STC Sample Report
STC Sample Report
ON
OF
BACHELOR OF ENGINEERING
(COMPUTER ENGINEERING)
BY
2020-21
1
CERTIFICATE
Submitted by
Dr.R.V.Bhortake
Principal
Place : Pune
Date : 12/06/2021
I
ACKNOWLEDGEMENT
I am thankful to our H.O.D. S.G.Rathod and all other professors and non-
teaching staff of computer engineering department for their timely cooperation
and helpful guidance during the development seminar-II report.
II
Contents
1 INTRODUCTION VII
1.1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . VII
1.2 NEED . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . VII
1.3 MOTIVATION . . . . . . . . . . . . . . . . . . . . . . . . . . VII
1.4 BACKGROUND . . . . . . . . . . . . . . . . . . . . . . . . . VIII
2 LITERATURE SURVEY IX
4 ARCHITECTURE XII
4.1 SYSTEM ARCHITECTURE . . . . . . . . . . . . . . . . . . XII
4.2 TERMINOLOGY . . . . . . . . . . . . . . . . . . . . . . . . . XII
4.2.1 How fog computing works . . . . . . . . . . . . . . . . XII
4.2.2 Bandwidth conservation . . . . . . . . . . . . . . . . . XII
4.2.3 Improved response time. . . . . . . . . . . . . . . . . . XIV
4.2.4 Network-agnostic. . . . . . . . . . . . . . . . . . . . . . XIV
4.2.5 Physical location. . . . . . . . . . . . . . . . . . . . . . XIV
4.2.6 Potential security issues. . . . . . . . . . . . . . . . . . XIV
4.2.7 Startup costs . . . . . . . . . . . . . . . . . . . . . . . XIV
4.2.8 Ambiguous concept . . . . . . . . . . . . . . . . . . . . XIV
5 RESULT ANALYSIS XV
5.1 DATASET USED . . . . . . . . . . . . . . . . . . . . . . . . . XV
5.2 RESULT ANALYSIS . . . . . . . . . . . . . . . . . . . . . . . XV
III
6.2 DISADVANTAGES . . . . . . . . . . . . . . . . . . . . . . . . XVII
6.3 APPLICATIONS . . . . . . . . . . . . . . . . . . . . . . . . . XVII
6.3.1 SURGE PRICE . . . . . . . . . . . . . . . . . . . . . . XVIII
6.3.2 MATCHING ALGORITHM . . . . . . . . . . . . . . . XVIII
6.3.3 FARE ESTIMATES . . . . . . . . . . . . . . . . . . . XVIII
7 CONCLUSION XIX
7.1 CONCLUSION . . . . . . . . . . . . . . . . . . . . . . . . . . XIX
8 REFERENCES XX
IV
List of Figures
0
[]
ABSTRACT
VI
Chapter 1
INTRODUCTION
1.1 INTRODUCTION
Data Science is an interdisciplinary field about processes and systems to
extract knowledge or insights from large volumes of data in various forms
either structured or unstructured, which is a continuation of some of the
data analysis fields such as data mining and predictive analytics, as well as
knowledge discovery and data mining (KDD). Data Science is about turning
data into insights[4].Business Intelligence is concerned with the process of
transforming data into insights.
1.2 NEED
Cloud computing allows people access to the same kinds of applications
through the internet. ... This means the device accessing the cloud doesn’t
need to work as hard. By hosting software, platforms, and databases re-
motely, the cloud servers free up the memory and computing power of indi-
vidual computers.
1.3 MOTIVATION
CISCO recently delivered the vision of fog computing to enable applica-
tions on billions of connected devices,already connected in the Internet of
Things(IoT),to run directly at the network edge[1].Customers can develop,
manage and run software application on Cisco IOx framework of networked
devices, including hardened routers, switches and IP video cameras. Cisco
IOx framework of networked devices, including hardened routers. Cloud
VII
computing has become the buzz word during the recent years. But it largely
depends on servers which are available in a remote location, resulting in
slow response time and scalability plays a crucial role in machine to ma-
chine communication and services[6]. The edge computing platform solves
the problems by the simple idea of locating small servers called edges servers
in the vicinity of the users and devices and passing to the servers some of
the load of center servers or userÄôs devices.
1.4 BACKGROUND
Fog computing has its origins as an extension of cloud computing, which is
the paradigm to have the data, storage and applications on a distant server,
and not hosted locally.
VIII
Chapter 2
LITERATURE SURVEY
IX
Xseeks to inform and make decision makers aware of the real pertinent
and justified security issues within cloud computingÄù.
X
Chapter 3
PROBLEM DEFINITION
AND SCOPE
3.2 SCOPE
Fog computing acts as a companion to a cloud as it supports in handling
time-sensitive data locally Äı̀ at the edge of the network[5]. Processing the
data closer to where it originated helps keep the storage and processing needs
of the core processing center low while making processes much quicker.
3.3 OBJECTIVE
The most important goal of fog computing is to improve efficiency and reduce
the amount of data that needs to be transported to the cloud for processing,
analysis and storage[1]. Although this is mostly done for efficiency reasons,
it can also be done for security and compliance reasons.
XI
Chapter 4
ARCHITECTURE
The diagram represents how clouds works,and how we can use fog computing
with the help of nodes.
4.2 TERMINOLOGY
4.2.1 How fog computing works
Fog networking complements – doesn’t replace – cloud computing; fogging
enables short-term analytics at the edge, while the cloud performs resource-
intensive, longer-term analytics. Although edge devices and sensors are where
data is generated and collected, they sometimes don’t have the compute and
storage resources to perform advanced analytics and machine learning tasks.
Though cloud servers have the power to do this, they are often too far away
to process the data and respond in a timely manner.
XII
Figure 4.1: System Architecture
XIII
4.2.3 Improved response time.
Because the initial data processing occurs near the data, latency is reduced,
and overall responsiveness is improved. The goal is to provide millisecond-
level responsiveness, enabling data to be processed in near-real time.
4.2.4 Network-agnostic.
Although fog computing generally places compute resources at the LAN level
– as opposed to the device level, which is the case with edge computing – the
network could be considered part of the fog computing architecture. At the
same time, though, fog computing is network-agnostic in the sense that the
network can be wired, Wi-Fi or even 5G.
XIV
Chapter 5
RESULT ANALYSIS
XV
machine learning model more efficient.These machine models can be used in
many applications to boost the companies
XVI
Chapter 6
ADVANTAGES
DISADVANTAGES
6.1 ADVANTAGES
• Fog computing provides better computing expercience.
6.2 DISADVANTAGES
• Existing data protection mechanisms such as encryption was failed in
securing the data from the attackers.
• Does not focus on ways of secure the data from unauthorized access.
6.3 APPLICATIONS
In a cloud-based management system, Fog Computing functions better to
provide control and deeper analysis across a variety of nodes. Wind elec-
tricity, transportation, smart cities, security, and smart buildings are among
others[2].
XVII
6.3.1 SURGE PRICE
To create the most efficient market and maximize the number of rides it
can provide Äı̀cab services uses surge pricing.Data Science is at the heart
of Cab services’s surge pricing algorithm[8].Data science methodologies are
extensively used to analyse the short term effects of surge pricing on customer
demand and long term effects of surge pricing on retaining customers[9]. Cab
services depends on regression analysis to find out which neighbourhoods will
be the busiest so it can activate surge pricing to get more drivers on the
roads[9].
XVIII
Chapter 7
CONCLUSION
7.1 CONCLUSION
In this work, we proposed a low-cost, Flexible system which will find out dif
ferent parameters like Low power, Low latency,Mobility,Security, and Better
computing experience.
XIX
Chapter 8
REFERENCES
XX