Journal: IJGHPC

Volume 12, Issue 4

1 -- 12Ming Chen, Jinghua Yan, Tieliang Gao, Huan Ma, Li Duan, Qiguang Tang. An Automatic Centroid Image Selection Method Based on Fuzzy Logic Reasoning in Image Deduplication
13 -- 34Kamal Kumar, Jyoti Thaman. Opportunistic Two Virtual Machines Placements in Distributed Cloud Environment
35 -- 47Balaji Prabhu B. V., M. Dakshayini. Computational Performance Analysis of Neural Network and Regression Models in Forecasting the Societal Demand for Agricultural Food Harvests
48 -- 62A. B. Manju, Sumathy Subramanian. Fog-Assisted Privacy Preservation Scheme for Location-Based Services Based on Trust Relationship
63 -- 75Zhifeng Zhang, Yusheng Sun, Yadong Cui, Haodong Zhu. Modified Migrating Birds Optimization for Solving the Low-carbon Scheduling Problem
76 -- 88Wei Zhang, Yanli Du, Qinghua Bai. An Optimized Coverage Robot SLAM Algorithm Based on Improved Particle Filter for WSN Nodes

Volume 12, Issue 3

1 -- 16Nancy Victor, Daphne Lopez. sl-LSTM: A Bi-Directional LSTM With Stochastic Gradient Descent Optimization for Sequence Labeling Tasks in Big Data
17 -- 42Miloud Mihoubi, Abdellatif Rahmoun, Meriem Zerkouk, Pascal Lorenz, Lotfi Baidar. Intelligent Technique Based on Enhanced Metaheuristic for Optimization Problem in Internet of Things and Wireless Sensor Network
43 -- 56Sukhnandan Kaur Johal, Rajni Mohana. Effectiveness of Normalization Over Processing of Textual Data Using Hybrid Approach Sentiment Analysis
57 -- 67Chetna Dabas, Aditya Agarwal, Naman Gupta, Vaibhav Jain, Siddhant Pathak. Machine Learning Evaluation for Music Genre Classification of Audio Signals
68 -- 87R. Rajakumar, K. Dinesh, Ankur Dumka, Loganathan Jayakumar. RFA Reinforced Firefly Algorithm to Identify Optimal Feature Subsets for Network IDS
88 -- 100Manimaran Aridoss, Chandramohan Dhasarathan, Ankur Dumka, Loganathan Jayakumar. DUICM Deep Underwater Image Classification Mobdel using Convolutional Neural Networks

Volume 12, Issue 2

1 -- 24Neelu Khare, Kumaran U.. A Secure and Privacy-Preserving Approach to Protect User Data across Cloud based Online Social Networks
25 -- 46T. Aditya Sai Srinivas, S. S. Mani Manivannan. Preventing Collaborative Black Hole Attack in IoT Construction Using a CBHA-AODV Routing Protocol
47 -- 63E. Sathiyamoorthy, P. Karthikeyan. An Adaptive Service Monitoring System in a Cloud Computing Environment
64 -- 86Ashish Negi, Saurabh Sharma. The Optimized Classification of Mammograms Based on the Antlion Technique
87 -- 101Meenu Vijarania, Vivek Jaglan, Brojo Kishore Mishra. The Modelling of an Energy Efficient Algorithm Considering the Temperature Effect on the Lifetime of a Node in a Wireless Network
102 -- 120Mohammad M. Alshammari, Ali Amer Alwan, Azlin Nordin, Abedallah Zaid Abualkishik. Data Backup and Recovery With a Minimum Replica Plan in a Multi-Cloud Environment

Volume 12, Issue 1

1 -- 17Salma Azzouzi, Sara Hsaini, My El Hassan Charaf. A Synchronized Test Control Execution Model of Distributed Systems
18 -- 34Shahbaz Afzal, G. Kavitha. A Hybrid Multiple Parallel Queuing Model to Enhance QoS in Cloud Computing
35 -- 52Bouaita Riad, Abdelhafid Zitouni, Ramdane Maamri. Improving Service Performance in Oversubscribed IaaS Cloud
53 -- 69Danqing Feng, Zhibo Wu, Decheng Zuo, Zhan Zhang. Auto-Scaling Provision Basing on Workload Prediction in the Virtualized Data Center