International Journal of Pervasive Computing and Communications
Issue(s) available: 70 – From Volume: 1 Issue: 1, to Volume: 18 Issue: 2

A novel deep learning approach for tracking with soft computing technique
Krishna Mohan A., Reddy P.V.N., Satya Prasad K.In the community of visual tracking or object tracking, discriminatively learned correlation filter (DCF) has gained more importance. When it comes to speed, DCF gives the…
Smartphone-based electrochemical sensor for assessing COVID-19 infected patients
Ganesh Babu R., Balaji A., Kavin Kumar K., Sudhanshu Maurya, Saravana Kumar M.N.The purpose of the study is to highlight the potential of the sensor based smartphone in assessing the covid-19 cases. Coronavirus disease 2019 (COVID-19) is a noxious…
Assessing nitrogen dioxide (NO2) impact on health pre- and post-COVID-19 pandemic using IoT in India
Sitharthan R., Shanmuga Sundar D., Rajesh M., Karthikeyan Madurakavi, Jacob Raglend I., Belwin Edward J., Raja Singh R., Kumar R.Corona Virus Disease 2019 (COVID-19) is a deadly virus named after severe acute respiratory syndrome coronavirus 2; it affects the respiratory system of the human and…
Challenges in successful implementation of Digital contact tracing to curb COVID-19 from global citizen’s perspective: A text analysis study
Praveen S.V., Rajesh Ittamalla, Dhilip SubramanianThe word “digital contact tracing” is often met with different reactions: the reaction that passionately supports it, the reaction that neither supports nor oppose and the…
General public’s attitude toward governments implementing digital contact tracing to curb COVID-19 – a study based on natural language processing
Praveen S.V., Rajesh IttamallaGovernments worldwide are taking various measures to prevent the spreading of COVID virus. One such effort is digital contact tracing. However, the aspect of digital…
Secure data collection and transmission for IoMT architecture integrated with federated learning
Priyanka Kumari Bhansali, Dilendra Hiran, Kamal GulatiThe purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact…
A framework for measuring the adoption factors in digital mobile payments in the COVID-19 era
Devid Jegerson, Matloub HussainThis study aims to identify the acceptance factors in the UAE for the digital mobile payment market, introduces a new hierarchical framework based on the continuation…
Cloud-based secure data storage and access control for internet of medical things using federated learning
Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari, Kamal GulatiThe purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and…
A new federated genetic algorithm-based optimization technique for multi-criteria vehicle route planning using ArcGIS network analyst
Da’ad Ahmad Albalawneh, M.A. MohamedUsing a real-time road network combined with historical traffic data for Al-Salt city, the paper aims to propose a new federated genetic algorithm (GA)-based optimization…
Trusted routing protocol for federated UAV ad hoc network
Elham Kariri, Kusum YadavIn the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for…
Six sigma DMAIC approach based mobile application for statistical analysis of COVID-19 data
Kavyashree Nagarajaiah, Supriya Maganahalli Chandramouli, Lokesh Malavalli RamakrishnaCoronavirus disease 2019 is one of the novel diseases formed by a dreadful virus called Severe Acute Respiratory Syndrome Coronavirus 2. Various countries are affected by…
Human activity recognition in WBAN using ensemble model
Jayaram Boga, Dhilip Kumar V.For achieving the profitable human activity recognition (HAR) method, this paper solves the HAR problem under wireless body area network (WBAN) using a developed ensemble…
A novel utilization-aware and power-delay-aware intelligent DMA controller for video streaming used in AI applications
Santosh Kumar B., Krishna Kumar E.In real-time entertainment processing applications, processing of the multiple data streams demands high efficient multiple transfers, which leads to the computational…
A qualitative study proposing service quality dimensions for video-on-demand services through over-the-top medium
Satyaki Datta, UtkarshThe behaviour of audience, consuming video entertainment, has changed intensely over the years. Lately, the consumers have increasingly preferred to watch video programs…
Intrinsic interference suppressed FBMC QAM for MU-MIMO systems in computing and communications
Shobha Y.K., Rangaraju H.G.In order to optimize BER and to substantiate performance measures, initially, the filter bank multicarrier (FBMC) quadrature amplitude modulation (QAM) performance metrics…
Context-aware behaviour prediction for autonomous driving: a deep learning approach
Syama R., Mala C.This paper aims to predict the behaviour of the vehicles in a mixed driving scenario. This proposes a deep learning model to predict lane-changing scenarios in highways…
Energy-aware multipath routing in WSN using improved invasive weed elephant herd optimization
Hingmire Vishal Sharad, Santosh R. Desai, Kanse Yuvraj KrishnraoIn a wireless sensor network (WSN), the sensor nodes are distributed in the network, and in general, they are linked through wireless intermediate to assemble physical…
Efficient techniques of fractional-N PLL for pervasive wireless applications
Azeem Mohammed Abdul, Usha Rani NelakuditiThe purpose of this paper to ensure the rapid developments in the radio frequency wireless technology, the synthesis of frequencies for pervasive wireless applications is…
Automatic diseases detection and classification of EEG signal with pervasive computing using machine learning
Rajashekhar U., Neelappa , Harish H.M.The natural control, feedback, stimuli and protection of these subsequent principles founded this project. Via properly conducted experiments, a multilayer computer…
Underwater target tracking in three-dimensional environment using intelligent sensor technique
Omkar Lakshmi Jagan B., Koteswara Rao S., Kavitha Lakshmi M.This paper aims to target tracking in the marine environment is typically obtained by considering the measurement parameters like frequency, elevation and bearing. Marine…
Design and implementation of energy-aware cross-layer routing protocol for wearable body area network
Muniraju Naidu Vadlamudi, Asdaque Hussain M.D.A wireless body area network (WBAN) plays a crucial role in the health-care domain. With the emergence of technologies like the internet of things, there is increased…
FHSA: fractional harmony search algorithm for polyphase code design in radar signal processing
Sirasani Srinivasa Rao, Subba Ramaiah V.The purpose of this research is to design and develop a technique for polyphase code design for the radar system.
Classification of disordered patient’s voice by using pervasive computational algorithms
Anil Kumar Maddali, Habibulla KhanCurrently, the design, technological features of voices, and their analysis of various applications are being simulated with the requirement to communicate at a greater…
A lightweight and flexible mutual authentication and key agreement protocol for wearable sensing devices in WBAN
Sandeep Kumar Reddy Thota, C. Mala, Geetha KrishnanA wireless body area network (WBAN) is a collection of sensing devices attached to a person’s body that is typically used during health care to track their physical state…
Network traffic analysis through deep learning for detection of an army of bots in health IoT network
Geetha K., Brahmananda S.H.IoT has a wide range of applications in the health-care sector and has captured the interest of many academic and industrial communities. The health IoT devices suffer…
A distributed quality of service-enabled load balancing approach for cloud environment
Minakshi Sharma, Rajneesh Kumar, Anurag JainDuring high demand for the virtualized resources in cloud environment, efficient task scheduling achieves the desired performance criteria by balancing the load in the system.
A pervasive health care device computing application for brain tumors with machine and deep learning techniques
Sreelakshmi D., Syed InthiyazPervasive health-care computing applications in medical field provide better diagnosis of various organs such as brain, spinal card, heart, lungs and so on. The purpose of…
Sentiment analysis in aspect term extraction for mobile phone tweets using machine learning techniques
Venkatesh Naramula, Kalaivania A.This paper aims to focus on extracting aspect terms on mobile phone (iPhone and Samsung) tweets using NLTK techniques on multiple aspect extraction is one of the…
An optimized deep learning-based trust mechanism In VANET for selfish node detection
Jyothi N., Rekha PatilThis study aims to develop a trust mechanism in a Vehicular ad hoc Network (VANET) based on an optimized deep learning for selfish node detection.
A novel approach for detection and classification of re-entrant crack using modified CNNetwork
Shadrack Fred Mahenge, Ala AlsanabaniIn the purpose of the section, the cracks that are in the construction domain may be common and usually fixed with the human inspection which is at the visible range, but…
A framework for scheduling IoT application jobs on fog computing infrastructure based on QoS parameters
Mandeep Kaur, Rajinder Sandhu, Rajni MohanaThe purpose of this study is to verify that if applications categories are segmented and resources are allocated based on their specific category, how effective scheduling…
OPC UA TSN: a next-generation network for Industry 4.0 and IIoT
Hristo Trifonov, Donal HeffernanThe purpose of this paper is to describe how emerging open standards are replacing traditional industrial networks. Current industrial Ethernet networks are not…
Shifted Rayleigh filter: a novel estimation filtering algorithm for pervasive underwater passive target tracking for computation in 3D by bearing and elevation measurements
Lakshmi M. Kavitha, Rao S. Koteswara, K. SubrahmanyamMarine exploration is becoming an important element of pervasive computing underwater target tracking. Many pervasive techniques are found in current literature, but only…
Privacy preserving model-based authentication and data security in cloud computing
Ankush Balaram Pawar, Dr. Shashikant U. Ghumbre, Dr. Rashmi M. JogdandCloud computing plays a significant role in the initialization of secure communication between users. The advanced technology directs to offer several services, such as…
Authentication-based access control approach for enhancing security in pervasive computing environments
Gnaneshwari G.R., M.S. Hema, S.C. LingareddyPervasive computing environment allows the users to access the services anywhere and anytime. Due to the dynamicity, mobility, security, heterogeneity, and openness have…
Enhanced optimization assisted interference mitigation with vertical beamforming in 3D MIMO-OFDMA for 5G wireless communication network
Ranjeet Yadav, Ashutosh TripathiMultiple input multiple-output (MIMO) has emerged as one among the many noteworthy technologies in recent wireless applications because of its powerful ability to improve…
An optimal communication in WSN enabled by fuzzy clustering and improved meta-heuristic model
Yerra Readdy Alekya Rani, Edara Sreenivasa ReddyWireless sensor networks (WSN) have been widely adopted for various applications due to their properties of pervasive computing. It is necessary to prolong the WSN…
Real-time data integration of an internet-of-things-based smart warehouse: a case study
Chelinka Rafiesta Sahara, Ammar Mohamed AamerCreating a real-time data integration when developing an internet-of-things (IoT)-based warehouse is still faced with challenges. It involves a diverse knowledge of novel…
Machine learning based pervasive analytics for ECG signal analysis
Aarathi S., Vasundra S.Pervasive analytics act as a prominent role in computer-aided prediction of non-communicating diseases. In the early stage, arrhythmia diagnosis detection helps prevent…
Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM
Mohandas V. Pawar, Anuradha J.This study aims to present a novel system for detection and prevention of black hole and wormhole attacks in wireless sensor network (WSN) based on deep learning model…
Wearable IoT based diagnosis of prostate cancer using GLCM-multiclass SVM and SIFT-multiclass SVM feature extraction strategies
Swetha Parvatha Reddy Chandrasekhara, Mohan G. Kabadi, SrivinayThis study has mainly aimed to compare and contrast two completely different image processing algorithms that are very adaptive for detecting prostate cancer using…
Improved two factor fuzzy commitment scheme for securing IoT device
Yuvarani T., Arunachalam A.R.Generally, Internet-of-Things (IoT) is quite small sized with limited resource and low cost that may be vulnerable for physical and cloned attacking. All kind of…
Review on various detectors in massive MIMO technology: a performance analysis
Manju V.M., Ganesh R.S.Multiple-input multiple-output (MIMO) combined with multi-user massive MIMO has been a well-known approach for high spectral efficiency in wideband systems, and it was…
Context–aware assistive driving: an overview of techniques for mitigating the risks of driver in real-time driving environment
Shilpa Gite, Ketan Kotecha, Gheorghita GhineaThis study aims to analyze driver risks in the driving environment. A complete analysis of context aware assistive driving techniques. Context awareness in assistive…
Metaheuristic based auto-scaling for microservices in cloud environment: a new container-aware application scheduling
Subramonian Krishna SarmaThe cloud is a network of servers to share computing resources to run applications and data storage that offers services in various flavours, namely, infrastructure as a…
A novel OTP based tripartite authentication scheme
Sajaad Ahmed Lone, Ajaz Hussain MirBecause of the continued use of mobile, cloud and the internet of things, the possibility of data breaches is on the increase. A secure authentication and authorization…
A survey on various handover technologies in 5G network using the modular handover modules
Sanjay Sudhir Kulkarni, Arjav A. BavarvaFifth-generation (5G) networks play a significant role in handover methods. 5G wireless network is open, flexible and highly heterogeneous along with the overlay coverage…
Network efficient topology for low power and lossy networks in smart corridor design using RPL
Sakshi Garg, Deepti Mehrotra, Sujata Pandey, Hari Mohan PandeyThis paper aims to determine the network efficient topology for low power and lossy networks (LLNs) using routing protocol for LLN (RPL) with respect to the increase in…
Seek-and-destroy algorithm for optimal resource allocation and security analysis in software-defined vehicular networks
Umesh K. Raut, L.K. VishwamitraSoftware-define vehicular networks (SDVN) assure the direct programmability for controlling the vehicles with improved accuracy and flexibility. In this research, the…
QoS aware web service selection using orthogonal array learning on fruit fly optimization approach
Manik Chandra, Rajdeep NiyogiThis paper aims to solve the web service selection problem using an efficient meta-heuristic algorithm. The problem of selecting a set of web services from a large-scale…
A case-study to examine doctors’ intentions to use IoT healthcare devices in Iraq during COVID-19 pandemic
Ameer Alhasan, Lukman Audah, Ishaq Ibrahim, Ammar Al-Sharaa, Ali Saadon Al-Ogaili, Jabiry M. MohammedSeveral countries have been using internet of things (IoT) devices in the healthcare sector to combat COVID-19. Therefore, this study aims to examine the doctors…
Monitoring and analysis of the recovery rate of Covid-19 positive cases to prevent dangerous stage using IoT and sensors
Kumar K.R., Iyapparaja M., Niveditha V.R., S. Magesh, G. Magesh, Shanmugasundaram MarappanThis paper has used the well-known machine learning (ML) computational algorithm with Internet of Things (IoT) devices to predict the COVID-19 disease and to analyze the…
Detection and monitoring of the asymptotic COVID-19 patients using IoT devices and sensors
Rajeesh Kumar N.V., Arun M., Baraneetharan E., Stanly Jaya Prakash J., Kanchana A., Prabu S.Many investigations are going on in monitoring, contact tracing, predicting and diagnosing the COVID-19 disease and many virologists are urgently seeking to create a…
5G heterogeneous network (HetNets): a self-optimization technique for vertical handover management
Kotaru Kiran, Rajeswara Rao D.Vertical handover has been grown rapidly due to the mobility model improvements. These improvements are limited to certain circumstances and do not provide the support in…
Impact of optimal scaling coefficients in bi-orthogonal wavelet filters on compressed sensing
Ashok Naganath Shinde, Sanjay L. Nalbalwar, Anil B. NandgaonkarIn today’s digital world, real-time health monitoring is becoming a most important challenge in the field of medical research. Body signals such as electrocardiogram…
How optimistic do citizens feel about digital contact tracing? – Perspectives from developing countries
Praveen S.V., Rajesh Ittamalla, Dhilip SubramanianDespite numerous positive aspects of digital contact tracing, the implied nature of contact tracing is still viewed with skepticism. Those in favor of contact tracing…
Multi-utility framework: blockchain exchange platform for sustainable development
Jacques Bou Abdo, Sherali ZeadallyThe purpose of this paper is to design a sustainable development platform for water and energy peer-to-peer trading that is financially and economically feasible. Water…
Localized automation solutions in response to the first wave of COVID-19: a story from Vietnam
Hoang-Long Cao, Huynh Anh Duy Nguyen, Trong Hieu Luu, Huong Thi Thu Vu, Diep Pham, Van Thi Ngoc Vu, Hoang Hai Le, Duy Xuan Bach Nguyen, Trong Toai Truong, Hoang-Dung Nguyen, Chi-Ngon NguyenCOVID-19 hits every country’s health-care system and economy. There is a trend toward using automation technology in response to the COVID-19 crisis not only in developed…
Smart epidemic tunnel: IoT-based sensor-fusion assistive technology for COVID-19 disinfection
Sharnil Pandya, Anirban Sur, Ketan KotechaThe purpose of the presented IoT based sensor-fusion assistive technology for COVID-19 disinfection termed as “Smart epidemic tunnel” is to protect an individual using an…
On contact tracing in COVID-19 (SARS-CoV-2) pandemic using lowest common ancestor in m-ary data aggregation tree in the fog-computing enhanced internet of things
Ab Rouf Khan, Mohammad Ahsan ChishtiThe purpose of this study is to exploit the lowest common ancestor technique in an m-ary data aggregation tree in the fog computing-enhanced IoT to assist in contact…
NFC and IoT-based electronic health card for elementary students using sensor fusion method
Noor Cholis Basjaruddin, Faris Rifqi Fakhrudin, Yana Sudarsa, Fatimah NoorIn the context of overcoming malnutrition in elementary school children and increasing public awareness of this issue, the Indonesian Government has created a “Card for…
A network controlled vertical handoff mechanism for heterogeneous wireless network using optimized support vector neural network
Mithun B. Patil, Rekha PatilVertical handoff mechanism (VHO) becomes very popular because of the improvements in the mobility models. These developments are less to certain circumstances and thus do…
Trusted Secure Geographic Routing Protocol: outsider attack detection in mobile ad hoc networks by adopting trusted secure geographic routing protocol
Francis H. Shajin, Paulthurai RajeshThis study aims to evaluate the direct trust value for each node and calculate the trust value of all nodes satisfying the condition and update the trust value and value…
Adaptive IWD-based algorithm for deployment of business processes into cloud federations
Hamidreza Nasiriasayesh, Alireza Yari, Eslam NazemiThe concept of business process (BP) as a service is a new solution in enterprises for the purpose of using specific BPs. BPs represent combinations of software services…
COVID-19 prediction and symptom analysis using wearable sensors and IoT
Karthickraja R., Kumar R., Kirubakaran S., Jegan Antony Marcilin L., Manikandan R.The purpose of the research work is to focus on the deployment of wearable sensors in addressing symptom Analysis in the Internet of Things (IoT) environment to reduce…
Mobile application based speech and voice analysis for COVID-19 detection using computational audit techniques
Udhaya Sankar S.M., Ganesan R., Jeevaa Katiravan, Ramakrishnan M., Ruhin Kouser R.It has been six months from the time the first case was registered, and nations are still working on counter steering regulations. The proposed model in the paper…
Telemedicine system using mobile internet communication
Saravanan S., Sudhakar P.Telemedicine is delivered to patient anywhere during emergency treatment care, and medical information is transferred from one site of patient to another site of…
ISSN:
1742-7371Online date, start – end:
2005Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Dr Ismail Khalil