International Journal of Pervasive Computing and Communications
Issue(s) available: 78 – From Volume: 1 Issue: 1, to Volume: 19 Issue: 5

Novel communication system for buried water pipe monitoring using acoustic signal propagation along the pipe
Omotayo Farai, Nicole Metje, Carl Anthony, Ali Sadeghioon, David ChapmanWireless sensor networks (WSN), as a solution for buried water pipe monitoring, face a new set of challenges compared to traditional application for above-ground infrastructure…
Cooperative optimization techniques in distributed MAC protocols – a survey
Radha Subramanyam, Y. Adline Jancy, P. NagabushanamCross-layer approach in media access control (MAC) layer will address interference and jamming problems. Hybrid distributed MAC can be used for simultaneous voice, data…
A new predictive approach for the MAC layer misbehavior in IEEE 802.11 networks
Mohammed-Alamine El Houssaini, Abdellah Nabou, Abdelali Hadir, Souad El Houssaini, Jamal El KafiAd hoc mobile networks are commonplace in every aspect of our everyday life. They become essential in many industries and have uses in logistics, science and the military…
A lane-based advanced forwarding protocol for internet of vehicles
Ishita Seth, Kalpna Guleria, Surya Narayan PandaThe internet of vehicles (IoV) communication has recently become a popular research topic in the automotive industry. The growth in the automotive sector has resulted in…
Clustering based EO with MRF technique for effective load balancing in cloud computing
Hanuman Reddy N., Amit Lathigara, Rajanikanth Aluvalu, Uma Maheswari V.Cloud computing (CC) refers to the usage of virtualization technology to share computing resources through the internet. Task scheduling (TS) is used to assign computational…
Performance analysis of edge, fog and cloud computing paradigms for real-time video quality assessment and phishing detection
Tulsi Pawan Fowdur, M.A.N. Shaikh Abdoolla, Lokeshwar DooburThe purpose of this paper is to perform a comparative analysis of the delay associated in running two real-time machine learning-based applications, namely, a video quality…
Air quality measurement, prediction and warning using transfer learning based IOT system for ambient assisted living
Shilpa Sonawani, Kailas PatilIndoor air quality monitoring is extremely important in urban, industrial areas. Considering the devastating effect of declining quality of air in major part of the countries like…
Weighted ensemble classifier for malicious link detection using natural language processing
Saleem Raja A., Sundaravadivazhagan Balasubaramanian, Pradeepa Ganesan, Justin Rajasekaran, Karthikeyan R.The internet has completely merged into contemporary life. People are addicted to using internet services for everyday activities. Consequently, an abundance of information about…
Detection IoT attacks using Lasso regression algorithm with ensemble classifier
K.V. Sheelavathy, V. Udaya RaniInternet of Things (IoT) is a network, which provides the connection with various physical objects such as smart machines, smart home appliance and so on. The physical objects are…
A systematic study on the challenges, characteristics and security issues in vehicular networks
Faisal Lone, Harsh Kumar Verma, Krishna Pal SharmaThe purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…
Utilization and criticality based fault-tolerant scheduling in multicore mixed critical systems
Preeti Godabole, Girish BholeThe main purpose of the paper is timing analysis of mixed critical applications on the multicore system to identify an efficient task scheduling mechanism to achieve three main…
AI federated learning based improvised random Forest classifier with error reduction mechanism for skewed data sets
Anjali More, Dipti RanaReferred data set produces reliable information about the network flows and common attacks meeting with real-world criteria. Accordingly, this study aims to focus on the use of…
Enhanced cipher text-policy attribute-based encryption and serialization on media cloud data
Mohan Naik R., H. Manoj T. Gadiyar, Sharath S. M., M. Bharathrajkumar, Sowmya T. K.There are various system techniques or models which are used for access control by performing cryptographic operations and characterizing to provide an efficient cloud and in…
IIBES: a proposed framework to improve the identity-based encryption system for securing federated learning
Maitri Patel, Rajan Patel, Nimisha Patel, Parita Shah, Kamal GulatiIn the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire certificates…
Development of cloud selection supporting model for green information and communication technology services
Sanjiv Rao Godla, Jara Muda Haro, S.V.V.S.N. Murty Ch, R.V.V. KrishnaThe purpose of the study is to develop a cloud supporting model for green computing. In today's contemporary world, information technology (IT) plays a significant role. Because…
Secure data collection and transmission for IoMT architecture integrated with federated learning
Priyanka Kumari Bhansali, Dilendra Hiran, Kamal GulatiThe purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with…
LMH-RPL: a load balancing and mobility aware secure hybrid routing protocol for low power lossy network
Robin Cyriac, Saleem Durai M.A.Routing protocol for low-power lossy network (RPL) being the de facto routing protocol used by low power lossy networks needs to provide adequate routing service to mobile nodes…
Enhanced gray wolf optimization for estimation of time difference of arrival in WSNs
Devika E., Saravanan A.Intelligent prediction of node localization in wireless sensor networks (WSNs) is a major concern for researchers. The huge amount of data generated by modern sensor array systems…
IoT-based multimodal liveness detection using the fusion of ECG and fingerprint
Anil Kumar Gona, Subramoniam M.Biometric scans using fingerprints are widely used for security purposes. Eventually, for authentication purposes, fingerprint scans are not very reliable because they can be…
Improving GPU performance in multimedia applications through FPGA based adaptive DMA controller
Santosh Kumar B., Krishna Kumar E.Deep learning techniques are unavoidable in a variety of domains such as health care, computer vision, cyber-security and so on. These algorithms demand high data transfers but…
Energy efficient multi-tasking for edge computing using federated learning
Mukesh Soni, Nihar Ranjan Nayak, Ashima Kalra, Sheshang Degadwala, Nikhil Kumar Singh, Shweta SinghThe purpose of this paper is to improve the existing paradigm of edge computing to maintain a balanced energy usage.
Federate learning of corporate social authority and industry 4.0 that focus on young people: a strategic management framework for human resources
V.P. Sriram, M.A. Sikandar, Eti Khatri, Somya Choubey, Ity Patni, Lakshminarayana K., Kamal GulatiThe young population of the globe is defined by individuals aged 15 to 24 years. Based on statistics from the Instituto Brasileiro de Geografia e Estatística (IBGE), the second…
A secure IoT and edge computing based EV selection model in V2G systems using ant colony optimization algorithm
Gopinath Anjinappa, Divakar Bangalore PrabhakarThe fluctuations that occurred between the power requirements have shown a higher range of voltage regulations and frequency. The fluctuations are caused because of substantial…
Trusted routing protocol for federated UAV ad hoc network
Elham Kariri, Kusum YadavIn the final step, the trust model is applied to the on-demand federated multipath distance vector routing protocol (AOMDV) to introduce path trust as a foundation for routing…
Cloud-based secure data storage and access control for internet of medical things using federated learning
Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari, Kamal GulatiThe purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses…
A new federated genetic algorithm-based optimization technique for multi-criteria vehicle route planning using ArcGIS network analyst
Da’ad Ahmad Albalawneh, M.A. MohamedUsing a real-time road network combined with historical traffic data for Al-Salt city, the paper aims to propose a new federated genetic algorithm (GA)-based optimization…
Hybrid cumulative approach for localization of nodes with adaptive threshold gradient feature on energy minimization using federated learning
Adumbabu I., K. SelvakumarLocalization of the nodes is crucial for gaining access of different nodes which would provision in extreme areas where networks are unreachable. The feature of localization of…
An optimized and efficient multiuser data sharing using the selection scheme design secure approach and federated learning in cloud environment
Shubangini Patil, Rekha PatilUntil now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…
Embedding and Siamese deep neural network-based malware detection in Internet of Things
T. Sree Lakshmi, M. Govindarajan, Asadi SrinivasuluA proper understanding of malware characteristics is necessary to protect massive data generated because of the advances in Internet of Things (IoT), big data and the cloud…
ElGamal algorithm with hyperchaotic sequence to enhance security of cloud data
Aruna Kumari Koppaka, Vadlamani Naga LakshmiIn the cloud-computing environment, privacy preservation and enabling security to the cloud data is a crucial and demanding task. In both the commercial and academic world, the…
Federate learning on Web browsing data with statically and machine learning technique
Ratnmala Nivrutti Bhimanpallewar, Sohail Imran Khan, K. Bhavana Raj, Kamal Gulati, Narinder Bhasin, Roop RajFederation analytics approaches are a present area of study that has already progressed beyond the analysis of metrics and counts. It is possible to acquire aggregated information…
Federated learning algorithm based on matrix mapping for data privacy over edge computing
Pradyumna Kumar Tripathy, Anurag Shrivastava, Varsha Agarwal, Devangkumar Umakant Shah, Chandra Sekhar Reddy L., S.V. AkilandeeswariThis paper aims to provide the security and privacy for Byzantine clients from different types of attacks.
AI-federated novel delay-aware link-scheduling for Industry 4.0 applications in IoT networks
Suvarna Abhijit Patil, Prasad Kishor GokhaleWith the advent of AI-federated technologies, it is feasible to perform complex tasks in industrial Internet of Things (IIoT) environment by enhancing throughput of the network…
A novel federated learning based lightweight sustainable IoT approach to identify abnormal traffic
Yasser AlharbiThis strategy significantly reduces the computational overhead and storage overhead required when using the kernel density estimation method to calculate the abnormal evaluation…
A novel Internet of Things and federated learning-based privacy protection in blockchain technology
Shoayee Dlaim AlotaibiBe that as it may, BC is computationally costly, has restricted versatility and brings about critical transmission capacity upward and postpones, those seems not to be fit with…
Video compression based on zig-zag 3D DCT and run-length encoding for multimedia communication systems
Sravanthi Chutke, Nandhitha N.M., Praveen Kumar LendaleWith the advent of technology, a huge amount of data is being transmitted and received through the internet. Large bandwidth and storage are required for the exchange of data and…
Machine learning based pervasive analytics for ECG signal analysis
Aarathi S., Vasundra S.Pervasive analytics act as a prominent role in computer-aided prediction of non-communicating diseases. In the early stage, arrhythmia diagnosis detection helps prevent the cause…
A pervasive health care device computing application for brain tumors with machine and deep learning techniques
Sreelakshmi D., Syed InthiyazPervasive health-care computing applications in medical field provide better diagnosis of various organs such as brain, spinal card, heart, lungs and so on. The purpose of this…
Sentiment analysis in aspect term extraction for mobile phone tweets using machine learning techniques
Venkatesh Naramula, Kalaivania A.This paper aims to focus on extracting aspect terms on mobile phone (iPhone and Samsung) tweets using NLTK techniques on multiple aspect extraction is one of the challenges. Then…
Wearable IoT based diagnosis of prostate cancer using GLCM-multiclass SVM and SIFT-multiclass SVM feature extraction strategies
Swetha Parvatha Reddy Chandrasekhara, Mohan G. Kabadi, SrivinayThis study has mainly aimed to compare and contrast two completely different image processing algorithms that are very adaptive for detecting prostate cancer using wearable…
A novel approach for detection and classification of re-entrant crack using modified CNNetwork
Shadrack Fred Mahenge, Ala AlsanabaniIn the purpose of the section, the cracks that are in the construction domain may be common and usually fixed with the human inspection which is at the visible range, but for the…
Classification of disordered patient’s voice by using pervasive computational algorithms
Anil Kumar Maddali, Habibulla KhanCurrently, the design, technological features of voices, and their analysis of various applications are being simulated with the requirement to communicate at a greater distance…
A lightweight and flexible mutual authentication and key agreement protocol for wearable sensing devices in WBAN
Sandeep Kumar Reddy Thota, C. Mala, Geetha KrishnanA wireless body area network (WBAN) is a collection of sensing devices attached to a person’s body that is typically used during health care to track their physical state. This…
ISSN:
1742-7371Online date, start – end:
2005Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Lizzy Seal