International Journal of Pervasive Computing and Communications: Volume 20 Issue 4

Subjects:

Table of contents

Sentiment analysis in aspect term extraction for mobile phone tweets using machine learning techniques

Venkatesh Naramula, Kalaivania A.

This paper aims to focus on extracting aspect terms on mobile phone (iPhone and Samsung) tweets using NLTK techniques on multiple aspect extraction is one of the challenges. Then…

A pervasive health care device computing application for brain tumors with machine and deep learning techniques

Sreelakshmi D., Syed Inthiyaz

Pervasive health-care computing applications in medical field provide better diagnosis of various organs such as brain, spinal card, heart, lungs and so on. The purpose of this…

A novel approach for detection and classification of re-entrant crack using modified CNNetwork

Shadrack Fred Mahenge, Ala Alsanabani

In the purpose of the section, the cracks that are in the construction domain may be common and usually fixed with the human inspection which is at the visible range, but for the…

A lightweight and flexible mutual authentication and key agreement protocol for wearable sensing devices in WBAN

Sandeep Kumar Reddy Thota, C. Mala, Geetha Krishnan

A wireless body area network (WBAN) is a collection of sensing devices attached to a person’s body that is typically used during health care to track their physical state. This…

Classification of disordered patient’s voice by using pervasive computational algorithms

Anil Kumar Maddali, Habibulla Khan

Currently, the design, technological features of voices, and their analysis of various applications are being simulated with the requirement to communicate at a greater distance…

A novel federated learning based lightweight sustainable IoT approach to identify abnormal traffic

Yasser Alharbi

This strategy significantly reduces the computational overhead and storage overhead required when using the kernel density estimation method to calculate the abnormal evaluation…

An optimized and efficient multiuser data sharing using the selection scheme design secure approach and federated learning in cloud environment

Shubangini Patil, Rekha Patil

Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for…

IoT-based multimodal liveness detection using the fusion of ECG and fingerprint

Anil Kumar Gona, Subramoniam M.

Biometric scans using fingerprints are widely used for security purposes. Eventually, for authentication purposes, fingerprint scans are not very reliable because they can be…

AI-federated novel delay-aware link-scheduling for Industry 4.0 applications in IoT networks

Suvarna Abhijit Patil, Prasad Kishor Gokhale

With the advent of AI-federated technologies, it is feasible to perform complex tasks in industrial Internet of Things (IIoT) environment by enhancing throughput of the network…

Hybrid cumulative approach for localization of nodes with adaptive threshold gradient feature on energy minimization using federated learning

Adumbabu I., K. Selvakumar

Localization of the nodes is crucial for gaining access of different nodes which would provision in extreme areas where networks are unreachable. The feature of localization of…

Video compression based on zig-zag 3D DCT and run-length encoding for multimedia communication systems

Sravanthi Chutke, Nandhitha N.M., Praveen Kumar Lendale

With the advent of technology, a huge amount of data is being transmitted and received through the internet. Large bandwidth and storage are required for the exchange of data and…

AI federated learning based improvised random Forest classifier with error reduction mechanism for skewed data sets

Anjali More, Dipti Rana

Referred data set produces reliable information about the network flows and common attacks meeting with real-world criteria. Accordingly, this study aims to focus on the use of…

Secure data collection and transmission for IoMT architecture integrated with federated learning

Priyanka Kumari Bhansali, Dilendra Hiran, Kamal Gulati

The purpose of this paper is to secure health data collection and transmission (SHDCT). In this system, a native network consists of portable smart devices that interact with…

Cover of International Journal of Pervasive Computing and Communications

ISSN:

1742-7371

e-ISSN:

1742-738X

ISSN-L:

1742-7371

Online date, start – end:

2005

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Seng Loke