Fogging Jyaguchi Services in Tensai Gothalo

@inproceedings{Prasad2015FoggingJS,
  title={Fogging Jyaguchi Services in Tensai Gothalo},
  author={G. Prasad and Batajoo Amit and Wasaki Katsumi},
  year={2015}
}
This paper describes the efficient method of fogging in Tensai Gothalo. Tensai Gothalo is a novel dynamic router device developed in Gautam-Asami Laboratory of Wakkanai Hokusei Gakuen University which has sensing, actuating, monitoring and movable capability. Similarly, fogging is a new concept of cloud computing at which the data plane is defined in user device. In this paper we would like to present the stepwise explanation about how to fog in Tensai Gothalo. Furthermore, we will elaborate a… Expand

Figures and Tables from this paper

References

SHOWING 1-10 OF 27 REFERENCES
Tensai Gothalo: A Solar Powered Robotic Vehicle for Real Time Network Monitoring and Management Using Raspberry Pi
In this paper, we describe the architecture of Tensai Gothalo, a network monitoring robotic vehicle developed in our previous research. Tensai Gothalo uses Wi-Fi modules to communicate with its slaveExpand
Software defined networking-based vehicular Adhoc Network with Fog Computing
TLDR
A new VANET architecture called FSDN is proposed which combines two emergent computing and network paradigm Software Defined Networking (SDN) and Fog Computing as a prospective solution and provides flexibility, scalability, programmability and global knowledge. Expand
Smart Items, Fog and Cloud Computing as Enablers of Servitization in Healthcare
In this article we argue that smart items and cloud computing can be powerful enablers of servitization as business trend. This is exemplified by an application scenario in healthcare that wasExpand
An overview of Fog computing and its security issues
TLDR
This paper studies a typical attack, man‐in‐the‐middle attack, for the discussion of system security in Fog computing, and investigates the stealthy features of this attack by examining its CPU and memory consumption on Fog device. Expand
Aligning Cloud Computing Security with Business Strategy
TLDR
An overview of how cloud computing can be helpful for an enterprise is given and the issue of data leakage in this technology which face the cloud computing clients is highlighted. Expand
Using a Solar Powered Robotic Vehicle to Monitor and Manage Unstable Networks
TLDR
The design and development of an autonomous path tracing robotic vehicle that can be utilized in the management of unstable network is introduced and the mechanism of sensors units, role of microcontroller and the anatomy of the vehicle and its utilization in terms of network management is discussed. Expand
Encapsulation of Micro Engineering Tools in a Co- Operative Jyaguchi Computing Infrastructure
TLDR
A working model of Jyaguchi platform that can deliver micro engineering services that are distributed locally or globally should be allowed to change its granularity in demand-respond manner based on micro, macro and mega service model instead of keeping those services static. Expand
A Model for the Development of Universal Browser for Proper Utilization of Computer Resources Available in Service Cloud over Secured Environment
Security is a major issue in cloud computing technology. In order to increase the service level of trust among the cloud service providers and its users, understanding of Cloud Computing ArchitectureExpand
Migrating Legacy Software Systems to CORBA based Distributed Environments through an Automatic Wrapper Generation Technique
One of the strategies for migrating legacy systems to distributed object-oriented environments is wrapping. Wrapping is a method of encapsulation that provides wellknown interfaces for accessingExpand
The Transition of Legacy Systems to a Distributed Architecture
Architecture and the Distributed Environment Distributed Systems are a New Paradigm Information in Transition Service Based Architecture Cooperative Environment Application Systems Alignment ofExpand
...
1
2
3
...