default search action
International Journal of Pervasive Computing and Communications, Volume 19
Volume 19, Number 1, 2023
- Kotaru Kiran, Rajeswara Rao D.:
5G heterogeneous network (HetNets): a self-optimization technique for vertical handover management. 1-22 - Mithun B. Patil, Rekha Patil:
A network controlled vertical handoff mechanism for heterogeneous wireless network using optimized support vector neural network. 23-42 - Noor Cholis Basjaruddin, Faris Rifqi Fakhrudin, Yana Sudarsa, Fatimah Noor:
NFC and IoT-based electronic health card for elementary students using sensor fusion method. 43-53 - Hamidreza Nasiriasayesh, Alireza Yari, Eslam Nazemi:
Adaptive IWD-based algorithm for deployment of business processes into cloud federations. 54-73 - Subramonian Krishna Sarma:
Metaheuristic based auto-scaling for microservices in cloud environment: a new container-aware application scheduling. 74-96 - Umesh K. Raut, L. K. Vishwamitra:
Seek-and-destroy algorithm for optimal resource allocation and security analysis in software-defined vehicular networks. 97-123 - Mohandas V. Pawar, Anuradha Jagadeesan:
Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM. 124-153 - Jitender Tanwar, Sanjay Kumar Sharma, Mandeep Mittal:
Designing obstacle's map of an unknown place using autonomous drone navigation and web services. 154-169
Volume 19, Number 2, 2023
- Ankush Balaram Pawar, Shashikant U. Ghumbre, Rashmi M. Jogdand:
Privacy preserving model-based authentication and data security in cloud computing. 173-190 - Ranjeet Yadav, Ashutosh Tripathi:
Enhanced optimization assisted interference mitigation with vertical beamforming in 3D MIMO-OFDMA for 5G wireless communication network. 191-210 - Gnaneshwari G. R., M. S. Hema, S. C. Lingareddy:
Authentication-based access control approach for enhancing security in pervasive computing environments. 211-232 - Yerra Readdy Alekya Rani, Edara Sreenivasa Reddy:
An optimal communication in WSN enabled by fuzzy clustering and improved meta-heuristic model. 233-254 - Yuvarani T., Arunachalam A. R.:
Improved two factor fuzzy commitment scheme for securing IoT device. 255-266 - Sanjay Sudhir Kulkarni, Arjav A. Bavarva:
A survey on various handover technologies in 5G network using the modular handover modules. 267-290 - Manju V. M., Ganesh R. S.:
Review on various detectors in massive MIMO technology: a performance analysis. 291-322
Volume 19, Number 3, 2023
- Shilpa Gite, Ketan Kotecha, Gheorghita Ghinea:
Context-aware assistive driving: an overview of techniques for mitigating the risks of driver in real-time driving environment. 325-342 - Manik Chandra, Rajdeep Niyogi:
QoS aware web service selection using orthogonal array learning on fruit fly optimization approach. 343-363 - Mandeep Kaur, Rajinder Sandhu, Rajni Mohana:
A framework for scheduling IoT application jobs on fog computing infrastructure based on QoS parameters. 364-385 - Hristo Trifonov, Donal Heffernan:
OPC UA TSN: a next-generation network for Industry 4.0 and IIoT. 386-411 - Sirasani Srinivasa Rao, Subba Ramaiah V.:
FHSA: fractional harmony search algorithm for polyphase code design in radar signal processing. 412-431 - Rajashekhar U., Neelappa, Harish H. M.:
Automatic diseases detection and classification of EEG signal with pervasive computing using machine learning. 432-450 - Hingmire Vishal Sharad, Santosh R. Desai, Kanse Yuvraj Krishnrao:
Energy-aware multipath routing in WSN using improved invasive weed elephant herd optimization. 451-474
Volume 19, Number 4, 2023
- Syama R., Mala C.:
Context-aware behaviour prediction for autonomous driving: a deep learning approach. 477-490 - Minakshi Sharma, Rajneesh Kumar, Anurag Jain:
A distributed quality of service-enabled load balancing approach for cloud environment. 491-512 - Jayaram Boga, V. Dhilip Kumar:
Human activity recognition in WBAN using ensemble model. 513-549 - Satyaki Datta, Utkarsh:
A qualitative study proposing service quality dimensions for video-on-demand services through over-the-top medium. 550-572 - Linus T. Wilson:
The relative importance of click-through rates (CTR) versus watch time for YouTube views. 573-595 - Devid Jegerson, Matloub Hussain:
A framework for measuring the adoption factors in digital mobile payments in the COVID-19 era. 596-623 - Nishad A., Sajimon Abraham:
Contact tracing and mobility pattern detection during pandemics - a trajectory cluster based approach. 624-650
Volume 19, Number 5, 2023
- Geetha K, Brahmananda S. H:
Network traffic analysis through deep learning for detection of an army of bots in health IoT network. 653-665 - Mythili Boopathi, Meena Chavan, Jeneetha Jebanazer J, Sanjay Nakharu Prasad Kumar:
An approach for DoS attack detection in cloud computing using sine cosine anti coronavirus optimized deep maxout network. 666-688 - Arthi R., Nayana J. S., Rajarshee Mondal:
Real-time optimal protocol prediction of quantum key distribution using machine learning. 689-697 - Tulsi Pawan Fowdur, Lavesh Babooram:
Performance analysis of a cloud-based network analytics system with multiple-source data aggregation. 698-733 - Souad El Houssaini, Mohammed-Alamine El Houssaini, Jamal El Kafi:
Novel approach of detecting the black hole attack for vehicular ad-hoc networks based on capability indicators. 734-755 - Sophiya Shiekh, Mohammad Shahid, Manas Sambare, Raza Abbas Haidri, Dileep Kumar Yadav:
A load-balanced hybrid heuristic for allocation of batch of tasks in cloud computing environment. 756-781 - Nidhi Sharma, Ravindara Bhatt:
Source location privacy preservation in IoT-enabled event-driven WSNs. 782-798 - Deepak Choudhary:
Optimized security algorithm for connected vehicular network. 799-817
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.