International Journal of Pervasive Computing and Communications: Volume 17 Issue 1
Table of contents - Special Issue: Next generation of pervasive computing and IoT systems
Guest Editors: V. Vinoth Kumar, Gautam Srivastava, David Asirvatham, Biplab Sikdar
Smart scheduling on cloud for IoT-based sprinkler irrigation
Mannar Mannan J., Kanimozhi Suguna S., Dhivya M., Parameswaran T.The purpose of this paper aims to reduce the manpower, electricity, and water consumption for irrigation.
Early prediction of chronic disease using an efficient machine learning algorithm through adaptive probabilistic divergence based feature selection approach
Sandeepkumar Hegde, Monica R. MundadaAccording to the World Health Organization, by 2025, the contribution of chronic disease is expected to rise by 73% compared to all deaths and it is considered as global burden of…
Performance measures of parallel tandem open queueing network
Banu Priya, Rajendran P.The authors consider parallel four-state tandem open queueing network. The queue capacity is infinite. Passenger arrival rate is Poisson distribution and service rate is…
Performance analysis of optimal cluster selection and intrusion detection by hierarchical K-means clustering with hybrid ABC-DT
Josemila Baby Jesuretnam, Jeba James RoseThis paper aims to propose a multi-dimensional hierarchical K-means clustering algorithm for the purpose of intrusion detection. Initially, the clustering set of rules is proposed…
Moving ridge neuronal espionage network simulation for reticulum invasion sensing
G. Sreeram, S. Pradeep, K. Sreenivasa Rao, B. Deevana Raju, Parveen NikhatThe paper aims to precise and fast categorization on to transaction evolves into indispensible. The effective capacity difficulty of all the IDS simulates today at below discovery…
Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack
M.B. Benjula Anbu Malar, Prabhu J.This paper aims to discuss the Silver and Golden ticket exploits that usually exists in the existing systems. To overcome these challenges, the data is first encrypted and then…
Data dissemination for green-VANETs communication: an opportunistic optimization approach
Chandramohan D., Ankur Dumka, Dhilipkumar V., Jayakumar LoganathanThis paper aims to predict the traffic and helps to find a solution. Unpredictable traffic leads more vehicles on the road. The result of which is one of the factors that…
Optimal path planning for intelligent automated wheelchair using DDSRPSO
Kalaipriyan Thirugnanasambandam, Raghav R.S., Jayakumar Loganathan, Ankur Dumka, Dhilipkumar V.This paper aims to find the optimal path using directionally driven self-regulating particle swarm optimization (DDSRPSO) with high accuracy and minimal response time.
State space classification of Markov password – an alphanumeric password authentication scheme for secure communication in cloud computing
S. Vaithyasubramanian , R. SundararajanPurpose of this study is to classify the states of Markov Chain for the implementation of Markov Password for effective security. Password confirmation is more often required in…
Architecture for an efficient MBIST using modified March-y algorithms to achieve optimized communication delay and computational speed
Nisha O.S., Sivasankar K.In this work, an efficient architecture for memory built in self-test (MBIST) that incorporates a modified March Y algorithm using concurrent technique and a modified linear…
ISSN:
1742-7371e-ISSN:
1742-738XISSN-L:
1742-7371Online date, start – end:
2005Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Seng Loke