Special Issue "Pervasive Computing and Communication: Challenges, Technologies & Opportunities"

Submission Deadline: 26 October 2021 (closed)
Guest Editors
Dr. Usman Tariq, Prince Sattam Bin Abdulaziz University, Saudi Arabia.
Dr. Yasir Malik, Newyork Institute of Technology, Canada.
Dr. Shafique Chaudhry, Clarkson University, USA.
Dr. Irfan Ahmed, Virginia Commonwealth University, USA.
Dr. Adnan Shahid Khan, Universiti Malaysia Sarawak, Malaysia.


Advances in smartphones, IoTs and the scope to which they will transfuse our day-to-day living necessitates critical scrutiny. The enormous probable of Pervasive Computing is impelling research communities in numerous areas, from computing, communication, algorithms, techniques, and solutions. The special issue is targeted to serve the industrial researchers & academia and to present their state-of-art ideas and contributions towards the perspective scope and challenges.
Anticipated ideas should be innovative, unpublished, and demonstrate original in-depth essential research influences either from an operational outlook or from an application theme.

• Advances in Blockchain
• AI-powered cloud computing
• Convergence Computing
• Natural Language Processing
• Digital Economy
• Security and Privacy
• Multi-Sensory Technologies
• E-Services for Sustainable Development
• Pervasive Analytics

Published Papers
  • IoMT Enabled Melanoma Detection Using Improved Region Growing Lesion Boundary Extraction
  • Abstract The Internet of Medical Things (IoMT) and cloud-based healthcare applications, services are beneficial for better decision-making in recent years. Melanoma is a deadly cancer with a higher mortality rate than other skin cancer types such as basal cell, squamous cell, and Merkel cell. However, detection and treatment at an early stage can result in a higher chance of survival. The classical methods of detection are expensive and labor-intensive. Also, they rely on a trained practitioner's level, and the availability of the needed equipment is essential for the early detection of Melanoma. The current improvement in computer-aided systems is providing very… More
  •   Views:515       Downloads:442       Cited by:1        Download PDF

  • Partially Overlapping Channel Assignment Using Bonded and Non-Bonded Channels in IEEE 802.11n WLAN
  • Abstract Nowadays, wireless local area network (WLAN) has become prevalent Internet access due to its low-cost gadgets, flexible coverage and hassle-free simple wireless installation. WLAN facilitates wireless Internet services to users with mobile devices like smart phones, tablets, and laptops through deployment of multiple access points (APs) in a network field. Every AP operates on a frequency band called channel. Popular wireless standard such as IEEE 802.11n has a limited number of channels where frequency spectrum of adjacent channels overlaps partially with each other. In a crowded environment, users may experience poor Internet services due to channel collision i.e., interference from… More
  •   Views:554       Downloads:495        Download PDF

  • Exploring the Approaches to Data Flow Computing
  • Abstract Architectures based on the data flow computing model provide an alternative to the conventional Von-Neumann architecture that are widely used for general purpose computing. Processors based on the data flow architecture employ fine-grain data-driven parallelism. These architectures have the potential to exploit the inherent parallelism in compute intensive applications like signal processing, image and video processing and so on and can thus achieve faster throughputs and higher power efficiency. In this paper, several data flow computing architectures are explored, and their main architectural features are studied. Furthermore, a classification of the processors is presented based on whether they employ either… More
  •   Views:610       Downloads:505        Download PDF

  • Allocation and Migration of Virtual Machines Using Machine Learning
  • Abstract Cloud computing promises the advent of a new era of service boosted by means of virtualization technology. The process of virtualization means creation of virtual infrastructure, devices, servers and computing resources needed to deploy an application smoothly. This extensively practiced technology involves selecting an efficient Virtual Machine (VM) to complete the task by transferring applications from Physical Machines (PM) to VM or from VM to VM. The whole process is very challenging not only in terms of computation but also in terms of energy and memory. This research paper presents an energy aware VM allocation and migration approach to meet… More
  •   Views:716       Downloads:807        Download PDF

  • MNN-XSS: Modular Neural Network Based Approach for XSS Attack Detection
  • Abstract The rapid growth and uptake of network-based communication technologies have made cybersecurity a significant challenge as the number of cyber-attacks is also increasing. A number of detection systems are used in an attempt to detect known attacks using signatures in network traffic. In recent years, researchers have used different machine learning methods to detect network attacks without relying on those signatures. The methods generally have a high false-positive rate which is not adequate for an industry-ready intrusion detection product. In this study, we propose and implement a new method that relies on a modular deep neural network for reducing the… More
  •   Views:3412       Downloads:939        Download PDF

  • Treatment of Polio Delayed Epidemic Model via Computer Simulations
  • Abstract Through the study, the nonlinear delayed modelling has vital significance in the different field of allied sciences like computational biology, computational chemistry, computational physics, computational economics and many more. Polio is a contagious viral illness that in its most severe form causes nerve injury leading to paralysis, difficulty breathing and sometimes death. In recent years, developing regions like Asia, Africa and sub-continents facing a dreadful situation of poliovirus. That is the reason we focus on the treatment of the polio epidemic model with different delay strategies in this article. Polio delayed epidemic model is categorized into four compartments like susceptible,… More
  •   Views:625       Downloads:513        Download PDF

  • An Efficient Energy Aware Routing Mechanism for Wireless Body Area Networks
  • Abstract The accelerated development of wireless network technology has resulted in the emergence of Wireless Body Area Network (WBAN), which is a technology commonly used in the medical field. WBAN consists of tiny sensor nodes that interconnect with each other and set in the human body to collect and transmit the patient data to the physician, to monitor the patients remotely. These nodes typically have limited battery energy that led to a shortage of network lifetime. Therefore, energy efficiency is considered one of the most demanding challenges in routing design for WBAN. Many proposed routing mechanisms in WBAN did not cover… More
  •   Views:1013       Downloads:673        Download PDF