Forthcoming Articles
International Journal of Ad Hoc and Ubiquitous Computing

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.
Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.
Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.
Online First articles are also listed here. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.
Register for our alerting service, which notifies you by email when new issues are published online.
International Journal of Ad Hoc and Ubiquitous Computing (18 papers in press) Regular Issues
Abstract: This study proposes a vital signs monitoring framework that addresses the limitations of traditional threshold-based alarms and existing deep-learning models in capturing multimodal physiological interactions and spatiotemporal dynamics. The method integrates an adaptive attention fusion mechanism that dynamically adjusts the importance of heterogeneous physiological parameters, a spatiotemporal graph neural network that jointly models inter-parameter correlations and temporal evolution using multi-scale windows, and a reinforcement learning module that enables active, strategy-driven early warning and clinical decision support. Evaluated on the MIMIC-III and eICU datasets, the proposed system achieves 96.3% anomaly detection accuracy, 38.5-minute early warning capability, and a 0.912 F1-score, outperforming existing methods. Ablation studies confirm the contributions of adaptive fusion, spatiotemporal graph modelling, and policy optimisation. Keywords: Adaptive attention mechanism; Spatiotemporal graph neural network; Vital sign monitoring; Deep reinforcement learning; Multimodal fusion. DOI: 10.1504/IJAHUC.2026.10076081
Abstract: To tackle limitations of conventional strength training movement evaluation, such as inadequate movement stage segmentation and insufficient fine-grained error perception, this study proposes ARLE-Net. This framework integrates improved YOLOv8 with CBAM attention mechanism to enhance local movement feature detection, HR-Net for high-resolution human keypoint extraction, and adaptive reinforcement learning for dynamic action segmentation and standardized score prediction. Experiments on Fitness-AQA and ARFit datasets show it outperforms state-of-the-art methods in action segmentation accuracy and score prediction mean square error, with strong stability. Ablation studies confirm component effectiveness, providing support for intelligent fitness guidance and fitting the journals enhanced ubiquitous computing focus. Keywords: Strength Training; Pose Estimation; Reinforcement Learning; Action Quality Assessment. DOI: 10.1504/IJAHUC.2026.10076102
Abstract: With the continuous advancement of intelligent vehicle technology, the smart automotive trade market has become increasingly complex and dynamic. This study proposes an intelligent forecasting framework that integrates multi-source data through a meta-learning-based approach. Specifically, a Meta-Attention Gated Recurrent Unit (MA-GRU) model is developed to enhance the accuracy and robustness of market predictions. The model first extracts key automotive performance indicators and market-related features using a GRU network, and then applies an attention mechanism to capture the most informative temporal dependencies. To address the challenge of data scarcity in the emerging smart vehicle market, meta-learning is introduced to improve the model's adaptability and generalisation across diverse datasets. Experimental evaluations demonstrate that the proposed MA-GRU framework achieves superior predictive performance even under limited data conditions, providing a solid technical foundation for market trend analysis and strategic decision-making in the intelligent automotive trade. Keywords: Intelligent marketing prediction; Intelligent cars; GRU; Meta-learning. DOI: 10.1504/IJAHUC.2026.10076104
Abstract: This paper proposes the MEPSO-Transformer (Multi-modal Emotion Perception and Strategy Optimization Transformer), a dual-task architecture designed to jointly perform emotion classification and green marketing strategy recommendation based on heterogeneous user data. The model incorporates modality-specific encoders, hierarchical gated cross-attention fusion, and two parallel decoders, and is trained under a multi-task learning scheme. To evaluate its effectiveness, experiments are conducted on three datasets: CMU-MOSEI, MELD, and a constructed domain-specific dataset, GreenPromo-Emotion, which contains 6,200 multi-modal samples annotated with seven emotional categories and five predefined marketing strategies. Results show that MEPSO-Transformer achieves an average accuracy of 84.3% and a macro-F1 score of 81.2% on CMU-MOSEI, outperforming the best baseline by +2.3% and +2.6% respectively. On MELD, the model attains a 75.0% macro-F1 and a Hit@1 score of 65.7%. These findings demonstrate the model's applicability to sustainable marketing tasks requiring real-time affective understanding and strategy selection. Keywords: Multi-modal Emotion Recognition; Green Marketing; Strategy Optimization; Transformer; Sustainable AI; Affective Computing; Multi-task Learning. DOI: 10.1504/IJAHUC.2026.10076105
Abstract: Most existing SMPC protocols assume static participants, unsuitable for dynamic scenarios where participant numbers and identities change. This paper proposes an SMPC protocol enabling dynamic participant switching, introducing a dynamically joinable model with variable committee sizes per round and supporting arbitrary member counts. It uses secret sharing to transfer computations between participants without revealing intermediates and consolidates all validations into a dedicated phase to reduce communication complexity. Experiments with 7-member committees show its communication costs (for 10,000,000 entries) outperform existing protocols. A platform based on Spring Boot and MyBatis, integrating libscapi for core crypto operations, is developed with optimised architecture and visualisation tools. The protocol offers efficient, secure solutions for data sharing and collaboration, with significant theoretical and practical value. Keywords: multiparty secure computing; secret sharing; participant role switching. DOI: 10.1504/IJAHUC.2026.10076106
Abstract: To resolve link congestion and QoS deterioration caused by Elephant Flow conflicts in data centre networks under conventional multipath routing, this study proposes an innovative dynamic load balancing model. It combines Software-Defined Networking (SDN) for centralised control with a Transformer-BiLSTM-DNN deep learning framework: the Transformer encoder grasps global spatial correlations among traffic flows, BiLSTM retrieves intricate temporal variations, and DNN achieves deep feature integration for precise load state categorisation, enabling refined proactive traffic regulation. Evaluated on Google Borg Cluster Trace v2, the model excels in key metrics like Load Balancing Degree, Job Completion Time, and resource utilization, outperforming traditional baselines significantly. Ablation tests verify the essentiality of each component, providing a sturdy intelligent approach to enhance data center network efficiency and dependability. Keywords: Data center; Load balancing; Bidirectional network; Transformer; BiLSTM; SDN scheduling. DOI: 10.1504/IJAHUC.2026.10076107
Abstract: Accurate acupoint localisation is essential for standardised acupuncture therapy and intelligent systems, yet remains challenging due to soft-tissue variability, ambiguous anatomical boundaries, and cross-domain distribution shifts. This study proposes a unified perception framework that integrates multiple complementary mechanisms within a single localisation pipeline. The proposed ACUR-Net incorporates high-resolution feature representation, geometry-aware relational modelling, uncertainty-aware regression, and domain adaptation to address anatomical variability and domain heterogeneity in a coordinated manner. The underlying assumption is that reliable acupoint localisation benefits from the joint modelling of anatomical topology, cross-domain feature alignment, and prediction uncertainty, rather than from isolated architectural modifications. Experiments conducted on the AcuSim-FAcupoint dataset show that the proposed framework achieves improved feature transfer stability and spatial consistency. Comparative evaluations indicate that ACUR-Net outperforms PFLD, PIPNet, HRNet, and ViTPose in terms of NME, PCK@0.05, and OKS-mAP. The results suggest that multi-factor integration is effective for enhancing localisation robustness under realistic conditions. Keywords: Acupuncture point recognition; Multiphysics modeling; Cross-domain adaptation; Deep learning. DOI: 10.1504/IJAHUC.2026.10076574 AI-Based Behaviour-Aware Path Risk Assessment for Wheelchair-Centric Smart Assistive Devices ![]() by Chiao-Wen Kao, Shih-Tung Wang, Chi-Sheng Huang Abstract: Mobility challenges in aging societies underscore the need for safer navigation solutions for wheelchair users, who often face hazards like uneven surfaces and indistinct curbs. Addressing these concerns, this study introduces an AI-based behavior-aware path risk assessment system designed for wheelchair-centric assistive devices. The system combines object detection and semantic segmentation to identify critical road features, such as sidewalks, curbs, and lanes. A Path Risk Assessment Module evaluates path safety using a scoring algorithm incorporating regional weighting and adjusting to varying environmental conditions. Integrating Internet of Behavior principles, the system adapts dynamically to user behaviors and conditions, offering personalized risk assessments. Tested on a custom dataset, the system demonstrated accurate real-time evaluations, with horizontal camera orientations excelling in dynamic scenarios and vertical setups suited for detailed analysis. These findings highlight its potential to enhance safety and mobility, with future work focusing on dynamic obstacles and multi-view integration for broader applications. Keywords: Behavior-Aware Systems; Smart Assistive Devices; Path Risk Assessment; Semantic Segmentation; Wheelchair-Centric. DOI: 10.1504/IJAHUC.2025.10070877 Efficient Hardware Implementation of KLEIN Cipher with Power Analysis Attack Resistance ![]() by Parthasarathy R, Saravanan Paramasivam Abstract: Lightweight hardware implementation of block ciphers is critical to ensure the safety of data in resource-constrained environments. In this work, two iterative architectures are designed for Klein-64/80/96 and implemented in both the FPGA devices and the ASIC platform. The first architecture is of 64-bit datapath size, utilized a minimum number of slices in FPGAs and exhibited very good throughput compared to the existing works in the literature. The second architecture utilised a 32-bit datapath with a minimum number of S-boxes and mixcolumns equation which resulted in an area of 1451 GE in the ASIC platform, determined using the Cadence tool and 45 nm technology library gpdk045. A Correlation power analysis attack is mounted on the FPGA implementation of KLEIN-64 and successfully extracted the 64-bit key. Threshold implementation is defined as a countermeasure to mitigate the power analysis attack and secure the hardware implementation against the power analysis attack. Keywords: KLEIN Cipher; Lightweight Cryptography; Low cost implementation; Power analysis attack; Threshold implementation. DOI: 10.1504/IJAHUC.2025.10073177 Cooperative and Multi-criteria Control Algorithm for Future mmWave SWIPT UAV Networks ![]() by Sungwook Kim Abstract: In this paper, we focus on unmanned aerial vehicles (UAVs) to realise energy-transferring and information-transmitting simultaneously in the millimetre wave (mmWave) aware network system. By using the power splitting technique, we design a new cooperative control scheme for the mmWave based simultaneous wireless information and power transfer (SWIPT) UAV system. The control approach in our proposed scheme combines the cooperative bargaining principles and multi-criteria decision-making (MCDM) concepts to achieve the efficient usage of mmWave spectrum bands in the UAV integrated SWIPT network platform. According to the reference point and aspiration point based cooperative solutions, our proposed algorithms dynamically allocate the mmWave spectrum band. Based on the MCDM method, the allocated mmWave spectrum band is split into downlink and uplink phases, and we can harvest the energy during the downlink phase. By integrating two different control mechanisms, our comprehensive control framework facilitates balanced system performance. Keywords: Unmanned aerial vehicles; mmWave spectrum band; Simultaneous wireless information and power transfer; Cooperative game solutions; Multi-criteria decision. DOI: 10.1504/IJAHUC.2025.10073625 Document-Level Event Extraction via Gated Cross-Sentence Attention Network with Global Memory ![]() by Shunyu Yao, Dan Liu, Jie Hu Abstract: Event extraction aims to detect events from text, and identify arguments of the event and its role. When event-related information is distributed in a document, event arguments are always scattered across different sentences, and multiple events may co-exist in the same document. In order to meet these challenges, we propose a novel end-to-end model Gated Cross-sentence Attention Network with Global Memory called GCANGM. To address the multi-events challenge, we introduce a global memory unit to store the current path state and event information extracted in the past. In order to handle the argument-scattering challenge, we construct a gated cross-sentence attention layer so that the entity embedding can obtain the cross-sentence contextual information in the document. To prove the effectiveness of GCANGM, we conduct experiments on the widely used large-scale document-level event extraction dataset. The experimental results show that our method is effective in the challenging document-level event extraction task. Keywords: Event Extraction; Neural Network; Attention Mechanism. DOI: 10.1504/IJAHUC.2025.10074272 Hierarchical Key Rotation, Isolation and Sensor-based Resilient Protocol for Wireless Sensor Networks ![]() by Rounak Raman, Ayush Yadav, Vatsal Chhabra, Nisha Kandhoul, S.K. Dhurandher, Isaac Woungang, Han-Chieh Chao Abstract: Ensuring a robust and secure wireless sensor network (WSN) remains a critical challenge, particularly against both internal and external threats. This paper presents a novel protocol hierarchical key rotation, isolation, and sensor-based resilient protocol (HKRISRP) designed to address the inherent security vulnerabilities in wireless sensor networks (WSNs). This approach tackles the critical challenges of dynamic threat detection and resource constraints by employing a hierarchical network architecture that integrates dynamic key rotation, lightweight encryption, and an adaptive cluster head re-election mechanism. This methodology not only enhances data confidentiality and integrity but also ensures energy efficiency and rapid threat isolation. Empirical results from both OMNeT++ simulations and hardware prototype evaluations demonstrate a throughput of 10,000 bps, an average remaining energy level of 82%, and a mean resolution time of 0.8 sec, significantly outperforming existing solutions. By introducing a robust framework for proactive threat prevention and isolation, HKRISRP offers a scalable and resilient solution for applications in military surveillance, border security, and industrial IoT environments. Keywords: Wireless sensor networks (WSNs); IoT security; Hierarchical network; Arduino; NRF module; Omnet++; Border security. DOI: 10.1504/IJAHUC.2025.10075499 Energy Harvesting-Based Routing for Prolonging Sensor Node Lifespan in Underwater Networks Using Stochastic Network Calculus ![]() by Vignesh S. R, Rajeev Sukumaran Abstract: Underwater wireless sensor networks (UWSNs) are crucial for marine monitoring, disaster prediction, and underwater surveillance, but their performance is limited by energy constraints and harsh, unpredictable environments. Conventional deterministic models fail to capture underwater randomness, leading to inefficient energy management and unreliable communication. This work proposes an adaptive framework integrating stochastic network calculus (SNC) with piezoelectric energy harvesting (PEH) to enhance energy efficiency and network reliability. The model incorporates pH-based environmental variations within the SNC framework to dynamically regulate energy utilisation. Performance is evaluated against depth-based routing (DBR) and vector-based forwarding (VBF) using metrics such as: packet delivery ratio (PDR), packet loss ratio (PLR), end-to-end delay (E2E), throughput, path loss, and energy consumption. Results show significant improvements in network lifespan, energy efficiency, latency reduction, and data reliability. The proposed probabilistic approach provides a scalable and sustainable solution for real-time, next-generation UWSNs operating in dynamic aquatic environments. Keywords: Underwater Wireless Sensor Networks (UWSNs); Stochastic Network Calculus (SNC); Piezoelectric Energy Harvesting; pH-Based Modeling; Network Sustainability. DOI: 10.1504/IJAHUC.2025.10076088 An Efficient and Secure Undeniable Signature Scheme based on Ring Learning with Error ![]() by Akanksha Singh, Harish Chandra, Saurabh Rana Abstract: This paper, proposes a novel undeniable signature scheme based on the Ring Learning with Errors (RLWE) problem, a complex lattice problem. In our scheme, authentic signatures can be validated via an interactive protocol, which guarantees that adversaries cannot forge signatures. Moreover, it ensures that honest participants consistently finish the verification procedure. Thus, the scheme is a strong and effective quantum-resistant undeniable signature scheme. Our security analysis, demonstrates resilience against both classical and quantum adversaries, based on the RLWE problem's hardness assumptions. Additionally, the Random Oracle model is utilised to evaluate our protocol's security, showing that our scheme satisfies important cryptographic properties like completeness, soundness, and unforgeability. Our work advances the feasibility of postquantum undeniable signature schemes for real-world cryptographic applications. Keywords: Digital signature; Undeniable Signature; RLWE; Lattice based Cryptography. DOI: 10.1504/IJAHUC.2026.10076212 Wireless Channel Allocation in Smart Building using Cross-Interference Model ![]() by Gabriel Galdino, Francisco Cardoso, Rafael Gomes Abstract: IoT paradigm allowed a proliferation of connected wireless devices, that utilize various technologies such as Bluetooth, Zigbee, and Wi-Fi, all operating within the common 2.4GHz frequency band. However, sharing the same frequency poses challenges due to significant interference among these devices, making their coexistence in the same environment quite daunting mainly in smart buildings. Calculating interference between devices on different floors necessitates factoring in signal loss as it passes through ceilings or floors, along with distance-related signal attenuation between the devices. Within this context, this article proposes an interference model that is applied in an algorithm to allocate the channels of the devices in a smart building environment the model proposed aims to minimize the total interference of the environment between devices using different access technologies, improving the performance of the network and the applications that rely on it leading to a suitable expectation of the network capabilities. Keywords: Wireless Channel; Smart Building; Cross-Interference; Internet of Things. DOI: 10.1504/IJAHUC.2025.10076213 Pest Classification using Hybrid Deep Learning with Optimal Feature Selection Technique ![]() by Sathya Mariappan, Mareeswari V, Aruna R, Solairaj A Abstract: This research proposes an integrated methodology for pest classification in crops using a combination of Internet of Things (IoT) sensors, image processing techniques, and machine learning models. The process begins with the acquisition of crop images in the field through IoT sensors, which are stored in a database for subsequent analysis. The proposed method utilises publicly available datasets for image processing, employing a median filter to pre-process the captured images and extract essential attributes through Haralick features and Histogram of Gradient (HoG) based feature extraction techniques. To optimize computational efficiency, the Extended Aquila Optimization (EaqO) algorithm is employed for selecting the most relevant features. The final step involves pest classification using an Attention-based DenseRecurrent Model, combining DenseNet-121, Bidirectional Gated Bidirectional Recurrent Unit (BiGRU), and attention mechanisms. The experimental findings provide enhanced accuracy, specificity, precision, recall, and F-score in pest categorization, demonstrating the efficacy of the suggested technique. Keywords: IoT-based image acquisition; pest classification; crop disease; attention-based deep learning; optimal feature selection; Aquila optimization. DOI: 10.1504/IJAHUC.2026.10076531 Energy Consumption Algorithm for Unmanned Aerial Vehicle Communication Network in Marine Environment Monitoring based on Improved Deep Reinforcement Learning ![]() by Jiayi Xin, Hongyan Xing Abstract: Internet of Things (IoT) technology and Unmanned Aerial Vehicle(UAV) communication in marine environments can improve task execution efficiency and fault tolerance. Considering the complexity of the marine environment and the energy limitations of UAV network, this paper proposes an energy optimization algorithm based on an improved deep reinforcement learning (DRL) to minimize the total energy consumption of the network. The incremental gradient descent (ISGD) method is applied to DRL, where sample updates can effectively learn from streaming data in real-time interactions, enhance the interpretability and robustness of the strategy, and supplement the requirements of DRL for adaptive large-scale optimization of UAV communication networks. The simulation results show that compared with similar algorithms, the proposed ISGD-DRL algorithm can effectively reduce the energy consumption of unmanned aerial vehicle network nodes, has better convergence, and can better achieve the collection and transmission of marine environment monitoring information based on UAV communication network. Keywords: Unmanned Aerial Vehicle(UAV); Energy Consumption; Deep Reinforcement Learning(DRL); Incremental Subgradient Descent (ISGD). DOI: 10.1504/IJAHUC.2025.10077232 Identity-Based Threshold Blind Signature Scheme in Standard Model ![]() by Qu Yunyun, Xia Wang, Cuiju Ke, Miaomiao Yang, Lunzhi Deng Abstract: The threshold blind signature scheme assigns signature capabilities to a group of signers and enables the user to acquire a messages signature issued by the signers without leaking the message content. Designing an efficient identity-based threshold blind signature scheme based on the standard model is of great significance. In this study, an identity-based threshold blind signature (IBTBS) scheme is proposed so as to achieve the decentralisation of the signer power and we prove our new schemes security which includes unforgeability, blindness and robustness in standard model. A performance comparative analysis is conducted between our new scheme and prior other schemes. The analysis shows that our new scheme is efficient which only needs three bilinear pairing operations in verification algorithm and our scheme possesses higher security. Our new scheme is identity-based which remove certificate management issue in the public key infrastructure (PKI). Keywords: threshold signature; blind signature; bilinear pairing; standard model. DOI: 10.1504/IJAHUC.2025.10077425 |
Open Access