International Journal of Pervasive Computing and Communications: Volume 19 Issue 1

Subjects:

Table of contents

5G heterogeneous network (HetNets): a self-optimization technique for vertical handover management

Kotaru Kiran, Rajeswara Rao D.

Vertical handover has been grown rapidly due to the mobility model improvements. These improvements are limited to certain circumstances and do not provide the support in the…

A network controlled vertical handoff mechanism for heterogeneous wireless network using optimized support vector neural network

Mithun B. Patil, Rekha Patil

Vertical handoff mechanism (VHO) becomes very popular because of the improvements in the mobility models. These developments are less to certain circumstances and thus do not…

NFC and IoT-based electronic health card for elementary students using sensor fusion method

Noor Cholis Basjaruddin, Faris Rifqi Fakhrudin, Yana Sudarsa, Fatimah Noor

In the context of overcoming malnutrition in elementary school children and increasing public awareness of this issue, the Indonesian Government has created a “Card for Healthy…

Adaptive IWD-based algorithm for deployment of business processes into cloud federations

Hamidreza Nasiriasayesh, Alireza Yari, Eslam Nazemi

The concept of business process (BP) as a service is a new solution in enterprises for the purpose of using specific BPs. BPs represent combinations of software services that must…

Metaheuristic based auto-scaling for microservices in cloud environment: a new container-aware application scheduling

Subramonian Krishna Sarma

The cloud is a network of servers to share computing resources to run applications and data storage that offers services in various flavours, namely, infrastructure as a service…

Seek-and-destroy algorithm for optimal resource allocation and security analysis in software-defined vehicular networks

Umesh K. Raut, L.K. Vishwamitra

Software-define vehicular networks (SDVN) assure the direct programmability for controlling the vehicles with improved accuracy and flexibility. In this research, the resource…

107

Detection and prevention of black-hole and wormhole attacks in wireless sensor network using optimized LSTM

Mohandas V. Pawar, Anuradha J.

This study aims to present a novel system for detection and prevention of black hole and wormhole attacks in wireless sensor network (WSN) based on deep learning model. Here…

Designing obstacle’s map of an unknown place using autonomous drone navigation and web services

Jitender Tanwar, Sanjay Kumar Sharma, Mandeep Mittal

Drones are used in several purposes including examining areas, mapping surroundings and rescue mission operations. During these tasks, they could encounter compound surroundings…

Cover of International Journal of Pervasive Computing and Communications

ISSN:

1742-7371

Online date, start – end:

2005

Copyright Holder:

Emerald Publishing Limited

Open Access:

hybrid

Editor:

  • Lizzy Seal