International Journal of Pervasive Computing and Communications: Volume 20 Issue 4
Table of contents
Sentiment analysis in aspect term extraction for mobile phone tweets using machine learning techniques
Venkatesh Naramula, Kalaivania A.This paper aims to focus on extracting aspect terms on mobile phone (iPhone and Samsung) tweets using NLTK techniques on multiple aspect extraction is one of the challenges. Then…
A pervasive health care device computing application for brain tumors with machine and deep learning techniques
Sreelakshmi D., Syed InthiyazPervasive health-care computing applications in medical field provide better diagnosis of various organs such as brain, spinal card, heart, lungs and so on. The purpose of this…
A novel approach for detection and classification of re-entrant crack using modified CNNetwork
Shadrack Fred Mahenge, Ala AlsanabaniIn the purpose of the section, the cracks that are in the construction domain may be common and usually fixed with the human inspection which is at the visible range, but for the…
A lightweight and flexible mutual authentication and key agreement protocol for wearable sensing devices in WBAN
Sandeep Kumar Reddy Thota, C. Mala, Geetha KrishnanA wireless body area network (WBAN) is a collection of sensing devices attached to a person’s body that is typically used during health care to track their physical state. This…
Classification of disordered patient’s voice by using pervasive computational algorithms
Anil Kumar Maddali, Habibulla KhanCurrently, the design, technological features of voices, and their analysis of various applications are being simulated with the requirement to communicate at a greater distance…
A novel federated learning based lightweight sustainable IoT approach to identify abnormal traffic
Yasser AlharbiThis strategy significantly reduces the computational overhead and storage overhead required when using the kernel density estimation method to calculate the abnormal evaluation…
An optimized and efficient multiuser data sharing using the selection scheme design secure approach and federated learning in cloud environment
Shubangini Patil, Rekha PatilUntil now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…
IoT-based multimodal liveness detection using the fusion of ECG and fingerprint
Anil Kumar Gona, Subramoniam M.Biometric scans using fingerprints are widely used for security purposes. Eventually, for authentication purposes, fingerprint scans are not very reliable because they can be…
AI-federated novel delay-aware link-scheduling for Industry 4.0 applications in IoT networks
Suvarna Abhijit Patil, Prasad Kishor GokhaleWith the advent of AI-federated technologies, it is feasible to perform complex tasks in industrial Internet of Things (IIoT) environment by enhancing throughput of the network…
Hybrid cumulative approach for localization of nodes with adaptive threshold gradient feature on energy minimization using federated learning
Adumbabu I., K. SelvakumarLocalization of the nodes is crucial for gaining access of different nodes which would provision in extreme areas where networks are unreachable. The feature of localization of…
Video compression based on zig-zag 3D DCT and run-length encoding for multimedia communication systems
Sravanthi Chutke, Nandhitha N.M., Praveen Kumar LendaleWith the advent of technology, a huge amount of data is being transmitted and received through the internet. Large bandwidth and storage are required for the exchange of data and…
AI federated learning based improvised random Forest classifier with error reduction mechanism for skewed data sets
Anjali More, Dipti RanaReferred data set produces reliable information about the network flows and common attacks meeting with real-world criteria. Accordingly, this study aims to focus on the use of…
Secure data collection and transmission for IoMT architecture integrated with federated learning
Priyanka Kumari Bhansali, Dilendra Hiran, Kamal GulatiThe purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with…
ISSN:
1742-7371e-ISSN:
1742-738XISSN-L:
1742-7371Online date, start – end:
2005Copyright Holder:
Emerald Publishing LimitedOpen Access:
hybridEditor:
- Seng Loke