Skip to Main Content
Keywords: Clustering
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
International Journal of Pervasive Computing and Communications (2024) 20 (1): 168–192.
Published: 22 May 2023
... decreasing implementation time or resource consumption is therefore encouraged. Equilibrium optimization is used to cluster the VM into underloaded and overloaded VMs initially in this research. Underloading VMs is used to improve load balance and resource utilization in the second stage. The hybrid...
Journal Articles
International Journal of Pervasive Computing and Communications (2021) 17 (1): 89–108.
Published: 01 December 2020
... 2020 Emerald Publishing Limited Licensed re-use rights only Optimization Clustering Collision GVANET ITS IWD The CO2 emission during this congestion is also high in that particular area, which causes a lot of health hazards for the people on the road. The mobility...
Journal Articles
International Journal of Pervasive Computing and Communications (2018) 14 (3-4): 233–246.
Published: 03 September 2018
...-efficient load balanced cluster-based routing protocol using ant colony optimization (LB-CR-ACO) which ultimately results in enhancement of the network lifetime of WSNs. Design/methodology/approach The proposed protocol performs optimal clustering based on cluster head selection weighing function which...
Journal Articles
International Journal of Pervasive Computing and Communications (2016) 12 (3): 290–309.
Published: 05 September 2016
... to propose a methodology that predicts a user’s location on the basis of a user’s mobility history. Design/methodology/approach Contextual information is used to find the points of interest that a user visits frequently and to determine the sequence of these visits with the aid of spatial clustering...
Journal Articles
International Journal of Pervasive Computing and Communications (2014) 10 (2): 196–211.
Published: 27 May 2014
...Sachin Dilip Babar; Neeli Rashmi Prasad; Ramjee Prasad Purpose – The paper aims to address wireless sensor network (WSN) security by proposing new cluster-based mobile key management scheme (CMKMS). The growing demands of WSNs in variety of real-time and mission-critical applications increase...
Journal Articles
International Journal of Pervasive Computing and Communications (2014) 10 (1): 27–42.
Published: 01 April 2014
... of packets in network that characterized by dynamic topologies, existence of bandwidth constrained, variable capacity links, energy constraint and nodes are highly prone to security threats. The key purpose of this paper is to overview the efficiency of the proposed clustering scheme for large-scale MANETs...
Journal Articles
International Journal of Pervasive Computing and Communications (2007) 2 (2): 81–90.
Published: 01 May 2007
...Curt Cramer; Oliver Stanze; Kilian Weniger; Martina Zitterbart Many clustering protocols for mobile ad hoc networks (MANETs) have been proposed in the literature. With only one exception so far (1), all these protocols are proactive, thus wasting bandwidth when their function is not currently...

or Create an Account

Close Modal
Close Modal