default search action
Journal of Cloud Computing, Volume 11
Volume 11, 2022
- Amro Al-Said Ahmad, Peter Andras:
Scalability resilience framework using application-level fault injection for cloud-based software services. 1 - Manxiang Yang, Baopeng Ye, Yuling Chen, Tao Li, Yixian Yang, Xiaobin Qian, Xiaomei Yu:
A trusted de-swinging k-anonymity scheme for location privacy protection. 2 - Tao Zheng, Jian Wan, Jilin Zhang, Congfeng Jiang:
Deep Reinforcement Learning-Based Workload Scheduling for Edge Computing. 3 - Xiaohong Zhang, Zilong Song, Ata Jahangir Moshayedi:
Security scheduling and transaction mechanism of virtual power plants based on dual blockchains. 4 - Lucas Borges de Moraes, Rafael Stubs Parpinelli, Adriano Fiorese:
Application of deterministic, stochastic, and hybrid methods for cloud provider selection. 5 - Norisvaldo Ferraz Junior, Anderson Aparecido Alves da Silva, Adilson Eduardo Guelfi, Sergio Takeo Kofuji:
Performance evaluation of publish-subscribe systems in IoT using energy-efficient and context-aware secure messages. 6 - Yanyan Ji, Bilin Shao, Jinyong Chang, Maozhi Xu, Rui Xue:
Identity-based remote data checking with a designated verifier. 7 - Doyel Pal, Praveen Khethavath, Johnson P. Thomas, Utpal Mangla:
KeyPIn - mitigating the free rider problem in the distributed cloud based on Key, Participation, and Incentive. 8 - Xingwang Huang, Ling-qing Chen, Yuxin Zhang, Shubin Su, Yangbin Lin, Xuhui Cao:
Improved firefly algorithm with courtship learning for unrelated parallel machine scheduling problem with sequence-dependent setup times. 9 - Ningbin Yang, Quan Zhou, Qiong Huang, Chunming Tang:
Multi-Recipient encryption with keyword search without pairing for cloud storage. 10 - Ilksen Çaglar, Deniz Turgay Altilar:
Look-ahead energy efficient VM allocation approach for data centers. 11 - Chunming Rong, Jiahui Geng, Thomas J. Hacker, Haakon Bryhni, Martin Gilje Jaatun:
OpenIaC: open infrastructure as code - the network is my computer. 12 - Ghazaleh Khojasteh Toussi, Mahmoud Naghibzadeh, Saeid Abrishami, Hoda Taheri, Hamid Abrishami:
EDQWS: an enhanced divide and conquer algorithm for workflow scheduling in cloud. 13 - Junling Guo, Lidong Han, Guang Yang, Xuejiao Liu, Chengliang Tian:
An improved secure designated server public key searchable encryption scheme with multi-ciphertext indistinguishability. 14 - Nweso Emmanuel Nwogbaga, Rohaya Latip, Lilly Suriani Affendey, Amir Rizaan Abdul Rahiman:
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection. 15 - Lin Li, Li Liu, Shalin Huang, Shibiao Lv, Kaibiao Lin, Shunzhi Zhu:
Agent-based multi-tier SLA negotiation for intercloud. 16 - Shichao Li, Ning Zhang, Ruihong Jiang, Zou Zhou, Fei Zheng, Guiqin Yang:
Joint task offloading and resource allocation in mobile edge computing with energy harvesting. 17 - Qinghua Luo, Xiaozhen Yan, Chenxu Wang, Yang Shao, Zhiquan Zhou, Jianfeng Li, Cong Hu, Chuntao Wang, Jinfeng Ding:
A SINS/DVL/USBL integrated navigation and positioning IoT system with multiple sources fusion and federated Kalman filter. 18 - Jiaji Shen, Wen Huang, Qiang Hu:
PICF-LDA: a topic enhanced LDA with probability incremental correction factor for Web API service clustering. 19 - Quan Chen, Liangshun Wu, Congshi Jiang:
ES-PPDA: an efficient and secure privacy-protected data aggregation scheme in the IoT with an edge-based XaaS architecture. 20 - Ismail Mohamed, Hassan Al-Mahdi, Mohamed Tahoun, Hamed Nassar:
Characterization of task response time in fog enabled networks using queueing theory under different virtualization modes. 21 - Tao Hai, Jincheng Zhou, S. R. Srividhya, Sanjiv Kumar Jain, Praise Young, Shweta Agrawal:
BVFLEMR: an integrated federated learning and blockchain technology for cloud-based medical records recommendation system. 22 - Lei Zhang, Ke Pang, Jiangtao Xu, Bingxin Niu:
JSON-based control model for SQL and NoSQL data conversion in hybrid cloud database. 23 - Blend Berisha, Endrit Mëziu, Isak Shabani:
Big data analytics in Cloud computing: an overview. 24 - Iman Kohyarnejadfard, Daniel Aloise, Seyed Vahid Azhari, Michel R. Dagenais:
Anomaly detection in microservice environments using distributed tracing data analysis and NLP. 25 - Edeh Michael Onyema, Surjeet Dalal, Carlos Andrés Tavera Romero, Bijeta Seth, Praise Young, Mohd Anas Wajid:
Design of Intrusion Detection System based on Cyborg intelligence for security of Cloud Network Traffic of Smart Cities. 26 - Zeshun Shi, Veno Ivankovic, Siamak Farshidi, Jayachander Surbiryala, Huan Zhou, Zhiming Zhao:
AWESOME: an auction and witness enhanced SLA model for decentralized cloud marketplaces. 27 - Anand Kumar Mishra, Emmanuel S. Pilli, Mahesh Chandra Govil:
CONTAIN4n6: a systematic evaluation of container artifacts. 28 - Yiguang Gong, Kai Chen, Tianyu Niu, Yunping Liu:
Grid-Based coverage path planning with NFZ avoidance for UAV using parallel self-adaptive ant colony optimization algorithm in cloud IoT. 29 - Jiayan Gu, Ashiq Anjum, Yan Wu, Lu Liu, John Panneerselvam, Yao Lu, Bo Yuan:
The least-used key selection method for information retrieval in large-scale Cloud-based service repositories. 30 - Yu Fu, Xueyuan Duan, Kun Wang, Bin Li:
Low-rate Denial of Service attack detection method based on time-frequency characteristics. 31 - Tao Hai, Jincheng Zhou, Ning Li, Sanjiv Kumar Jain, Shweta Agrawal, Imed Ben Dhaou:
Cloud-based bug tracking software defects analysis using deep learning. 32 - Saravanan Muniswamy, Radhakrishnan Vignesh:
DSTS: A hybrid optimal and deep learning for dynamic scalable task scheduling on container cloud environment. 33 - Qian Cao, Bo Liu, Ying Jin:
Locality sensitive hashing-aware fruit fly optimization algorithm and its application in edge server placement. 34 - Yi-jie Bian, Lu Xie, Jing-qi Li:
Research on influencing factors of artificial intelligence multi-cloud scheduling applied talent training based on DEMATEL-TAISM. 35 - Shaojun Zou, Wei Ji, Jiawei Huang:
BTP: automatic identification and prediction of tasks in data center networks. 36 - Fang Yin, Xiong Yin, Jincheng Zhou, Xinli Zhang, Ruihua Zhang, Ebuka Ibeke, Marvellous GodsPraise Iwendi, Mohammad Shah:
Tourism cloud management system: the impact of smart tourism. 37 - Yu Xie, Kuilin Zhang, Huaizhen Kou, Mohammad Jafar Mokarram:
Private anomaly detection of student health conditions based on wearable sensors in mobile cloud computing. 38 - Xiaoyue Feng, Chaopeng Guo, Tianzhe Jiao, Jie Song:
A maturity model for AI-empowered cloud-native databases: from the perspective of resource management. 39 - Amr Adel:
Future of industry 5.0 in society: human-centric solutions, challenges and prospective research areas. 40 - Ponnan Suresh, Tikkireddi Aditya Kumar, Hemakumar VS, Sakthieswaran Natarajan, Mohd Asif Shah:
Congestion aware low power on chip protocols with network on chip with cloud security. 41 - Yu Zhou, Hui Ge, Bowen Ma, Shuhang Zhang, Jiwei Huang:
Collaborative task offloading and resource allocation with hybrid energy supply for UAV-assisted multi-clouds. 42 - Fang Yin, Xiaomei Jiao, Jincheng Zhou, Xiong Yin, Ebuka Ibeke, Marvellous GodsPraise Iwendi, Cresantus Biamba:
Fintech application on banking stability using Big Data of an emerging economy. 43 - Aos Mulahuwaish, Shane Korbel, Basheer Qolomany:
Improving datacenter utilization through containerized service-based architecture. 44 - Rana Ghazali, Sahar Adabi, Ali Rezaee, Douglas G. Down, Ali Movaghar:
CLQLMRS: improving cache locality in MapReduce job scheduling using Q-learning. 45 - Kumaresan Perumal, Senthilkumar Mohan, Jaroslav Frnda, Parameshachari Bidare Divakarachari:
Dynamic resource provisioning and secured file sharing using virtualization in cloud azure. 46 - Tengku Nazmi Tengku Asmawi, Azlan B. Ismail, Jun Shen:
Cloud failure prediction based on traditional machine learning and deep learning. 47 - Wubetu Barud Demilie, Ayodeji Olalekan Salau:
Automated all in one misspelling detection and correction system for Ethiopian languages. 48 - Yongsheng Zhou, Majid Ghani Varzaneh:
Efficient and scalable patients clustering based on medical big data in cloud platform. 49 - Jinjiang Wang, Hangyu Gu, Junyang Yu, Yixin Song, Xin He, Yalin Song:
Research on virtual machine consolidation strategy based on combined prediction and energy-aware in cloud computing platform. 50 - Jincheng Zhou, Tao Hai, Dayang N. A. Jawawi, Dan Wang, Ebuka Ibeke, Cresantus Biamba:
Voice spoofing countermeasure for voice replay attacks using deep learning. 51 - Guoyan Diao, Fang Liu, Zhikai Zuo, Mohammad Kazem Moghimi:
Privacy-aware and Efficient Student Clustering for Sport Training with Hash in Cloud Environment. 52 - Baldeep Singh, Randall Martyr, Thomas Medland, Jamie Astin, Gordon Hunter, Jean-Christophe Nebel:
Cloud based evaluation of databases for stock market data. 53 - Jiarui Xu, Yufeng Zhao, Fei Xu:
RDPNet: a single-path lightweight CNN with re-parameterization for CPU-type edge devices. 54 - Shaoyuan Huang, Yuxi Zhang, Guozheng Peng, Juan Zhao, Keping Zhu, Heng Zhang, Xiaofei Wang:
MF-GCN-LSTM: a cloud-edge distributed framework for key positions prediction in grid projects. 55 - Ruihua Zhang, Jincheng Zhou, Tao Hai, Shixue Zhang, Marvellous GodsPraise Iwendi, Cresantus Biamba, Noble Anumbe:
Quality assurance awareness in higher education in China: big data challenges. 56 - Jing Xiong, Hong Zhu:
Real-time trajectory privacy protection based on improved differential privacy method and deep learning model. 57 - Xiangyu Liu, Shibing Zhu, Fan Yang, Shengjun Liang:
Research on unsupervised anomaly data detection method based on improved automatic encoder and Gaussian mixture model. 58 - Wenqing Yang, Xiaochao Li, Peng Wang, Jun Hou, Qianmu Li, Nan Zhang:
Defect knowledge graph construction and application in multi-cloud IoT. 59 - Zilong Liu, Jingbing Li, Yang Ai, Yuancai Zheng, Jing Liu:
A robust encryption watermarking algorithm for medical images based on ridgelet-DCT and THM double chaos. 60 - Chaoyue Tan, Yuling Chen, Yongtang Wu, Xiaochuan He, Tao Li:
A designated verifier multi-signature scheme in multi-clouds. 61 - Dongwei Li, Shuliang Wang, Qiang He, Yun Yang:
Cost-effective land cover classification for remote sensing images. 62 - Deok-Kee Choi:
Fog computing application of cyber-physical models of IoT devices with symbolic approximation algorithms. 63 - R. Priyadarshini, Abdul Quadir Muhammed, N. Rajendran, Neelanarayanan Venkataraman, H. Sabireen:
An enhanced encryption-based security framework in the CPS Cloud. 64 - Khaled A. Alaghbari, Mohamad Hanif Md. Saad, Aini Hussain, Muhammad Raisul Alam:
Complex event processing for physical and cyber security in datacentres - recent progress, challenges and recommendations. 65 - Jun Zeng, Juan Yao, Min Gao, Junhao Wen:
A service composition method using improved hybrid teaching learning optimization algorithm in cloud manufacturing. 66 - Vinodhini Mani, M. Prakash, Wen-Cheng Lai:
Cloud-based blockchain technology to identify counterfeits. 67 - Guozhi Liu, Fei Dai, Bi Huang, Zhenping Qiang, Shuai Wang, LeCheng Li:
A collaborative computation and dependency-aware task offloading method for vehicular edge computing: a reinforcement learning approach. 68 - Eduard Marin, Diego Perino, Roberto Di Pietro:
Serverless computing: a security perspective. 69 - Mohit Mittal, Martyna Kobielnik, Swadha Gupta, Xiaochun Cheng, Marcin Wozniak:
An efficient quality of services based wireless sensor network for anomaly detection using soft computing approaches. 70 - Jun Liu, Xi Liu:
Energy-efficient allocation for multiple tasks in mobile edge computing. 71 - Tariq Qayyum, Zouheir Trabelsi, Asad Waqar Malik, Kadhim Hayawi:
Mobility-aware hierarchical fog computing framework for Industrial Internet of Things (IIoT). 72 - Tingting Fu, Yanjun Peng, Peng Liu, Haksrun Lao, Shaohua Wan:
Distributed reinforcement learning-based memory allocation for edge-PLCs in industrial IoT. 73 - Faisal Shahzad, Abdul Mannan, Abdul Rehman Javed, Ahmad S. Almadhor, Thar Baker, Dhiya Al-Jumeily:
Cloud-based multiclass anomaly detection and categorization using ensemble learning. 74 - Farhan Ullah, Gautam Srivastava, Shamsher Ullah:
A malware detection system using a hybrid approach of multi-heads attention-based control flow traces and image visualization. 75 - Shitharth Selvarajan, Fahd Saleh Alotaibi, Hariprasath Manoharan, Adil Omar Khadidos, Khaled Hamed Alyoubi, Abdulrhman M. Alshareef:
Reconnoitering the significance of securty using multiple cloud environments for conveyance applications with blowfish algorithm. 76 - Xiaogang Yuan, Yipiao Chen:
Secure routing protocol based on dynamic reputation and load balancing in wireless mesh networks. 77 - Peng Liu, Zhe Liu, Ji Wang, Zifu Wu, Peng Li, Huijuan Lu:
Reinforcement learning empowered multi-AGV offloading scheduling in edge-cloud IIoT. 78 - Xiaoping Zhao, Mengyao Ma, Fan Shao:
Bearing fault diagnosis method based on improved Siamese neural network with small sample. 79 - Yehia Ibrahim Alzoubi, Asif Gill, Alok Mishra:
A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues. 80 - Juan José López López Escobar, Rebeca P. Díaz Redondo, Felipe J. Gil-Castiñeira:
In-depth analysis and open challenges of Mist Computing. 81 - Xiaoe Wu, Jincheng Zhou, Maoxing Zheng, Shanwei Chen, Dan Wang, Joseph Henry Anajemba, Guangnan Zhang, Maha S. Abdelhaq, Raed A. Alsaqour, Mueen Uddin:
Cloud-based deep learning-assisted system for diagnosis of sports injuries. 82 - Jian Lin, Dongming Xie, Jinjun Huang, Zinan Liao, Long Ye:
A multi-dimensional extensible cloud-native service stack for enterprises. 83 - Abeera Ilyas, Mohammed Naif Alatawi, Yasir Hamid, Saeed Mahfooz, Islam Zada, Neelam Gohar, Mohd Asif Shah:
Software architecture for pervasive critical health monitoring system using fog computing. 84 - Mohammad Saif Wajid, Hugo Terashima-Marín, Peyman Najafirad, Mohd Anas Wajid:
Violence Detection Approach based on Cloud Data and Neutrosophic Cognitive Maps. 85 - Haiming Chen, Wei Qin, Lei Wang:
Task partitioning and offloading in IoT cloud-edge collaborative computing framework: a survey. 86 - (Withdrawn) Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm. 87
- Xifeng Xu, Yunni Xia, Feng Zeng, Fan Li, Hong Xie, Xiaodong Fu, Mengdi Wang:
A novel vehicular task deployment method in hybrid MEC. 88 - Chingfang Hsu, Lein Harn, Zhe Xia, Linyan Bai, Ze Zhang:
Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments. 89 - Juan Chen, Peng Chen, Xianhua Niu, Zongling Wu, Ling Xiong, Canghong Shi:
Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning. 90 - Feng Zhou, Xin Du, Wenli Li, Zhihui Lu, Jie Wu:
NIDD: an intelligent network intrusion detection model for nursing homes. 91 - Mofei Song, Qi Guo:
Efficient 3D object recognition in mobile edge environment. 92 - Qian Zhou, Chengzhe Lai, Qili Guo, Haoyan Ma, Dong Zheng:
A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique. 93 - Guanming Bao, Ping Guo:
Federated learning in cloud-edge collaborative architecture: key technologies, applications and challenges. 94 - Suraj Singh Panwar, Man Mohan Singh Rauthan, Varun Barthwal:
A systematic review on effective energy utilization management strategies in cloud data centers. 95 - Jindong Zhao, Wenshuo Wang, Dan Wang, Xuan Wang, Chunxiao Mu:
PMHE: a wearable medical sensor assisted framework for health care based on blockchain and privacy computing. 96 - Ahmed A. Mawgoud, Mohamed Hamed N. Taha, Amr Abu-Talleb, Amira Kotb:
A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system. 97 - Nupur Jangu, Zahid Raza:
Improved Jellyfish Algorithm-based multi-aspect task scheduling model for IoT tasks over fog integrated cloud environment. 98 - P. Kuppusamy, N. Marline Joys Kumari, Wael Y. Alghamdi, Hashem Alyami, Rajakumar Ramalingam, Abdul Rehman Javed, Mamoon Rashid:
Job scheduling problem in fog-cloud-based environment using reinforced social spider optimization. 99 - Mohammad Saif Wajid, Hugo Terashima-Marín, Peyman Najafirad, Mohd Anas Wajid:
Correction: Violence detection approach based on cloud data and Neutrosophic cognitive maps. 100
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.