About the Journal

The Journal of Pervasive Technology publishes high-quality, peer-reviewed articles on low power technique, network security, smart grid research, multimedia codec design and developing, and not limited but, including:

• Multimedia Processing and Communication
• Low Power and High Performance Software and Hardware Design 
• Smart Grid and Its Applications 
• Advanced Security Technologies and Applications

• New, future, enhanced Technologies

The journal articles:

• Original Research Papers
• Technical Evaluations
• Case Reports on Echocardiograms
• Reviews
• Guest Editorials


Current CFP and interested areas

Section #1: Multimedia Processing and Communication
-Multimedia compression
-Multimedia communications and networking
-Interactive 3-D media and immersive environments
-Multimedia content analysis and search
-Multimedia quality assessment
-Multimedia applications and services
-Multimedia security and privacy
-Multimedia databases and digital libraries

Section #2: Low Power and High-Performance Software and Hardware Design
-Low power and high-performance system-on-chip design
-Low power and high performance embedded systems software
-Low power and high performance embedded systems hardware
-Low power and high performance real-time and cyber-physical systems
-Low power and high-performance pervasive computing technologies
-Low power and high performance emerging technologies, systems, and applications

Section #3: Advanced technology for Industrial Control System and Internet of Things
-System on Chip for ICS/IoTs
-ICS/IoT secure communications
-Protection of ICS, SCADA, DCS, RTU, PLC
-Fault-tolerant control for ICS/IoT
-Security and advanced technology for Industrial intelligence sharing platform
-Operational technology

Section #4: Advanced Security Technologies and Applications
-Key management in wireless/mobile environments
-Trust establishment
-Intrusion, attack, and malicious behavior detection
-User and location privacy
-Anonymity, prevention of traffic analysis
-Vulnerability and attack modeling
-Cross-layer design for security
-Monitoring and surveillance
-Cryptographic primitives for wireless communication
-Theoretical foundations and formal methods for wireless security and privacy
-Security/privacy in mobile/wireless cloud services

Current Issue

Vol. 1 No. 1 (2021): 1st Volume of 2021
					View Vol. 1 No. 1 (2021): 1st Volume of 2021

As the renewal special volume, this publication is to discuss advanced low-power hardware technology and leading-edge technologies in all areas of microprocessors, multimedia, smart grid, IoT/ICS, and their application and security. The special volume calls paper submissions from anyone in this field.

Published: 10/07/2021
View All Issues