International Journal of Pervasive Computing and Communications: Volume 17 Issue 1

Subjects:

Table of contents - Special Issue: Next generation of pervasive computing and IoT systems

Guest Editors: V. Vinoth Kumar, Gautam Srivastava, David Asirvatham, Biplab Sikdar

Smart scheduling on cloud for IoT-based sprinkler irrigation

Mannar Mannan J., Kanimozhi Suguna S., Dhivya M., Parameswaran T.

The purpose of this paper aims to reduce the manpower, electricity, and water consumption for irrigation.

302

Early prediction of chronic disease using an efficient machine learning algorithm through adaptive probabilistic divergence based feature selection approach

Sandeepkumar Hegde, Monica R. Mundada

According to the World Health Organization, by 2025, the contribution of chronic disease is expected to rise by 73% compared to all deaths and it is considered as global burden of…

Performance measures of parallel tandem open queueing network

Banu Priya, Rajendran P.

The authors consider parallel four-state tandem open queueing network. The queue capacity is infinite. Passenger arrival rate is Poisson distribution and service rate is…

Performance analysis of optimal cluster selection and intrusion detection by hierarchical K-means clustering with hybrid ABC-DT

Josemila Baby Jesuretnam, Jeba James Rose

This paper aims to propose a multi-dimensional hierarchical K-means clustering algorithm for the purpose of intrusion detection. Initially, the clustering set of rules is proposed…

Moving ridge neuronal espionage network simulation for reticulum invasion sensing

G. Sreeram, S. Pradeep, K. Sreenivasa Rao, B. Deevana Raju, Parveen Nikhat

The paper aims to precise and fast categorization on to transaction evolves into indispensible. The effective capacity difficulty of all the IDS simulates today at below discovery…

Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack

M.B. Benjula Anbu Malar, Prabhu J.

This paper aims to discuss the Silver and Golden ticket exploits that usually exists in the existing systems. To overcome these challenges, the data is first encrypted and then…

Data dissemination for green-VANETs communication: an opportunistic optimization approach

Chandramohan D., Ankur Dumka, Dhilipkumar V., Jayakumar Loganathan

This paper aims to predict the traffic and helps to find a solution. Unpredictable traffic leads more vehicles on the road. The result of which is one of the factors that…

Optimal path planning for intelligent automated wheelchair using DDSRPSO

Kalaipriyan Thirugnanasambandam, Raghav R.S., Jayakumar Loganathan, Ankur Dumka, Dhilipkumar V.

This paper aims to find the optimal path using directionally driven self-regulating particle swarm optimization (DDSRPSO) with high accuracy and minimal response time.

State space classification of Markov password – an alphanumeric password authentication scheme for secure communication in cloud computing

S. Vaithyasubramanian , R. Sundararajan

Purpose of this study is to classify the states of Markov Chain for the implementation of Markov Password for effective security. Password confirmation is more often required in…

Architecture for an efficient MBIST using modified March-y algorithms to achieve optimized communication delay and computational speed

Nisha O.S., Sivasankar K.

In this work, an efficient architecture for memory built in self-test (MBIST) that incorporates a modified March Y algorithm using concurrent technique and a modified linear…

Cover of International Journal of Pervasive Computing and Communications

ISSN:

1742-7371

Online date, start – end:

2005

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Lizzy Seal