International Journal of Pervasive Computing and Communications: Volume 19 Issue 1
Table of contents
5G heterogeneous network (HetNets): a self-optimization technique for vertical handover management
Kotaru Kiran, Rajeswara Rao D.Vertical handover has been grown rapidly due to the mobility model improvements. These improvements are limited to certain circumstances and do not provide the support in the…
A network controlled vertical handoff mechanism for heterogeneous wireless network using optimized support vector neural network
Mithun B. Patil, Rekha PatilVertical handoff mechanism (VHO) becomes very popular because of the improvements in the mobility models. These developments are less to certain circumstances and thus do not…
NFC and IoT-based electronic health card for elementary students using sensor fusion method
Noor Cholis Basjaruddin, Faris Rifqi Fakhrudin, Yana Sudarsa, Fatimah NoorIn the context of overcoming malnutrition in elementary school children and increasing public awareness of this issue, the Indonesian Government has created a “Card for Healthy…
Adaptive IWD-based algorithm for deployment of business processes into cloud federations
Hamidreza Nasiriasayesh, Alireza Yari, Eslam NazemiThe concept of business process (BP) as a service is a new solution in enterprises for the purpose of using specific BPs. BPs represent combinations of software services that must…
Metaheuristic based auto-scaling for microservices in cloud environment: a new container-aware application scheduling
Subramonian Krishna SarmaThe cloud is a network of servers to share computing resources to run applications and data storage that offers services in various flavours, namely, infrastructure as a service…
Seek-and-destroy algorithm for optimal resource allocation and security analysis in software-defined vehicular networks
Umesh K. Raut, L.K. VishwamitraSoftware-define vehicular networks (SDVN) assure the direct programmability for controlling the vehicles with improved accuracy and flexibility. In this research, the resource…
Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM
Mohandas V. Pawar, Anuradha J.This study aims to present a novel system for detection and prevention of black hole and wormhole attacks in wireless sensor network (WSN) based on deep learning model. Here…
Designing obstacle’s map of an unknown place using autonomous drone navigation and web services
Jitender Tanwar, Sanjay Kumar Sharma, Mandeep MittalDrones are used in several purposes including examining areas, mapping surroundings and rescue mission operations. During these tasks, they could encounter compound surroundings…
ISSN:
1742-7371e-ISSN:
1742-738XISSN-L:
1742-7371Online date, start – end:
2005Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Seng Loke