IRO Journals

Journal of Ubiquitous Computing and Communication Technologies

Comparison of Stock Price Prediction Models using Pre-trained Neural Networks
Volume-3 | Issue-2

Efficient Two Stage Identification for Face mask detection using Multiclass Deep Learning Approach
Volume-3 | Issue-2

Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division
Volume-3 | Issue-2

Blockchain Framework for Communication between Vehicle through IoT Devices and Sensors
Volume-3 | Issue-2

Gas Leakage Detection in Pipeline by SVM classifier with Automatic Eddy Current based Defect Recognition Method
Volume-3 | Issue-3

A Review on Data Securing Techniques using Internet of Medical Things
Volume-3 | Issue-3

Machine Learning Algorithms Performance Analysis for VLSI IC Design
Volume-3 | Issue-2

Maximizing the Prediction Accuracy in Tweet Sentiment Extraction using Tensor Flow based Deep Neural Networks
Volume-3 | Issue-2

Assimilation of IoT sensors for Data Visualization in a Smart Campus Environment
Volume-3 | Issue-4

DDOS ATTACK DETECTION IN TELECOMMUNICATION NETWORK USING MACHINE LEARNING
Volume-1 | Issue-1

Gas Leakage Detection in Pipeline by SVM classifier with Automatic Eddy Current based Defect Recognition Method
Volume-3 | Issue-3

Design an Adaptive Hybrid Approach for Genetic Algorithm to Detect Effective Malware Detection in Android Division
Volume-3 | Issue-2

Comparison of Stock Price Prediction Models using Pre-trained Neural Networks
Volume-3 | Issue-2

Construction of a Framework for Selecting an Effective Learning Procedure in the School-Level Sector of Online Teaching Informatics
Volume-3 | Issue-4

Machine Learning Algorithms Performance Analysis for VLSI IC Design
Volume-3 | Issue-2

Efficient Two Stage Identification for Face mask detection using Multiclass Deep Learning Approach
Volume-3 | Issue-2

Characterizing WDT subsystem of a Wi-Fi controller in an Automobile based on MIPS32 CPU platform across PVT
Volume-2 | Issue-4

Assimilation of IoT sensors for Data Visualization in a Smart Campus Environment
Volume-3 | Issue-4

Design of Data Mining Techniques for Online Blood Bank Management by CNN Model
Volume-3 | Issue-3

Ethereum and IOTA based Battery Management System with Internet of Vehicles
Volume-3 | Issue-3

Home / Archives / Volume-2 / Issue-2 / Article-5

Volume - 2 | Issue - 2 | june 2020

Computational Enhancements of Wearable Healthcare Devices on Pervasive Computing System
Pages: 98-108
Published
27 May, 2020
Abstract

The diverse user demands in the system supported with the internet of things are often managed efficiently, using the computing system that is pervasive. Pervasive computing system in an integration of heterogeneous distributed network and communication technologies and other referred as the ubiquitous computing. All though it handles the user requirement properly. The ingenuousness in the conveyance of the information, in the standard of handling and extending the heterogeneity assistance for the dispersed clients are still under construction in the as it is very challenging in the pervasive computing system. In order to provide proper and a steadfast communication for the users using an IOT based wearable health care device the paper introduces the new dispersed and elastic computing model (DECM). The developed system utilizes the recurrent-learning for the examining the allocation of resources according to the requirements as well as the allotment aspects. Based on the determined requirements of the resources, the pervasive computing system provide services to the user in the end with minimized delay and enhanced rate of communication for the health care wearable devices. The developed system emphasis also on managing the mobility, apart from allocation of resources and distribution for proper data conveyance over the wearable health care device. The working of the laid out system is determined by the experimental analysis. The constancy of the model developed is demonstrated utilizing the metrics such as the failure of request, time of response, managed and backlogged requests, bandwidth as well as storage used. The developed model heightens the number of request managed properly (handled) along with the bandwidth and storage and minimizes the failure in requests, backlogs and the time taken for response.

Keywords

Internet of Things Wearable Devices Pervasive Computing Computational Improvements Healthcare

Full Article PDF Download Article PDF 
×

Currently, subscription is the only source of revenue. The subscription resource covers the operating expenses such as web presence, online version, pre-press preparations, and staff wages.

To access the full PDF, please complete the payment process.

Subscription Details

Category Fee
Article Access Charge
For single article (Indian)
1,200 INR
Article Access Charge
For single article (non-Indian)
15 USD
Open Access Fee (Indian) 5,000 INR
Open Access Fee (non-Indian) 80 USD
Annual Subscription Fee
For 1 Journal (Indian)
15,000 INR
Annual Subscription Fee
For 1 Journal (non-Indian)
200 USD
secure PAY INR / USD
Subscription form: click here