International Journal of Pervasive Computing and Communications
Issue(s) available: 80 – From Volume: 1 Issue: 1, to Volume: 20 Issue: 2
Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data
Mohan Naik R., H. Manoj T. Gadiyar, Sharath S. M., M. Bharathrajkumar, Sowmya T. K.There are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in…
LMH-RPL: a load balancing and mobility aware secure hybrid routing protocol for low power lossy network
Robin Cyriac, Saleem Durai M.A.Routing protocol for low-power lossy network (RPL) being the de facto routing protocol used by low power lossy networks needs to provide adequate routing service to mobile nodes…
Enhanced gray wolf optimization for estimation of time difference of arrival in WSNs
Devika E., Saravanan A.Intelligent prediction of node localization in wireless sensor networks (WSNs) is a major concern for researchers. The huge amount of data generated by modern sensor array systems…
Improving GPU performance in multimedia applications through FPGA based adaptive DMA controller
Santosh Kumar B., Krishna Kumar E.Deep learning techniques are unavoidable in a variety of domains such as health care, computer vision, cyber-security and so on. These algorithms demand high data transfers but…
A secure IoT and edge computing based EV selection model in V2G systems using ant colony optimization algorithm
Gopinath Anjinappa, Divakar Bangalore PrabhakarThe fluctuations that occurred between the power requirements have shown a higher range of voltage regulations and frequency. The fluctuations are caused because of substantial…
Weighted ensemble classifier for malicious link detection using natural language processing
Saleem Raja A., Sundaravadivazhagan Balasubaramanian, Pradeepa Ganesan, Justin Rajasekaran, Karthikeyan R.The internet has completely merged into contemporary life. People are addicted to using internet services for everyday activities. Consequently, an abundance of information about…
Detection IoT attacks using Lasso regression algorithm with ensemble classifier
K.V. Sheelavathy, V. Udaya RaniInternet of Things (IoT) is a network, which provides the connection with various physical objects such as smart machines, smart home appliance and so on. The physical objects are…
Embedding and Siamese deep neural network-based malware detection in Internet of Things
T. Sree Lakshmi, M. Govindarajan, Asadi SrinivasuluA proper understanding of malware characteristics is necessary to protect massive data generated because of the advances in Internet of Things (IoT), big data and the cloud…
ElGamal algorithm with hyperchaotic sequence to enhance security of cloud data
Aruna Kumari Koppaka, Vadlamani Naga LakshmiIn the cloud-computing environment, privacy preservation and enabling security to the cloud data is a crucial and demanding task. In both the commercial and academic world, the…
Federate learning on Web browsing data with statically and machine learning technique
Ratnmala Nivrutti Bhimanpallewar, Sohail Imran Khan, K. Bhavana Raj, Kamal Gulati, Narinder Bhasin, Roop RajFederation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information…
AI federated learning based improvised random Forest classifier with error reduction mechanism for skewed data sets
Anjali More, Dipti RanaReferred data set produces reliable information about the network flows and common attacks meeting with real-world criteria. Accordingly, this study aims to focus on the use of…
IIBES: a proposed framework to improve the identity-based encryption system for securing federated learning
Maitri Patel, Rajan Patel, Nimisha Patel, Parita Shah, Kamal GulatiIn the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire certificates…
Development of cloud selection supporting model for green information and communication technology services
Sanjiv Rao Godla, Jara Muda Haro, S.V.V.S.N. Murty Ch, R.V.V. KrishnaThe purpose of the study is to develop a cloud supporting model for green computing. In today's contemporary world, information technology (IT) plays a significant role. Because…
Secure data collection and transmission for IoMT architecture integrated with federated learning
Priyanka Kumari Bhansali, Dilendra Hiran, Kamal GulatiThe purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with…
A pervasive health care device computing application for brain tumors with machine and deep learning techniques
Sreelakshmi D., Syed InthiyazPervasive health-care computing applications in medical field provide better diagnosis of various organs such as brain, spinal card, heart, lungs and so on. The purpose of this…
IoT-based multimodal liveness detection using the fusion of ECG and fingerprint
Anil Kumar Gona, Subramoniam M.Biometric scans using fingerprints are widely used for security purposes. Eventually, for authentication purposes, fingerprint scans are not very reliable because they can be…
Energy efficient multi-tasking for edge computing using federated learning
Mukesh Soni, Nihar Ranjan Nayak, Ashima Kalra, Sheshang Degadwala, Nikhil Kumar Singh, Shweta SinghThe purpose of this paper is to improve the existing paradigm of edge computing to maintain a balanced energy usage.
Sentiment analysis in aspect term extraction for mobile phone tweets using machine learning techniques
Venkatesh Naramula, Kalaivania A.This paper aims to focus on extracting aspect terms on mobile phone (iPhone and Samsung) tweets using NLTK techniques on multiple aspect extraction is one of the challenges. Then…
Federate learning of corporate social authority and industry 4.0 that focus on young people: a strategic management framework for human resources
V.P. Sriram, M.A. Sikandar, Eti Khatri, Somya Choubey, Ity Patni, Lakshminarayana K., Kamal GulatiThe young population of the globe is defined by individuals aged 15 to 24 years. Based on statistics from the Instituto Brasileiro de Geografia e Estatística (IBGE), the second…
A novel approach for detection and classification of re-entrant crack using modified CNNetwork
Shadrack Fred Mahenge, Ala AlsanabaniIn the purpose of the section, the cracks that are in the construction domain may be common and usually fixed with the human inspection which is at the visible range, but for the…
Hybrid cumulative approach for localization of nodes with adaptive threshold gradient feature on energy minimization using federated learning
Adumbabu I., K. SelvakumarLocalization of the nodes is crucial for gaining access of different nodes which would provision in extreme areas where networks are unreachable. The feature of localization of…
An optimized and efficient multiuser data sharing using the selection scheme design secure approach and federated learning in cloud environment
Shubangini Patil, Rekha PatilUntil now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…
Classification of disordered patient’s voice by using pervasive computational algorithms
Anil Kumar Maddali, Habibulla KhanCurrently, the design, technological features of voices, and their analysis of various applications are being simulated with the requirement to communicate at a greater distance…
A lightweight and flexible mutual authentication and key agreement protocol for wearable sensing devices in WBAN
Sandeep Kumar Reddy Thota, C. Mala, Geetha KrishnanA wireless body area network (WBAN) is a collection of sensing devices attached to a person’s body that is typically used during health care to track their physical state. This…
Federated learning algorithm based on matrix mapping for data privacy over edge computing
Pradyumna Kumar Tripathy, Anurag Shrivastava, Varsha Agarwal, Devangkumar Umakant Shah, Chandra Sekhar Reddy L., S.V. AkilandeeswariThis paper aims to provide the security and privacy for Byzantine clients from different types of attacks.
AI-federated novel delay-aware link-scheduling for Industry 4.0 applications in IoT networks
Suvarna Abhijit Patil, Prasad Kishor GokhaleWith the advent of AI-federated technologies, it is feasible to perform complex tasks in industrial Internet of Things (IIoT) environment by enhancing throughput of the network…
A novel federated learning based lightweight sustainable IoT approach to identify abnormal traffic
Yasser AlharbiThis strategy significantly reduces the computational overhead and storage overhead required when using the kernel density estimation method to calculate the abnormal evaluation…
A novel Internet of Things and federated learning-based privacy protection in blockchain technology
Shoayee Dlaim AlotaibiBe that as it may, BC is computationally costly, has restricted versatility and brings about critical transmission capacity upward and postpones, those seems not to be fit with…
Video compression based on zig-zag 3D DCT and run-length encoding for multimedia communication systems
Sravanthi Chutke, Nandhitha N.M., Praveen Kumar LendaleWith the advent of technology, a huge amount of data is being transmitted and received through the internet. Large bandwidth and storage are required for the exchange of data and…
ISSN:
1742-7371Online date, start – end:
2005Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Lizzy Seal