default search action
International Journal of Cloud Computing, Volume 12
Volume 12, Number 1, 2023
- Dilay Parmar, Padmaja Joshi, Udai Pratap Rao, A. Sathish Kumar, Ashwin Nivangune:
A discovery and selection protocol for decentralised cloudlet systems. 1-22 - Sebastian Floerecke, Christoph Ertl, Alexander Bogislav Herzfeldt:
Major drivers for the rising dominance of the hyperscalers in the infrastructure as a service market segment. 23-39 - Alaeldin Alkhasawneh, Fawaz A. Khasawneh:
Legal issues of consumer privacy protection in the cloud computing environment: analytic study in GDPR, and USA legislations. 40-62 - Sivasamy Ramasamy, N. Paranjothi:
Modelling of a cloud platform via M/M1 + M2/1 queues of a Jackson network. 63-71 - Raziqa Masood, Nitin Pandey, Q. P. Rana:
Towards P2P dynamic-hash-table-based public auditing for cloud data privacy, security and integrity. 72-89 - Zdzislaw Polkowski, Sambit Kumar Mishra, Brojo Kishore Mishra, Samarjeet Borah, Anita Mohanty:
Impact of internet of things in social and agricultural domains in rural sector: a case study. 90-105
Volume 12, Numbers 2/3/4, 2023
- Sandhya Narayanan, Philip Samuel, Mariamma Chacko:
Data centric redundancy elimination for network data traffic. 107-117 - I. G. Hemanandhini, R. Pavithra, P. Sugantha Priyadharshini:
Minimising power utilisation in cloud data centres using optimised virtual machine migration and rack consolidation. 118-133 - R. Suganya, Niju P. Joseph, R. Rajadevi, S. Ramamoorthy:
Enhancing the job scheduling procedure to develop an efficient cloud environment using near optimal clustering algorithm. 134-147 - M. Jeyakarthic, N. Subalakshmi:
Energy saving slot allocation-based multicast routing in cloud wireless mesh network. 148-162 - Mohamed M. Abbassy, Waleed M. Ead:
Fog computing-based public e-service application in service-oriented architecture. 163-177 - N. Krishnamoorthy, K. Venkatachalam, R. Manikandan, P. Prabhu:
Novel task assignment policies using enhanced hyper-heuristic approach in cloud. 178-190 - P. S. Prakash, S. Balakrishnan, K. Venkatachalam, Saravana Balaji Balasubramanian:
A new method for human activity identification using convolutional neural networks. 191-200 - Shiny Mukkath I., Nirmala Devi M.:
PUF based on chip comparison technique for trustworthy scan design data security against side channel attack. 201-223 - D. Karthika, K. Kalaiselvi:
Parallel progressive-based inductive subspace and fuzzy-based firefly algorithm for high ensemble data clustering. 224-245 - N. Jayashri, K. Kalaiselvi:
Secured file transmission in knowledge management-cloud. 246-260 - Manoranjan Parhi, Binod Kumar Pattanayak:
An effective mechanism for ontology-based cloud service discovery and selection using Aneka cloud application platform. 261-276 - Swetha P, Dayananda Rangapura Basavaraju:
A customer churn prediction model in telecom industry using Improved_XGBoost. 277-294 - Silambarasan Elkana Ebinazer, Nickolas Savarimuthu, S. Mary Saira Bhanu:
A hybrid encryption for secure data deduplication the cloud. 295-307 - Avijit Mondal, Radha Tamal Goswami:
Ad-hoc networks: new detection and prevention approach to malicious attacks using Honeypot. 308-323 - Nasr Almurisi, Srinivasulu Tadisetty:
Development of innovative cloud-based IoMD architecture for elder population monitoring. 324-339 - Imad Lamouik, Ali Yahyaouy, My Abdelouahed Sabri:
Distributed multi-cluster dynamic Q-routing for large size traffic grids. 340-353 - Mohan Nagamunthala, R. Manjula:
Self-evident rapid and scalable fortification encryption with data access organise in multiuser cloud environments. 354-366 - Rani, Amita Malik:
Resource-aware routing in opportunistic networks: existing protocols and open research issues. 367-398 - T. Shreekumar, K. Karunakara:
Hybrid dense matching features for cloud-based face recognition. 399-423 - M. P. Abdul Razaak, Gufran Ahmad Ansari:
Greedy-based task scheduling algorithm for minimising energy and power consumption for virtual machines in cloud environment. 424-434
Volume 12, Number 5, 2023
- S. Meena, V. Gayathri:
Preserving personal health records security and privacy using C-R3D algorithm and multimodal biometric authentication. 435-449 - B. S. Kiruthika Devi, T. Subbulakshmi:
Intrusion detection and prevention of DDoS attacks in cloud computing environment: a review on issues and current methods. 450-481 - A. Syed Ismail, S. Asha:
A novel redundancy technique to enhance the security of cloud computing. 482-496 - S. Palani, K. Ramesh Babu:
EARA-PSOCAE: an energy aware resource allocation and particle swarm optimisation based cryptographic algorithm in e-healthcare cloud environment. 497-513 - Shahbaz Afzal, G. Kavitha, Amir Ahmad Dar:
An application of Taguchi L16 method for optimisation of load balancing process parameters in cloud computing. 514-529
Volume 12, Number 6, 2023
- Basappa B. Kodada, Demian Antony D'Mello:
FSACE: finite state automata-based client-side encryption for secure data deduplication in cloud computing. 531-555 - Deepak Kapgate:
Predictive data centre selection scheme for response time optimisation in cloud computing. 556-574 - Shreya Oswal, Shubham Gundawar, Varun Modani, Ashwini Shingare:
Automation of franchise-based data storage, management and analysis using Amazon Web Services. 575-585 - Narayani Raman, Aisha Banu Wahab:
PSO optimised workflow scheduling and VM replacement algorithm using gaming concept in cloud data centre. 586-604 - Isha Agarwal, Swati Gupta, Ravi Shankar Singh:
A novel hybrid algorithm for workflow scheduling in cloud. 605-620
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.