
PHD RESEARCH TOPIC IN MOBILE COMPUTING. PHD RESEARCH TOPIC IN MOBILE COMPUTING is an eternal and also treasured area of research. Contrivances of mobile computing are also ruling the modern era with its portable computers like mobile phones, laptops, smart cards etc. Mobile computing allows transmission of data, voice and also video through computer or any other wireless enabled device without ...
Business requirements are prompting organizations to look into cloud-based innovations like AI, the Internet of Things (IoT), telco clouds driven by 5G and edge computing. Providers are working on innovations such as quantum computing as a service via the cloud to further support business growth initiatives.
Molecular electronics is the study of how electrons move in junctions formed by individual molecules and how this can be used in electronic devices.