Books and journals Case studies Expert Briefings Open Access
Advanced search

International Journal of Pervasive Computing and Communications

Issue(s) available: 63 – From Volume: 1 Issue: 1, to Volume: 16 Issue: 5

Category:

Information and Knowledge Management

Cover of International Journal of Pervasive Computing and Communications
  • All issues
  • EarlyCite

Volume 16

  • Issue 5 2020
  • Issue 4 2020 Mobile and Sensor-Based Technology During the Coronavirus Pandemic
  • Issue 3 2020
  • Issue 2 2020
  • Issue 1 2020

Volume 15

  • Issue 3/4 2019
  • Issue 2 2019
  • Issue 1 2019

Volume 14

  • Issue 3/4 2018
  • Issue 2 2018
  • Issue 1 2018

Volume 13

  • Issue 4 2017
  • Issue 3 2017
  • Issue 2 2017
  • Issue 1 2017

Volume 12

  • Issue 4 2016
  • Issue 3 2016
  • Issue 2 2016
  • Issue 1 2016

Volume 11

  • Issue 4 2015
  • Issue 3 2015
  • Issue 2 2015 Best papers from the 16th International Conference on Information Integration and Web-based Applications & Services (iiWAS2014)
  • Issue 1 2015

Volume 10

  • Issue 4 2014
  • Issue 3 2014
  • Issue 2 2014
  • Issue 1 2014 The confluence and synergy of mobile computing and multimedia with pervasive computing and communication

Volume 9

  • Issue 4 2013
  • Issue 3 2013
  • Issue 2 2013
  • Issue 1 2013

Volume 8

  • Issue 4 2012
  • Issue 3 2012
  • Issue 2 2012
  • Issue 1 2012

Volume 7

  • Issue 4 2011
  • Issue 3 2011
  • Issue 2 2011
  • Issue 1 2011

Volume 6

  • Issue 4 2010
  • Issue 3 2010
  • Issue 2 2010 Advances in ubiquitous networking and intelligent systems
  • Issue 1 2010

Volume 5

  • Issue 4 2009 Ordered communication in ad hoc networks
  • Issue 3 2009 Resource allocation and management in wireless mesh networks
  • Issue 2 2009 Smart services in smart worlds
  • Issue 1 2009 Advances in pervasive computing

Volume 4

  • Issue 4 2008 Towards merging grid and pervasive computing
  • Issue 3 2008 Wireless sensor networks and mobile services
  • Issue 2 2008 Recent advances in ubiquitous computing
  • Issue 1 2008 Recent advances in wireless communication technologies for ubiquitous computing

Volume 3

  • Issue 4 2007 Managing context information in mobile and pervasive environments
  • Issue 3 2007 Mobile ad hoc networks
  • Issue 2 2007 Computer and information technology in pervasive environments
  • Issue 1 2007

Volume 2

  • Issue 4 2006
  • Issue 3 2006 Pervasive Management
  • Issue 2 2006
  • Issue 1 2006

Volume 1

  • Issue 4 2005
  • Issue 3 2005
  • Issue 2 2005
  • Issue 1 2005

    High gain switched beam Yagi-Uda antenna for millimeter wave communications

    Pramod Kumar Aylapogu, Madhu Sudan Donga, Venkatachari D., RamaDevi B.

    The suggested antenna has a switched mechanism among the successive elements of the radiating patch. The purpose of this paper is to develop high gain and less…

    pdf (2.1 MB)

    Smartphone-based electrochemical sensor for assessing COVID-19 infected patients

    Ganesh Babu R., Balaji A., Kavin Kumar K., Sudhanshu Maurya, Saravana Kumar M.N.

    The purpose of the study is to highlight the potential of the sensor based smartphone in assessing the covid-19 cases. Coronavirus disease 2019 (COVID-19) is a noxious…

    pdf (872 KB)

    Assessing nitrogen dioxide (NO2) impact on health pre- and post-COVID-19 pandemic using IoT in India

    Sitharthan R., Shanmuga Sundar D., Rajesh M., Karthikeyan Madurakavi, Jacob Raglend I., Belwin Edward J., Raja Singh R., Kumar R.

    Corona Virus Disease 2019 (COVID-19) is a deadly virus named after severe acute respiratory syndrome coronavirus 2; it affects the respiratory system of the human and…

    pdf (1.7 MB)

    Challenges in successful implementation of Digital contact tracing to curb COVID-19 from global citizen’s perspective: A text analysis study

    Praveen S.V., Rajesh Ittamalla, Dhilip Subramanian

    The word “digital contact tracing” is often met with different reactions: the reaction that passionately supports it, the reaction that neither supports nor oppose and the…

    pdf (202 KB)

    General public’s attitude toward governments implementing digital contact tracing to curb COVID-19 – a study based on natural language processing

    Praveen S.V., Rajesh Ittamalla

    Governments worldwide are taking various measures to prevent the spreading of COVID virus. One such effort is digital contact tracing. However, the aspect of digital…

    pdf (96 KB)

    Single-loop sigma delta modulator design and verification for cognitive IoT applications

    Vamsee Krishna S., Sudhakara Reddy P., Chandra Mohan Reddy S.

    A third-order discrete time sigma delta modulator (SDM) is proposed with optimum performance by addressing instability and power dissipations issues, and a novel SDM…

    pdf (919 KB)

    Performance measures of parallel tandem open queueing network

    Banu Priya, Rajendran P.

    The authors consider parallel four-state tandem open queueing network. The queue capacity is infinite. Passenger arrival rate is Poisson distribution and service rate is…

    pdf (917 KB)

    Energy efficiency in cloud data centres using parallel hybrid Jaya algorithm

    Archana Kollu, Sucharita V.

    Data centres evolve constantly in size, complexity and power consumption. Energy-efficient scheduling in a cloud data centre is a critical and challenging research…

    pdf (669 KB)

    Impact of optimal scaling coefficients in bi-orthogonal wavelet filters on compressed sensing

    Ashok Naganath Shinde, Sanjay L. Nalbalwar, Anil B. Nandgaonkar

    In today’s digital world, real-time health monitoring is becoming a most important challenge in the field of medical research. Body signals such as electrocardiogram…

    pdf (456 KB)

    State space classification of Markov password – an alphanumeric password authentication scheme for secure communication in cloud computing

    S. Vaithyasubramanian , R. Sundararajan

    Purpose of this study is to classify the states of Markov Chain for the implementation of Markov Password for effective security. Password confirmation is more often…

    pdf (559 KB)

    A non-linear mathematical model-based routing protocol for WBAN-based health-care systems

    Ch Rajendra Prasad, Polaiah Bojja

    This paper aims to present a non-linear mathematical model-based routing protocol for wireless body area networks (WBANs). Two non-linear mathematical models for WBANs are…

    pdf (1.4 MB)

    Architecture for an efficient MBIST using modified march-y algorithms to achieve optimized communication delay and computational speed

    Nisha O.S., Sivasankar K.

    In this work, an efficient architecture for memory built in self-test (MBIST) that incorporates a modified March Y algorithm using concurrent technique and a modified…

    pdf (897 KB)

    PAPR reduction using OQAM for spectrum sensing

    Renuka N., Satya Sairam M.

    The tremendous growth of wireless applications and the demand for high data rate, the spectrum utilization improvement has been the most crucial challenges for wireless…

    pdf (1.9 MB)

    Trusted Secure Geographic Routing Protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol

    Francis H. Shajin, Paulthurai Rajesh

    This study aims to evaluate the direct trust value for each node and calculate the trust value of all nodes satisfying the condition and update the trust value and value…

    pdf (1.3 MB)

    A case-study to examine doctors’ intentions to use IoT healthcare devices in Iraq during COVID-19 pandemic

    Ameer Alhasan, Lukman Audah, Ishaq Ibrahim, Ammar Al-Sharaa, Ali Saadon Al-Ogaili, Jabiry M. Mohammed

    Several countries have been using internet of things (IoT) devices in the healthcare sector to combat COVID-19. Therefore, this study aims to examine the doctors…

    pdf (291 KB)

    Data dissemination for green-VANETs communication: an opportunistic optimization approach

    Chandramohan D., Ankur Dumka, Dhilipkumar V., Jayakumar Loganathan

    This paper aims to predict the traffic and helps to find a solution. Unpredictable traffic leads more vehicles on the road. The result of which is one of the factors that…

    pdf (839 KB)

    Optimal path planning for intelligent automated wheelchair using DDSRPSO

    Kalaipriyan Thirugnanasambandam, Raghav R.S., Jayakumar Loganathan, Ankur Dumka, Dhilipkumar V.

    This paper aims to find the optimal path using directionally driven self-regulating particle swarm optimization (DDSRPSO) with high accuracy and minimal response time.

    pdf (881 KB)

    How optimistic do citizens feel about digital contact tracing? – Perspectives from developing countries

    Praveen S.V., Rajesh Ittamalla, Dhilip Subramanian

    Despite numerous positive aspects of digital contact tracing, the implied nature of contact tracing is still viewed with skepticism. Those in favor of contact tracing…

    pdf (177 KB)

    Localized automation solutions in response to the first wave of COVID-19: a story from Vietnam

    Hoang-Long Cao, Huynh Anh Duy Nguyen, Trong Hieu Luu, Huong Thi Thu Vu, Diep Pham, Van Thi Ngoc Vu, Hoang Hai Le, Duy Xuan Bach Nguyen, Trong Toai Truong, Hoang-Dung Nguyen, Chi-Ngon Nguyen

    COVID-19 hits every country’s health-care system and economy. There is a trend toward using automation technology in response to the COVID-19 crisis not only in developed…

    pdf (869 KB)

    COVID-19 prediction and symptom analysis using wearable sensors and IoT

    Karthickraja R., Kumar R., Kirubakaran S., Jegan Antony Marcilin L., Manikandan R.

    The purpose of the research work is to focus on the deployment of wearable sensors in addressing symptom Analysis in the Internet of Things (IoT) environment to reduce…

    pdf (1 MB)

    Mobile technologies for contact tracing and prevention of COVID-19 positive cases: a cross- sectional study

    Prabu S., Balamurugan Velan, Christalin Nelson S., Jayasudha F.V., Visu P., Janarthanan K.

    The purpose of this paper is to review the techniques for versatile advancements in contact tracing for the coronavirus disease 2019 (COVID-19) positive cases in this…

    pdf (610 KB)

    Monitoring and analysis of the recovery rate of Covid-19 positive cases to prevent dangerous stage using IoT and sensors

    Kumar K.R., Iyapparaja M., Niveditha V.R., S. Magesh, G. Magesh, Shanmugasundaram Marappan

    This paper has used the well-known machine learning (ML) computational algorithm with Internet of Things (IoT) devices to predict the COVID-19 disease and to analyze the…

    pdf (1018 KB)

    Detection and monitoring of the asymptotic COVID-19 patients using IoT devices and sensors

    Rajeesh Kumar N.V., Arun M., Baraneetharan E., Stanly Jaya Prakash J., Kanchana A., Prabu S.

    Many investigations are going on in monitoring, contact tracing, predicting and diagnosing the COVID-19 disease and many virologists are urgently seeking to create a…

    pdf (965 KB)

    Performance analysis of optimal cluster selection and intrusion detection by hierarchical K-means clustering with hybrid ABC-DT

    Josemila Baby Jesuretnam, Jeba James Rose

    This paper aims to propose a multi-dimensional hierarchical K-means clustering algorithm for the purpose of intrusion detection. Initially, the clustering set of rules is…

    pdf (2.2 MB)

    Multi-utility framework: blockchain exchange platform for sustainable development

    Jacques Bou Abdo, Sherali Zeadally

    The purpose of this paper is to design a sustainable development platform for water and energy peer-to-peer trading that is financially and economically feasible. Water…

    pdf (663 KB)

    Smart epidemic tunnel: IoT-based sensor-fusion assistive technology for COVID-19 disinfection

    Sharnil Pandya, Anirban Sur, Ketan Kotecha

    The purpose of the presented IoT based sensor-fusion assistive technology for COVID-19 disinfection termed as “Smart epidemic tunnel” is to protect an individual using an…

    pdf (1.8 MB)

    On contact tracing in COVID-19 (SARS-CoV-2) pandemic using lowest common ancestor in m-ary data aggregation tree in the fog-computing enhanced internet of things

    Ab Rouf Khan, Mohammad Ahsan Chishti

    The purpose of this study is to exploit the lowest common ancestor technique in an m-ary data aggregation tree in the fog computing-enhanced IoT to assist in contact…

    pdf (1 MB)

    Efficient task scheduling on virtual machine in cloud computing environment

    Mahfooz Alam, Mahak, Raza Abbas Haidri, Dileep Kumar Yadav

    Cloud users can access services at anytime from anywhere in the world. On average, Google now processes more than 40,000 searches every second, which is approximately 3.5…

    pdf (1.1 MB)

    Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack

    M.B. Benjula Anbu Malar, Prabhu J.

    This paper aims to discuss the Silver and Golden ticket exploits that usually exists in the existing systems. To overcome these challenges, the data is first encrypted and…

    pdf (1001 KB)

    Mobile application based speech and voice analysis for COVID-19 detection using computational audit techniques

    Udhaya Sankar S.M., Ganesan R., Jeevaa Katiravan, Ramakrishnan M., Ruhin Kouser R.

    It has been six months from the time the first case was registered, and nations are still working on counter steering regulations. The proposed model in the paper…

    pdf (1.1 MB)

    Moving ridge neuronal espionage network simulation for reticulum invasion sensing

    G. Sreeram, S. Pradeep, K. Sreenivasa Rao, B. Deevana Raju, Parveen Nikhat

    The paper aims to precise and fast categorization on to transaction evolves into indispensible. The effective capacity difficulty of all the IDS simulates today at below…

    pdf (643 KB)

    Early prediction of chronic disease using an efficient machine learning algorithm through adaptive probabilistic divergence based feature selection approach

    Sandeepkumar Hegde, Monica R. Mundada

    According to the World Health Organization, by 2025, the contribution of chronic disease is expected to rise by 73% compared to all deaths and it is considered as global…

    pdf (833 KB)

    Telemedicine system using mobile internet communication

    Saravanan S., Sudhakar P.

    Telemedicine is delivered to patient anywhere during emergency treatment care, and medical information is transferred from one site of patient to another site of…

    pdf (7.2 MB)

    A secure communication approach in OFDM using optimized interesting region-based video watermarking

    Amir M.U. Wagdarikar, Ranjan K. Senapati

    The technique for hiding confidential data in specific digital media by enhancing the graphical contents is known as watermarking. The dissemination of information over a…

    pdf (3.2 MB)

    Towards a ubiquitous real-time COVID-19 detection system

    Mohamed Sbai, Hajer Taktak, Faouzi Moussa

    In view of the intensive spread of Coronavirus disease 2019 (COVID-19) and in order to reduce the rate of spread of this disease; the objective of this article is to…

    pdf (1.6 MB)

    Decision-making framework for using ambient assisted living

    Majid H. Alsulami, Mohammed S. Alsaqer, Anthony S. Atkins

    Technology plays an important role in assisting elderly people to live independently, longer and improve their quality of life and health, in supporting their daily…

    pdf (651 KB)

    Smart scheduling on cloud for IoT-based sprinkler irrigation

    Mannar Mannan J., Kanimozhi Suguna S., Dhivya M., Parameswaran T.

    The purpose of this paper aims to reduce the manpower, electricity, and water consumption for irrigation.

    pdf (2 MB)

    Square microstrip multi band fractal antenna using EBG structure for wireless applications

    Suresh Akkole, Vasudevan N.

    Application of electromagnetic band gap (EBG) i.e. electromagnetic band gap technique and its use in the design of microstrip antenna and MIC i.e. microwave integrated…

    pdf (1.6 MB)

    Three-way formal concept clustering technique for matrix completion in recommender system

    Chemmalar Selvi G., Lakshmi Priya G.G.

    In today’s world, the recommender systems are very valuable systems for the online users, as the World Wide Web is loaded with plenty of available information causing the…

    pdf (388 KB)

    An optimized security solution based on trust value for multithreaded wireless body area network communication

    Sanchari Saha, Dinesh K. Anvekar

    Security of wireless body area network communication is highly important as it directly impacts human life. This paper aims to focus on battlefield application area of…

    pdf (1.1 MB)

ISSN:

1742-7371

Online date, start – end:

2005

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Dr Ismail Khalil

Further Information

  • About the journal(opens new window)
  • Purchase information(opens new window)
  • Editorial team(opens new window)
  • Write for this journal(opens new window)
Signatory of DORA
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here