Special Issues
Table of Content

Innovations in Pervasive Computing and Communication Technologies

Submission Deadline: 14 March 2023 (closed) View: 161

Guest Editors

Dr. Usman Tariq, Prince Sattam Bin Abdulaziz University, Saudi Arabia.
Dr. Shafique Chaudhry, Clarkson University, USA.
Dr. Irfan Ahmed, Virginia Commonwealth University, USA.
Dr. Adnan Shahid Khan, Universiti Malaysia Sarawak, Malaysia.
Dr. Yasir Malik, Bishops University, Canada.

Summary

The Internet of Things (IoT), Industrial Internet of Things (IIoT), and Internet of Medical Things (IoMT) are all types of interconnected devices that eligibly can power the next generation of smart environments. These devices can transmit the necessary data via wireless technology and by utilizing the cloud-computing infrastructure. Low latency and fully autonomous operations are fundamental requirements for the effective process execution. The advent of intelligent computerization has made it possible for the concepts of artificial intelligence to enhance both digital and physical business operations in a manner that is consistent, uninterrupted, and safe.
The special issue is targeted to serve the industrial researchers & academia and to present their state-of-art ideas and contributions towards the perspective scope and challenges. Anticipated ideas should be innovative, unpublished, and demonstrate original in-depth essential research influences either from an operational outlook or from an application theme.
• Artificial Intelligence (AI) driven IoT system engineering 
• Intelligent workflows for smart environments
• Advances in Blockchain
• Prediction modeling using data, algorithms, and machine learning 
• Smart Healthcare (Reliable Connectivity, Cybersecurity, and Platform Scalability)
• Green Industry 4.0 
• Pervasive Analytics for Intelligent Systems
• Mobile cloud computing intrusion detection systems
• Evolutionary algorithms for mining smart-network environments for decision support
• Security and Privacy


Keywords

Artificial Intelligence (AI).
Smart Environments. 
Blockchain.
Prediction Modeling. 
Cybersecurity. 
Platform Scalability. 
Industry 4.0. 
Pervasive Analytics. 

Published Papers


  • Open Access

    ARTICLE

    YOLO and Blockchain Technology Applied to Intelligent Transportation License Plate Character Recognition for Security

    Fares Alharbi, Reem Alshahrani, Mohammed Zakariah, Amjad Aldweesh, Abdulrahman Abdullah Alghamdi
    CMC-Computers, Materials & Continua, Vol.77, No.3, pp. 3697-3722, 2023, DOI:10.32604/cmc.2023.040086
    (This article belongs to the Special Issue: Innovations in Pervasive Computing and Communication Technologies)
    Abstract Privacy and trust are significant issues in intelligent transportation systems (ITS). Data security is critical in ITS systems since sensitive user data is communicated to another user over the internet through wireless devices and routes such as radio channels, optical fiber, and blockchain technology. The Internet of Things (IoT) is a network of connected, interconnected gadgets. Privacy issues occasionally arise due to the amount of data generated. However, they have been primarily addressed by blockchain and smart contract technology. While there are still security issues with smart contracts, primarily due to the complexity of writing… More >

  • Open Access

    ARTICLE

    A Machine Learning-Based Attack Detection and Prevention System in Vehicular Named Data Networking

    Arif Hussain Magsi, Ali Ghulam, Saifullah Memon, Khalid Javeed, Musaed Alhussein, Imad Rida
    CMC-Computers, Materials & Continua, Vol.77, No.2, pp. 1445-1465, 2023, DOI:10.32604/cmc.2023.040290
    (This article belongs to the Special Issue: Innovations in Pervasive Computing and Communication Technologies)
    Abstract Named Data Networking (NDN) is gaining a significant attention in Vehicular Ad-hoc Networks (VANET) due to its in-network content caching, name-based routing, and mobility-supporting characteristics. Nevertheless, existing NDN faces three significant challenges, including security, privacy, and routing. In particular, security attacks, such as Content Poisoning Attacks (CPA), can jeopardize legitimate vehicles with malicious content. For instance, attacker host vehicles can serve consumers with invalid information, which has dire consequences, including road accidents. In such a situation, trust in the content-providing vehicles brings a new challenge. On the other hand, ensuring privacy and preventing unauthorized access… More >

  • Open Access

    ARTICLE

    Adaptive Momentum-Backpropagation Algorithm for Flood Prediction and Management in the Internet of Things

    Jayaraj Thankappan, Delphin Raj Kesari Mary, Dong Jin Yoon, Soo-Hyun Park
    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 1053-1079, 2023, DOI:10.32604/cmc.2023.038437
    (This article belongs to the Special Issue: Innovations in Pervasive Computing and Communication Technologies)
    Abstract Flooding is a hazardous natural calamity that causes significant damage to lives and infrastructure in the real world. Therefore, timely and accurate decision-making is essential for mitigating flood-related damages. The traditional flood prediction techniques often encounter challenges in accuracy, timeliness, complexity in handling dynamic flood patterns and leading to substandard flood management strategies. To address these challenges, there is a need for advanced machine learning models that can effectively analyze Internet of Things (IoT)-generated flood data and provide timely and accurate flood predictions. This paper proposes a novel approach-the Adaptive Momentum and Backpropagation (AM-BP) algorithm-for… More >

  • Open Access

    ARTICLE

    A New Partial Task Offloading Method in a Cooperation Mode under Multi-Constraints for Multi-UE

    Shengyao Sun, Ying Du, Jiajun Chen, Xuan Zhang, Jiwei Zhang, Yiyi Xu
    CMC-Computers, Materials & Continua, Vol.76, No.3, pp. 2879-2900, 2023, DOI:10.32604/cmc.2023.037483
    (This article belongs to the Special Issue: Innovations in Pervasive Computing and Communication Technologies)
    Abstract In Multi-access Edge Computing (MEC), to deal with multiple user equipment (UE)’s task offloading problem of parallel relationships under the multi-constraints, this paper proposes a cooperation partial task offloading method (named CPMM), aiming to reduce UE's energy and computation consumption, while meeting the task completion delay as much as possible. CPMM first studies the task offloading of single-UE and then considers the task offloading of multi-UE based on single-UE task offloading. CPMM uses the critical path algorithm to divide the modules into key and non-key modules. According to some constraints of UE-self when offloading tasks,… More >

  • Open Access

    ARTICLE

    Survey of Resources Allocation Techniques with a Quality of Service (QoS) Aware in a Fog Computing Environment

    Wan Norsyafizan W. Muhamad, Kaharudin Dimyati, Muhammad Awais Javed, Suzi Seroja Sarnin, Divine Senanu Ametefe
    CMC-Computers, Materials & Continua, Vol.76, No.1, pp. 1291-1308, 2023, DOI:10.32604/cmc.2023.037214
    (This article belongs to the Special Issue: Innovations in Pervasive Computing and Communication Technologies)
    Abstract The tremendous advancement in distributed computing and Internet of Things (IoT) applications has resulted in the adoption of fog computing as today’s widely used framework complementing cloud computing. Thus, suitable and effective applications could be performed to satisfy the applications’ latency requirement. Resource allocation techniques are essential aspects of fog networks which prevent unbalanced load distribution. Effective resource management techniques can improve the quality of service metrics. Due to the limited and heterogeneous resources available within the fog infrastructure, the fog layer’s resources need to be optimised to efficiently manage and distribute them to different… More >

Share Link