International Journal of Pervasive Computing and Communications
Issue(s) available: 72 – From Volume: 1 Issue: 1, to Volume: 18 Issue: 4

A novel deep learning approach for tracking with soft computing technique
Krishna Mohan A., Reddy P.V.N., Satya Prasad K.In the community of visual tracking or object tracking, discriminatively learned correlation filter (DCF) has gained more importance. When it comes to speed, DCF gives the…
Smartphone-based electrochemical sensor for assessing COVID-19 infected patients
Ganesh Babu R., Balaji A., Kavin Kumar K., Sudhanshu Maurya, Saravana Kumar M.N.The purpose of the study is to highlight the potential of the sensor based smartphone in assessing the covid-19 cases. Coronavirus disease 2019 (COVID-19) is a noxious…
Assessing nitrogen dioxide (NO2) impact on health pre- and post-COVID-19 pandemic using IoT in India
Sitharthan R., Shanmuga Sundar D., Rajesh M., Karthikeyan Madurakavi, Jacob Raglend I., Belwin Edward J., Raja Singh R., Kumar R.Corona Virus Disease 2019 (COVID-19) is a deadly virus named after severe acute respiratory syndrome coronavirus 2; it affects the respiratory system of the human and…
Challenges in successful implementation of Digital contact tracing to curb COVID-19 from global citizen’s perspective: A text analysis study
Praveen S.V., Rajesh Ittamalla, Dhilip SubramanianThe word “digital contact tracing” is often met with different reactions: the reaction that passionately supports it, the reaction that neither supports nor oppose and the…
General public’s attitude toward governments implementing digital contact tracing to curb COVID-19 – a study based on natural language processing
Praveen S.V., Rajesh IttamallaGovernments worldwide are taking various measures to prevent the spreading of COVID virus. One such effort is digital contact tracing. However, the aspect of digital…
Designing obstacle’s map of an unknown place using autonomous drone navigation and web services
Jitender Tanwar, Sanjay Kumar Sharma, Mandeep MittalDrones are used in several purposes including examining areas, mapping surroundings and rescue mission operations. During these tasks, they could encounter compound…
A novel Internet of Things and federated learning-based privacy protection in blockchain technology
Shoayee Dlaim AlotaibiBe that as it may, BC is computationally costly, has restricted versatility and brings about critical transmission capacity upward and postpones, those seems not to be fit…
Video compression based on zig-zag 3D DCT and run-length encoding for multimedia communication systems
Sravanthi Chutke, Nandhitha N.M., Praveen Kumar LendaleWith the advent of technology, a huge amount of data is being transmitted and received through the internet. Large bandwidth and storage are required for the exchange of…
The relative importance of click-through rates (CTR) versus watch time for YouTube views
Linus T. WilsonThis study aims to analyze whether average video watch time or click-through rates (CTR) on YouTube videos are more closely associated with high numbers of views per…
IIBES: a proposed framework to improve the identity-based encryption system for securing federated learning
Maitri Patel, Rajan Patel, Nimisha Patel, Parita Shah, Kamal GulatiIn the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire…
Development of cloud selection supporting model for green information and communication technology services
Sanjiv Rao Godla, Jara Muda Haro, S.V.V.S.N. Murty Ch, R.V.V. KrishnaThe purpose of the study is to develop a cloud supporting model for green computing. In today's contemporary world, information technology (IT) plays a significant role…
Contact tracing and mobility pattern detection during pandemics – a trajectory cluster based approach
Nishad A., Sajimon AbrahamA wide number of technologies are currently in store to harness the challenges posed by pandemic situations. As such diseases transmit by way of person-to-person contact…
Energy efficient multi-tasking for edge computing using federated learning
Mukesh Soni, Nihar Ranjan Nayak, Ashima Kalra, Sheshang Degadwala, Nikhil Kumar Singh, Shweta SinghThe purpose of this paper is to improve the existing paradigm of edge computing to maintain a balanced energy usage.
Federate learning of corporate social authority and industry 4.0 that focus on young people: a strategic management framework for human resources
V.P. Sriram, M.A. Sikandar, Eti Khatri, Somya Choubey, Ity Patni, Lakshminarayana K., Kamal GulatiThe young population of the globe is defined by individuals aged 15 to 24 years. Based on statistics from the Instituto Brasileiro de Geografia e Estatística (IBGE), the…
An optimized and efficient multiuser data sharing using the selection scheme design secure approach and federated learning in cloud environment
Shubangini Patil, Rekha PatilUntil now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…
Federated learning algorithm based on matrix mapping for data privacy over edge computing
Pradyumna Kumar Tripathy, Anurag Shrivastava, Varsha Agarwal, Devangkumar Umakant Shah, Chandra Sekhar Reddy L., S.V. AkilandeeswariThis paper aims to provide the security and privacy for Byzantine clients from different types of attacks.
AI-federated novel delay-aware link-scheduling for Industry 4.0 applications in IoT networks
Suvarna Abhijit Patil, Prasad Kishor GokhaleWith the advent of AI-federated technologies, it is feasible to perform complex tasks in industrial Internet of Things (IIoT) environment by enhancing throughput of the…
Secure data collection and transmission for IoMT architecture integrated with federated learning
Priyanka Kumari Bhansali, Dilendra Hiran, Kamal GulatiThe purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact…
A framework for measuring the adoption factors in digital mobile payments in the COVID-19 era
Devid Jegerson, Matloub HussainThis study aims to identify the acceptance factors in the UAE for the digital mobile payment market, introduces a new hierarchical framework based on the continuation…
Cloud-based secure data storage and access control for internet of medical things using federated learning
Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari, Kamal GulatiThe purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and…
A new federated genetic algorithm-based optimization technique for multi-criteria vehicle route planning using ArcGIS network analyst
Da’ad Ahmad Albalawneh, M.A. MohamedUsing a real-time road network combined with historical traffic data for Al-Salt city, the paper aims to propose a new federated genetic algorithm (GA)-based optimization…
Hybrid cumulative approach for localization of nodes with adaptive threshold gradient feature on energy minimization using federated learning
Adumbabu I., K. SelvakumarLocalization of the nodes is crucial for gaining access of different nodes which would provision in extreme areas where networks are unreachable. The feature of…
A novel federated learning based lightweight sustainable IoT approach to identify abnormal traffic
Yasser AlharbiThis strategy significantly reduces the computational overhead and storage overhead required when using the kernel density estimation method to calculate the abnormal…
Trusted routing protocol for federated UAV ad hoc network
Elham Kariri, Kusum YadavIn the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for…
A qualitative study proposing service quality dimensions for video-on-demand services through over-the-top medium
Satyaki Datta, UtkarshThe behaviour of audience, consuming video entertainment, has changed intensely over the years. Lately, the consumers have increasingly preferred to watch video programs…
Intrinsic interference suppressed FBMC QAM for MU-MIMO systems in computing and communications
Shobha Y.K., Rangaraju H.G.In order to optimize BER and to substantiate performance measures, initially, the filter bank multicarrier (FBMC) quadrature amplitude modulation (QAM) performance metrics…
Context-aware behaviour prediction for autonomous driving: a deep learning approach
Syama R., Mala C.This paper aims to predict the behaviour of the vehicles in a mixed driving scenario. This proposes a deep learning model to predict lane-changing scenarios in highways…
Human activity recognition in WBAN using ensemble model
Jayaram Boga, Dhilip Kumar V.For achieving the profitable human activity recognition (HAR) method, this paper solves the HAR problem under wireless body area network (WBAN) using a developed ensemble…
Energy-aware multipath routing in WSN using improved invasive weed elephant herd optimization
Hingmire Vishal Sharad, Santosh R. Desai, Kanse Yuvraj KrishnraoIn a wireless sensor network (WSN), the sensor nodes are distributed in the network, and in general, they are linked through wireless intermediate to assemble physical…
Automatic diseases detection and classification of EEG signal with pervasive computing using machine learning
Rajashekhar U., Neelappa , Harish H.M.The natural control, feedback, stimuli and protection of these subsequent principles founded this project. Via properly conducted experiments, a multilayer computer…
Design and implementation of energy-aware cross-layer routing protocol for wearable body area network
Muniraju Naidu Vadlamudi, Asdaque Hussain M.D.A wireless body area network (WBAN) plays a crucial role in the health-care domain. With the emergence of technologies like the internet of things, there is increased…
OPC UA TSN: a next-generation network for Industry 4.0 and IIoT
Hristo Trifonov, Donal HeffernanThe purpose of this paper is to describe how emerging open standards are replacing traditional industrial networks. Current industrial Ethernet networks are not…
FHSA: fractional harmony search algorithm for polyphase code design in radar signal processing
Sirasani Srinivasa Rao, Subba Ramaiah V.The purpose of this research is to design and develop a technique for polyphase code design for the radar system.
Classification of disordered patient’s voice by using pervasive computational algorithms
Anil Kumar Maddali, Habibulla KhanCurrently, the design, technological features of voices, and their analysis of various applications are being simulated with the requirement to communicate at a greater…
A lightweight and flexible mutual authentication and key agreement protocol for wearable sensing devices in WBAN
Sandeep Kumar Reddy Thota, C. Mala, Geetha KrishnanA wireless body area network (WBAN) is a collection of sensing devices attached to a person’s body that is typically used during health care to track their physical state…
Network traffic analysis through deep learning for detection of an army of bots in health IoT network
Geetha K., Brahmananda S.H.IoT has a wide range of applications in the health-care sector and has captured the interest of many academic and industrial communities. The health IoT devices suffer…
A distributed quality of service-enabled load balancing approach for cloud environment
Minakshi Sharma, Rajneesh Kumar, Anurag JainDuring high demand for the virtualized resources in cloud environment, efficient task scheduling achieves the desired performance criteria by balancing the load in the system.
Authentication-based access control approach for enhancing security in pervasive computing environments
Gnaneshwari G.R., M.S. Hema, S.C. LingareddyPervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have…
A pervasive health care device computing application for brain tumors with machine and deep learning techniques
Sreelakshmi D., Syed InthiyazPervasive health-care computing applications in medical field provide better diagnosis of various organs such as brain, spinal card, heart, lungs and so on. The purpose of…
Sentiment analysis in aspect term extraction for mobile phone tweets using machine learning techniques
Venkatesh Naramula, Kalaivania A.This paper aims to focus on extracting aspect terms on mobile phone (iPhone and Samsung) tweets using NLTK techniques on multiple aspect extraction is one of the…
Wearable IoT based diagnosis of prostate cancer using GLCM-multiclass SVM and SIFT-multiclass SVM feature extraction strategies
Swetha Parvatha Reddy Chandrasekhara, Mohan G. Kabadi, SrivinayThis study has mainly aimed to compare and contrast two completely different image processing algorithms that are very adaptive for detecting prostate cancer using…
Review on various detectors in massive MIMO technology: a performance analysis
Manju V.M., Ganesh R.S.Multiple-input multiple-output (MIMO) combined with multi-user massive MIMO has been a well-known approach for high spectral efficiency in wideband systems, and it was…
Context–aware assistive driving: an overview of techniques for mitigating the risks of driver in real-time driving environment
Shilpa Gite, Ketan Kotecha, Gheorghita GhineaThis study aims to analyze driver risks in the driving environment. A complete analysis of context aware assistive driving techniques. Context awareness in assistive…
A novel approach for detection and classification of re-entrant crack using modified CNNetwork
Shadrack Fred Mahenge, Ala AlsanabaniIn the purpose of the section, the cracks that are in the construction domain may be common and usually fixed with the human inspection which is at the visible range, but…
A framework for scheduling IoT application jobs on fog computing infrastructure based on QoS parameters
Mandeep Kaur, Rajinder Sandhu, Rajni MohanaThe purpose of this study is to verify that if applications categories are segmented and resources are allocated based on their specific category, how effective scheduling…
A survey on various handover technologies in 5G network using the modular handover modules
Sanjay Sudhir Kulkarni, Arjav A. BavarvaFifth-generation (5G) networks play a significant role in handover methods. 5G wireless network is open, flexible and highly heterogeneous along with the overlay coverage…
QoS aware web service selection using orthogonal array learning on fruit fly optimization approach
Manik Chandra, Rajdeep NiyogiThis paper aims to solve the web service selection problem using an efficient meta-heuristic algorithm. The problem of selecting a set of web services from a large-scale…
Privacy preserving model-based authentication and data security in cloud computing
Ankush Balaram Pawar, Dr. Shashikant U. Ghumbre, Dr. Rashmi M. JogdandCloud computing plays a significant role in the initialization of secure communication between users. The advanced technology directs to offer several services, such as…
Enhanced optimization assisted interference mitigation with vertical beamforming in 3D MIMO-OFDMA for 5G wireless communication network
Ranjeet Yadav, Ashutosh TripathiMultiple input multiple-output (MIMO) has emerged as one among the many noteworthy technologies in recent wireless applications because of its powerful ability to improve…
A case-study to examine doctors’ intentions to use IoT healthcare devices in Iraq during COVID-19 pandemic
Ameer Alhasan, Lukman Audah, Ishaq Ibrahim, Ammar Al-Sharaa, Ali Saadon Al-Ogaili, Jabiry M. MohammedSeveral countries have been using internet of things (IoT) devices in the healthcare sector to combat COVID-19. Therefore, this study aims to examine the doctors…
An optimal communication in WSN enabled by fuzzy clustering and improved meta-heuristic model
Yerra Readdy Alekya Rani, Edara Sreenivasa ReddyWireless sensor networks (WSN) have been widely adopted for various applications due to their properties of pervasive computing. It is necessary to prolong the WSN…
Real-time data integration of an internet-of-things-based smart warehouse: a case study
Chelinka Rafiesta Sahara, Ammar Mohamed AamerCreating a real-time data integration when developing an internet-of-things (IoT)-based warehouse is still faced with challenges. It involves a diverse knowledge of novel…
Machine learning based pervasive analytics for ECG signal analysis
Aarathi S., Vasundra S.Pervasive analytics act as a prominent role in computer-aided prediction of non-communicating diseases. In the early stage, arrhythmia diagnosis detection helps prevent…
5G heterogeneous network (HetNets): a self-optimization technique for vertical handover management
Kotaru Kiran, Rajeswara Rao D.Vertical handover has been grown rapidly due to the mobility model improvements. These improvements are limited to certain circumstances and do not provide the support in…
Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM
Mohandas V. Pawar, Anuradha J.This study aims to present a novel system for detection and prevention of black hole and wormhole attacks in wireless sensor network (WSN) based on deep learning model…
Improved two factor fuzzy commitment scheme for securing IoT device
Yuvarani T., Arunachalam A.R.Generally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of…
Impact of optimal scaling coefficients in bi-orthogonal wavelet filters on compressed sensing
Ashok Naganath Shinde, Sanjay L. Nalbalwar, Anil B. NandgaonkarIn today’s digital world, real-time health monitoring is becoming a most important challenge in the field of medical research. Body signals such as electrocardiogram…
How optimistic do citizens feel about digital contact tracing? – Perspectives from developing countries
Praveen S.V., Rajesh Ittamalla, Dhilip SubramanianDespite numerous positive aspects of digital contact tracing, the implied nature of contact tracing is still viewed with skepticism. Those in favor of contact tracing…
Metaheuristic based auto-scaling for microservices in cloud environment: a new container-aware application scheduling
Subramonian Krishna SarmaThe cloud is a network of servers to share computing resources to run applications and data storage that offers services in various flavours, namely, infrastructure as a…
Localized automation solutions in response to the first wave of COVID-19: a story from Vietnam
Hoang-Long Cao, Huynh Anh Duy Nguyen, Trong Hieu Luu, Huong Thi Thu Vu, Diep Pham, Van Thi Ngoc Vu, Hoang Hai Le, Duy Xuan Bach Nguyen, Trong Toai Truong, Hoang-Dung Nguyen, Chi-Ngon NguyenCOVID-19 hits every country’s health-care system and economy. There is a trend toward using automation technology in response to the COVID-19 crisis not only in developed…
NFC and IoT-based electronic health card for elementary students using sensor fusion method
Noor Cholis Basjaruddin, Faris Rifqi Fakhrudin, Yana Sudarsa, Fatimah NoorIn the context of overcoming malnutrition in elementary school children and increasing public awareness of this issue, the Indonesian Government has created a “Card for…
A network controlled vertical handoff mechanism for heterogeneous wireless network using optimized support vector neural network
Mithun B. Patil, Rekha PatilVertical handoff mechanism (VHO) becomes very popular because of the improvements in the mobility models. These developments are less to certain circumstances and thus do…
Trusted Secure Geographic Routing Protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol
Francis H. Shajin, Paulthurai RajeshThis study aims to evaluate the direct trust value for each node and calculate the trust value of all nodes satisfying the condition and update the trust value and value…
Adaptive IWD-based algorithm for deployment of business processes into cloud federations
Hamidreza Nasiriasayesh, Alireza Yari, Eslam NazemiThe concept of business process (BP) as a service is a new solution in enterprises for the purpose of using specific BPs. BPs represent combinations of software services…
COVID-19 prediction and symptom analysis using wearable sensors and IoT
Karthickraja R., Kumar R., Kirubakaran S., Jegan Antony Marcilin L., Manikandan R.The purpose of the research work is to focus on the deployment of wearable sensors in addressing symptom Analysis in the Internet of Things (IoT) environment to reduce…
Seek-and-destroy algorithm for optimal resource allocation and security analysis in software-defined vehicular networks
Umesh K. Raut, L.K. VishwamitraSoftware-define vehicular networks (SDVN) assure the direct programmability for controlling the vehicles with improved accuracy and flexibility. In this research, the…
Telemedicine system using mobile internet communication
Saravanan S., Sudhakar P.Telemedicine is delivered to patient anywhere during emergency treatment care, and medical information is transferred from one site of patient to another site of…
On contact tracing in COVID-19 (SARS-CoV-2) pandemic using lowest common ancestor in m-ary data aggregation tree in the fog-computing enhanced internet of things
Ab Rouf Khan, Mohammad Ahsan ChishtiThe purpose of this study is to exploit the lowest common ancestor technique in an m-ary data aggregation tree in the fog computing-enhanced IoT to assist in contact…
Mobile application based speech and voice analysis for COVID-19 detection using computational audit techniques
Udhaya Sankar S.M., Ganesan R., Jeevaa Katiravan, Ramakrishnan M., Ruhin Kouser R.It has been six months from the time the first case was registered, and nations are still working on counter steering regulations. The proposed model in the paper…
ISSN:
1742-7371Online date, start – end:
2005Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Dr Ismail Khalil