scispace - formally typeset
Search or ask a question
Author

Anuj Kumar

Bio: Anuj Kumar is an academic researcher from National Institute of Technology, Durgapur. The author has contributed to research in topics: Wastewater & Effluent. The author has an hindex of 12, co-authored 29 publications receiving 371 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This survey paper discusses main characteristics of the Fog, explores the advantages and motivation of Fog computing, and analyze its applications for IOT.
Abstract: Fog computing is new buzz word in computing world after cloud computing. This new computing paradigm could be seen as an extension to cloud computing. Main aim of fog computing is to reduce the burden on cloud by gathering workloads, services, applications and huge data to near network edge. In this survey paper, we will discuss main characteristics of the Fog that are; 1.Mobility, 2.Location awareness, 3.Low latency, 4.Huge number of nodes, 5. Extensive geographical distribution, 6.Various real time applications and we explore the advantages and motivation of Fog computing, and analyze its applications for IOT.

71 citations

Journal ArticleDOI
TL;DR: A literature review as mentioned in this paper provides an effective scheme to utilize RHA and discussed process pathway for economically valuable products to provide a solution to the problem associated with its proper disposal through superior recycle of this agriculture waste.
Abstract: Rice husk ash (RHA) is the major by-product left after the burning of rice husk, which is profusely present throughout the process of the rice milling. The burnt rice husk, as RHA, in turn causes more environmental pollution and its disposal becomes a difficult problem, hence requiring serious attention from the scientific community regarding its disposal and proper reuse if possible. The major economic reason for recycling the ash is the value added products which can be generated from it. The focus is on the use of RHA as adsorbent and subsequent silica production owing to the fact that the ash is mainly composed of carbon and silica. As regards other potential applications of ash, research is still going on and some of the products, which are under development phase, have also been brought to limelight in this review. This literature review provides an effective scheme to utilize RHA and discussed process pathway for economically valuable products to provide a solution to the problem associated with its proper disposal through superior recycle of this agriculture waste.

60 citations

Journal ArticleDOI
TL;DR: Current processes for curbing pollution and also reusing and recycling waste products are reviewed, finding novel techniques exist for converting waste products into energy and value-added products.

49 citations

Journal ArticleDOI
TL;DR: In this paper, the optimization of five process parameters such as pH, agitation, temperature, inoculum percentage and incubation time were optimized by Taguchi robust design method for obtaining enhanced biomass and phenol degradation by the isolated Alcaligenes faecalis JF339228 from Durgapur steel industry (DSP), India.
Abstract: The optimization of five process parameters such as pH, agitation, temperature, inoculum percentage and incubation time were optimized by Taguchi robust design method for obtaining enhanced biomass and phenol degradation by the isolated Alcaligenes faecalis JF339228 from Durgapur steel industry (DSP), India. About 18 experiments were conducted with a different combination of factors and the results obtained in terms of growth of specific bacterial strain and phenol degradation rates were processed in the Qualitek-4 software to study the main effect of individual factors. The main effect, interaction effects and optimal levels of the process factors were determined using signal-to-noise (S/N) ratio. The effect of factors has been studied for bacterial growth and phenol degradation by A. faecalis JF339228. Optimization of the said parameters has been evaluated by Taguchi method and analysed by analysis of variance. Predicted results showed enhanced process performance such as biomass (131.78%) and ...

38 citations

Journal ArticleDOI
TL;DR: In this article, a "waste treats waste" strategy for the bioremediation of paper mill effluent in fluidized bed reactor (FBR) using another waste of the same industry, PMS as immobilizing matrix for Planococcus sp.

31 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This survey starts by providing an overview and fundamental of fog computing architecture, and provides an extensive overview of state-of-the-art network applications and major research aspects to design these networks.
Abstract: Fog computing is an emerging paradigm that extends computation, communication, and storage facilities toward the edge of a network. Compared to traditional cloud computing, fog computing can support delay-sensitive service requests from end-users (EUs) with reduced energy consumption and low traffic congestion. Basically, fog networks are viewed as offloading to core computation and storage. Fog nodes in fog computing decide to either process the services using its available resource or send to the cloud server. Thus, fog computing helps to achieve efficient resource utilization and higher performance regarding the delay, bandwidth, and energy consumption. This survey starts by providing an overview and fundamental of fog computing architecture. Furthermore, service and resource allocation approaches are summarized to address several critical issues such as latency, and bandwidth, and energy consumption in fog computing. Afterward, compared to other surveys, this paper provides an extensive overview of state-of-the-art network applications and major research aspects to design these networks. In addition, this paper highlights ongoing research effort, open challenges, and research trends in fog computing.

475 citations

Journal ArticleDOI
08 Apr 2018
TL;DR: The state-of-the-art of fog computing and its integration with the IoT is presented by highlighting the benefits and implementation challenges and the architecture of the fog and emerging IoT applications that will be improved by using the fog model are focused on.
Abstract: With the rapid growth of Internet of Things (IoT) applications, the classic centralized cloud computing paradigm faces several challenges such as high latency, low capacity and network failure. To address these challenges, fog computing brings the cloud closer to IoT devices. The fog provides IoT data processing and storage locally at IoT devices instead of sending them to the cloud. In contrast to the cloud, the fog provides services with faster response and greater quality. Therefore, fog computing may be considered the best choice to enable the IoT to provide efficient and secure services for many IoT users. This paper presents the state-of-the-art of fog computing and its integration with the IoT by highlighting the benefits and implementation challenges. This review will also focus on the architecture of the fog and emerging IoT applications that will be improved by using the fog model. Finally, open issues and future research directions regarding fog computing and the IoT are discussed.

410 citations

Journal ArticleDOI
TL;DR: It is pointed out that the integration of the FC and IoE paradigms may give rise to opportunities for new applications in the realms of the IoE, Smart City, Industry 4.0, and Big Data Streaming while introducing new open issues.
Abstract: Fog computing (FC) and Internet of Everything (IoE) are two emerging technological paradigms that, to date, have been considered standing-alone. However, because of their complementary features, we expect that their integration can foster a number of computing and network-intensive pervasive applications under the incoming realm of the future Internet. Motivated by this consideration, the goal of this position paper is fivefold. First, we review the technological attributes and platforms proposed in the current literature for the standing-alone FC and IoE paradigms. Second, by leveraging some use cases as illustrative examples, we point out that the integration of the FC and IoE paradigms may give rise to opportunities for new applications in the realms of the IoE, Smart City, Industry 4.0, and Big Data Streaming, while introducing new open issues. Third, we propose a novel technological paradigm, the Fog of Everything (FoE) paradigm, that integrates FC and IoE and then we detail the main building blocks and services of the corresponding technological platform and protocol stack. Fourth, as a proof-of-concept, we present the simulated energy-delay performance of a small-scale FoE prototype, namely, the V-FoE prototype. Afterward, we compare the obtained performance with the corresponding one of a benchmark technological platform, e.g., the V-D2D one. It exploits only device-to-device links to establish inter-thing “ad hoc” communication. Last, we point out the position of the proposed FoE paradigm over a spectrum of seemingly related recent research projects.

267 citations

Journal ArticleDOI
01 Dec 2017
TL;DR: The impact of security issues and possible solutions are determined, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems.
Abstract: Fog computing is a new paradigm that extends the Cloud platform model by providing computing resources on the edges of a network. It can be described as a cloud-like platform having similar data, computation, storage and application services, but is fundamentally different in that it is decentralized. In addition, Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on heterogeneous hardware. These features make the Fog platform highly suitable for time and location-sensitive applications. For example, Internet of Things (IoT) devices are required to quickly process a large amount of data. This wide range of functionality driven applications intensifies many security issues regarding data, virtualization, segregation, network, malware and monitoring. This paper surveys existing literature on Fog computing applications to identify common security gaps. Similar technologies like Edge computing, Cloudlets and Micro-data centres have also been included to provide a holistic review process. The majority of Fog applications are motivated by the desire for functionality and end-user requirements, while the security aspects are often ignored or considered as an afterthought. This paper also determines the impact of those security issues and possible solutions, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems.

267 citations

Journal ArticleDOI
TL;DR: A conceptual smart pre-copy live migration approach is presented for VM migration that can estimate the downtime after each iteration to determine whether to proceed to the stop-and-copy stage during a system failure or an attack on a fog computing node.
Abstract: Fog computing, an extension of cloud computing services to the edge of the network to decrease latency and network congestion, is a relatively recent research trend. Although both cloud and fog offer similar resources and services, the latter is characterized by low latency with a wider spread and geographically distributed nodes to support mobility and real-time interaction. In this paper, we describe the fog computing architecture and review its different services and applications. We then discuss security and privacy issues in fog computing, focusing on service and resource availability. Virtualization is a vital technology in both fog and cloud computing that enables virtual machines (VMs) to coexist in a physical server (host) to share resources. These VMs could be subject to malicious attacks or the physical server hosting it could experience system failure, both of which result in unavailability of services and resources. Therefore, a conceptual smart pre-copy live migration approach is presented for VM migration. Using this approach, we can estimate the downtime after each iteration to determine whether to proceed to the stop-and-copy stage during a system failure or an attack on a fog computing node. This will minimize both the downtime and the migration time to guarantee resource and service availability to the end users of fog computing. Last, future research directions are outlined.

257 citations