International Journal of Pervasive Computing and Communications
Issue(s) available: 75 – From Volume: 1 Issue: 1, to Volume: 19 Issue: 2

Real-time optimal protocol prediction of quantum key distribution using machine learning
Arthi R., Nayana J. S., Rajarshee MondalThe purpose of optimal protocol prediction and the benefits offered by quantum key distribution (QKD), including unbreakable security, there is a growing interest in the…
Performance analysis of edge, fog and cloud computing paradigms for real-time video quality assessment and phishing detection
Tulsi Pawan Fowdur, M.A.N. Shaikh Abdoolla, Lokeshwar DooburThe purpose of this paper is to perform a comparative analysis of the delay associated in running two real-time machine learning-based applications, namely, a video…
Utilization and criticality based fault-tolerant scheduling in multicore mixed critical systems
Preeti Godabole, Girish BholeThe main purpose of the paper is timing analysis of mixed critical applications on the multicore system to identify an efficient task scheduling mechanism to achieve three…
Air quality measurement, prediction and warning using transfer learning based IOT system for ambient assisted living
Shilpa Sonawani, Kailas PatilIndoor air quality monitoring is extremely important in urban, industrial areas. Considering the devastating effect of declining quality of air in major part of the…
Weighted ensemble classifier for malicious link detection using natural language processing
Saleem Raja A., Sundaravadivazhagan Balasubaramanian, Pradeepa Ganesan, Justin Rajasekaran, Karthikeyan R.The internet has completely merged into contemporary life. People are addicted to using internet services for everyday activities. Consequently, an abundance of…
A systematic study on the challenges, characteristics and security issues in vehicular networks
Faisal Lone, Harsh Kumar Verma, Krishna Pal SharmaThe purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these…
Optimized security algorithm for connected vehicular network
Deepak ChoudharyAs the number of devices that connect to the Internet of Things (IoT) has grown, privacy and security issues have come up. Because IoT devices collect so much sensitive…
Detection IoT attacks using Lasso regression algorithm with ensemble classifier
K.V. Sheelavathy, V. Udaya RaniInternet of Things (IoT) is a network, which provides the connection with various physical objects such as smart machines, smart home appliance and so on. The physical…
Embedding and Siamese deep neural network-based malware detection in Internet of Things
T. Sree Lakshmi, M. Govindarajan, Asadi SrinivasuluA proper understanding of malware characteristics is necessary to protect massive data generated because of the advances in Internet of Things (IoT), big data and the…
AI federated learning based improvised random Forest classifier with error reduction mechanism for skewed data sets
Anjali More, Dipti RanaReferred data set produces reliable information about the network flows and common attacks meeting with real-world criteria. Accordingly, this study aims to focus on the…
Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data
Mohan Naik R., H. Manoj T. Gadiyar, Sharath S. M., M. Bharathrajkumar, Sowmya T. K.There are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and…
LMH-RPL: a load balancing and mobility aware secure hybrid routing protocol for low power lossy network
Robin Cyriac, Saleem Durai M.A.Routing protocol for low-power lossy network (RPL) being the de facto routing protocol used by low power lossy networks needs to provide adequate routing service to mobile…
Enhanced gray wolf optimization for estimation of time difference of arrival in WSNs
Devika E., Saravanan A.Intelligent prediction of node localization in wireless sensor networks (WSNs) is a major concern for researchers. The huge amount of data generated by modern sensor array…
IoT-based multimodal liveness detection using the fusion of ECG and fingerprint
Anil Kumar Gona, Subramoniam M.Biometric scans using fingerprints are widely used for security purposes. Eventually, for authentication purposes, fingerprint scans are not very reliable because they can…
Improving GPU performance in multimedia applications through FPGA based adaptive DMA controller
Santosh Kumar B., Krishna Kumar E.Deep learning techniques are unavoidable in a variety of domains such as health care, computer vision, cyber-security and so on. These algorithms demand high data…
A secure IoT and edge computing based EV selection model in V2G systems using ant colony optimization algorithm
Gopinath Anjinappa, Divakar Bangalore PrabhakarThe fluctuations that occurred between the power requirements have shown a higher range of voltage regulations and frequency. The fluctuations are caused because of…
Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators
Souad El Houssaini, Mohammed-Alamine El Houssaini, Jamal El KafiIn vehicular ad hoc networks (VANETs), the information transmitted is broadcast in a free access environment. Therefore, VANETs are vulnerable against attacks that can…
An approach for DoS attack detection in cloud computing using sine cosine anti coronavirus optimized deep maxout network
Mythili Boopathi, Meena Chavan, Jeneetha Jebanazer J., Sanjay Nakharu Prasad KumarThe Denial of Service (DoS) attack is a category of intrusion that devours various services and resources of the organization by the dispersal of unusable traffic, so that…
A load-balanced hybrid heuristic for allocation of batch of tasks in cloud computing environment
Sophiya Shiekh, Mohammad Shahid, Manas Sambare, Raza Abbas Haidri, Dileep Kumar YadavCloud computing gives several on-demand infrastructural services by dynamically pooling heterogeneous resources to cater to users’ applications. The task scheduling needs…
Source location privacy preservation in IoT-enabled event-driven WSNs
Nidhi Sharma, Ravindara BhattPrivacy preservation is a significant concern in Internet of Things (IoT)-enabled event-driven wireless sensor networks (WSNs). Low energy utilization in the event-driven…
ElGamal algorithm with hyperchaotic sequence to enhance security of cloud data
Aruna Kumari Koppaka, Vadlamani Naga LakshmiIn the cloud-computing environment, privacy preservation and enabling security to the cloud data is a crucial and demanding task. In both the commercial and academic…
Federate learning on Web browsing data with statically and machine learning technique
Ratnmala Nivrutti Bhimanpallewar, Sohail Imran Khan, K. Bhavana Raj, Kamal Gulati, Narinder Bhasin, Roop RajFederation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated…
Performance analysis of a cloud-based network analytics system with multiple-source data aggregation
Tulsi Pawan Fowdur, Lavesh BabooramThe purpose of this paper is geared towards the capture and analysis of network traffic using an array ofmachine learning (ML) and deep learning (DL) techniques to…
The relative importance of click-through rates (CTR) versus watch time for YouTube views
Linus T. WilsonThis study aims to analyze whether average video watch time or click-through rates (CTR) on YouTube videos are more closely associated with high numbers of views per…
IIBES: a proposed framework to improve the identity-based encryption system for securing federated learning
Maitri Patel, Rajan Patel, Nimisha Patel, Parita Shah, Kamal GulatiIn the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire…
Development of cloud selection supporting model for green information and communication technology services
Sanjiv Rao Godla, Jara Muda Haro, S.V.V.S.N. Murty Ch, R.V.V. KrishnaThe purpose of the study is to develop a cloud supporting model for green computing. In today's contemporary world, information technology (IT) plays a significant role…
Contact tracing and mobility pattern detection during pandemics – a trajectory cluster based approach
Nishad A., Sajimon AbrahamA wide number of technologies are currently in store to harness the challenges posed by pandemic situations. As such diseases transmit by way of person-to-person contact…
Secure data collection and transmission for IoMT architecture integrated with federated learning
Priyanka Kumari Bhansali, Dilendra Hiran, Kamal GulatiThe purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact…
Energy efficient multi-tasking for edge computing using federated learning
Mukesh Soni, Nihar Ranjan Nayak, Ashima Kalra, Sheshang Degadwala, Nikhil Kumar Singh, Shweta SinghThe purpose of this paper is to improve the existing paradigm of edge computing to maintain a balanced energy usage.
Federate learning of corporate social authority and industry 4.0 that focus on young people: a strategic management framework for human resources
V.P. Sriram, M.A. Sikandar, Eti Khatri, Somya Choubey, Ity Patni, Lakshminarayana K., Kamal GulatiThe young population of the globe is defined by individuals aged 15 to 24 years. Based on statistics from the Instituto Brasileiro de Geografia e Estatística (IBGE), the…
Trusted routing protocol for federated UAV ad hoc network
Elham Kariri, Kusum YadavIn the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for…
A framework for measuring the adoption factors in digital mobile payments in the COVID-19 era
Devid Jegerson, Matloub HussainThis study aims to identify the acceptance factors in the UAE for the digital mobile payment market, introduces a new hierarchical framework based on the continuation…
Cloud-based secure data storage and access control for internet of medical things using federated learning
Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari, Kamal GulatiThe purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and…
A new federated genetic algorithm-based optimization technique for multi-criteria vehicle route planning using ArcGIS network analyst
Da’ad Ahmad Albalawneh, M.A. MohamedUsing a real-time road network combined with historical traffic data for Al-Salt city, the paper aims to propose a new federated genetic algorithm (GA)-based optimization…
Hybrid cumulative approach for localization of nodes with adaptive threshold gradient feature on energy minimization using federated learning
Adumbabu I., K. SelvakumarLocalization of the nodes is crucial for gaining access of different nodes which would provision in extreme areas where networks are unreachable. The feature of…
An optimized and efficient multiuser data sharing using the selection scheme design secure approach and federated learning in cloud environment
Shubangini Patil, Rekha PatilUntil now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…
Federated learning algorithm based on matrix mapping for data privacy over edge computing
Pradyumna Kumar Tripathy, Anurag Shrivastava, Varsha Agarwal, Devangkumar Umakant Shah, Chandra Sekhar Reddy L., S.V. AkilandeeswariThis paper aims to provide the security and privacy for Byzantine clients from different types of attacks.
AI-federated novel delay-aware link-scheduling for Industry 4.0 applications in IoT networks
Suvarna Abhijit Patil, Prasad Kishor GokhaleWith the advent of AI-federated technologies, it is feasible to perform complex tasks in industrial Internet of Things (IIoT) environment by enhancing throughput of the…
A novel federated learning based lightweight sustainable IoT approach to identify abnormal traffic
Yasser AlharbiThis strategy significantly reduces the computational overhead and storage overhead required when using the kernel density estimation method to calculate the abnormal…
A novel Internet of Things and federated learning-based privacy protection in blockchain technology
Shoayee Dlaim AlotaibiBe that as it may, BC is computationally costly, has restricted versatility and brings about critical transmission capacity upward and postpones, those seems not to be fit…
Video compression based on zig-zag 3D DCT and run-length encoding for multimedia communication systems
Sravanthi Chutke, Nandhitha N.M., Praveen Kumar LendaleWith the advent of technology, a huge amount of data is being transmitted and received through the internet. Large bandwidth and storage are required for the exchange of…
Context-aware behaviour prediction for autonomous driving: a deep learning approach
Syama R., Mala C.This paper aims to predict the behaviour of the vehicles in a mixed driving scenario. This proposes a deep learning model to predict lane-changing scenarios in highways…
Human activity recognition in WBAN using ensemble model
Jayaram Boga, Dhilip Kumar V.For achieving the profitable human activity recognition (HAR) method, this paper solves the HAR problem under wireless body area network (WBAN) using a developed ensemble…
Machine learning based pervasive analytics for ECG signal analysis
Aarathi S., Vasundra S.Pervasive analytics act as a prominent role in computer-aided prediction of non-communicating diseases. In the early stage, arrhythmia diagnosis detection helps prevent…
Energy-aware multipath routing in WSN using improved invasive weed elephant herd optimization
Hingmire Vishal Sharad, Santosh R. Desai, Kanse Yuvraj KrishnraoIn a wireless sensor network (WSN), the sensor nodes are distributed in the network, and in general, they are linked through wireless intermediate to assemble physical…
A pervasive health care device computing application for brain tumors with machine and deep learning techniques
Sreelakshmi D., Syed InthiyazPervasive health-care computing applications in medical field provide better diagnosis of various organs such as brain, spinal card, heart, lungs and so on. The purpose of…
Sentiment analysis in aspect term extraction for mobile phone tweets using machine learning techniques
Venkatesh Naramula, Kalaivania A.This paper aims to focus on extracting aspect terms on mobile phone (iPhone and Samsung) tweets using NLTK techniques on multiple aspect extraction is one of the…
Wearable IoT based diagnosis of prostate cancer using GLCM-multiclass SVM and SIFT-multiclass SVM feature extraction strategies
Swetha Parvatha Reddy Chandrasekhara, Mohan G. Kabadi, SrivinayThis study has mainly aimed to compare and contrast two completely different image processing algorithms that are very adaptive for detecting prostate cancer using…
Context–aware assistive driving: an overview of techniques for mitigating the risks of driver in real-time driving environment
Shilpa Gite, Ketan Kotecha, Gheorghita GhineaThis study aims to analyze driver risks in the driving environment. A complete analysis of context aware assistive driving techniques. Context awareness in assistive…
Automatic diseases detection and classification of EEG signal with pervasive computing using machine learning
Rajashekhar U., Neelappa , Harish H.M.The natural control, feedback, stimuli and protection of these subsequent principles founded this project. Via properly conducted experiments, a multilayer computer…
A novel approach for detection and classification of re-entrant crack using modified CNNetwork
Shadrack Fred Mahenge, Ala AlsanabaniIn the purpose of the section, the cracks that are in the construction domain may be common and usually fixed with the human inspection which is at the visible range, but…
A framework for scheduling IoT application jobs on fog computing infrastructure based on QoS parameters
Mandeep Kaur, Rajinder Sandhu, Rajni MohanaThe purpose of this study is to verify that if applications categories are segmented and resources are allocated based on their specific category, how effective scheduling…
OPC UA TSN: a next-generation network for Industry 4.0 and IIoT
Hristo Trifonov, Donal HeffernanThe purpose of this paper is to describe how emerging open standards are replacing traditional industrial networks. Current industrial Ethernet networks are not…
FHSA: fractional harmony search algorithm for polyphase code design in radar signal processing
Sirasani Srinivasa Rao, Subba Ramaiah V.The purpose of this research is to design and develop a technique for polyphase code design for the radar system.
Classification of disordered patient’s voice by using pervasive computational algorithms
Anil Kumar Maddali, Habibulla KhanCurrently, the design, technological features of voices, and their analysis of various applications are being simulated with the requirement to communicate at a greater…
A qualitative study proposing service quality dimensions for video-on-demand services through over-the-top medium
Satyaki Datta, UtkarshThe behaviour of audience, consuming video entertainment, has changed intensely over the years. Lately, the consumers have increasingly preferred to watch video programs…
A lightweight and flexible mutual authentication and key agreement protocol for wearable sensing devices in WBAN
Sandeep Kumar Reddy Thota, C. Mala, Geetha KrishnanA wireless body area network (WBAN) is a collection of sensing devices attached to a person’s body that is typically used during health care to track their physical state…
Network traffic analysis through deep learning for detection of an army of bots in health IoT network
Geetha K., Brahmananda S.H.IoT has a wide range of applications in the health-care sector and has captured the interest of many academic and industrial communities. The health IoT devices suffer…
A distributed quality of service-enabled load balancing approach for cloud environment
Minakshi Sharma, Rajneesh Kumar, Anurag JainDuring high demand for the virtualized resources in cloud environment, efficient task scheduling achieves the desired performance criteria by balancing the load in the system.
QoS aware web service selection using orthogonal array learning on fruit fly optimization approach
Manik Chandra, Rajdeep NiyogiThis paper aims to solve the web service selection problem using an efficient meta-heuristic algorithm. The problem of selecting a set of web services from a large-scale…
Telemedicine system using mobile internet communication
Saravanan S., Sudhakar P.Telemedicine is delivered to patient anywhere during emergency treatment care, and medical information is transferred from one site of patient to another site of…
ISSN:
1742-7371Online date, start – end:
2005Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- George Ghinea