Journal: IJGUC

Volume 11, Issue 6

737 -- 746Modigari Narendra, M. L. Valarmathi, L. Jani Anbarasi, D. R. L. Prasanna. A vector-based watermarking scheme for 3D models using block rearrangements
747 -- 754Ankita Sharma, Puja Munjal, Hema Banati. Entropy-based classification of trust factors for cloud computing
755 -- 768Danilo Souza Silva, José dos Santos Machado, Admilson de Ribamar L. Ribeiro, Edward David Moreno Ordonez. Towards self-optimisation in fog computing environments
769 -- 779Chinwe Peace Igiri, Yudhveer Singh, Deepshikha Bhargava, Samuel Shikaa. Improved African buffalo optimisation algorithm for petroleum product supply chain management
780 -- 791Muneeb Ali Hamid, Yaser Hafeez, Bushra Hamid, Mamoona Humayun, N. Z. Jhanjhi. Towards an effective approach for architectural knowledge management considering global software development
792 -- 800Pardeep Kumar, Seema Verma. Hardware implementation of OLSR and improved OLSR (AOLSR) for AANETs
801 -- 814Vijaya Saraswathi R, L. Padma Sree, K. Anuradha. Dynamic group key management scheme for clustered wireless sensor networks
815 -- 826Srinidhi NN, G. P. Sunitha, S. Raghavendra, S. M. Dilip Kumar, Victor Chang 0001. Hybrid energy-efficient and QoS-aware algorithm for intelligent transportation system in IoT
827 -- 837Kshira Sagar Sahoo, Somula Ramasubbareddy, Balamurugan Balusamy, B. Vikram Deep. Analysing control plane scalability issue of software defined wide area network using simulated annealing technique
838 -- 846Sankar Sennan, P. Srinivasan, Somula Ramasubbareddy, Balamurugan Balusamy. Energy-aware multipath routing protocol for internet of things using network coding techniques
847 -- 856Bruno Andriamanalimanana, Chen-Fu Chiang, Jorge E. Novillo, Sam Sengupta, Ali Tekeoglu. Efficient variant transaction injection protocols and adaptive policy optimisation for decentralised ledger systems
857 -- 867Muddasar Ghani Khwaja, Saqib Mahmood, Ahmad Jusoh. Online information bombardment! How does eWOM on social media lead to consumer purchase intentions?

Volume 11, Issue 5

587 -- 601Srinivas Dibbur Byrappa, Sujay N. Hegde, Rajan M. A, Krishnappa H. K. An efficient greedy task scheduling algorithm for heterogeneous inter-dependent tasks on computational grids
602 -- 614J. Devagnanam, N. M. Elango. Chronological and exponential-based Lion optimisation for optimal resource allocation in cloud
615 -- 628Guto Leoni Santos, Demis Gomes, Djamel Sadok, Judith Kelner, Elisson Rocha, Patricia Takako Endo. How do checkpoint mechanisms and power infrastructure failures impact on cloud applications?
629 -- 645Diletta Cacciagrano, Flavio Corradini, Matteo Micheletti, Leonardo Mostarda. Applying REECHD to non-uniformly distributed heterogeneous devices
646 -- 661Lucas Nunes Barbosa, Jonathan F. Gemmell, Miller Horvath, Tales Heimfarth. Assessing distributed collaborative recommendations in different opportunistic network scenarios
662 -- 673Maharage Nisansala Sevwandi Perera, Takeshi Koshiba. Combined interactive protocol for lattice-based group signature schemes with verifier-local revocation
674 -- 682Jung-Bin Li, Szu-Yin Lin, Yu-Hsiang Hsu, Ying-Chu Huang. An empirical study of alternating least squares collaborative filtering recommendation for Movielens on Apache Hadoop and Spark
683 -- 704Júlio Mendonça, Ricardo Lima 0001, Ermeson C. Andrade. Evaluating and modelling solutions for disaster recovery
705 -- 713Olayinka Johnny, Marcello Trovati. Big data inconsistencies and incompleteness: a literature review
714 -- 724Rui Humberto R. Pereira, João Vidal de Carvalho, Álvaro Rocha 0001. Towards an encompassing maturity model for the management of higher education institutions
725 -- 734Hisaaki Yamaba, Shotaro Usuzaki, Kayoko Takatsuka, Kentaro Aburada, Tetsuro Katayama, Mirang Park, Naonobu Okazaki. On a user authentication method to realise an authentication system using s-EMG

Volume 11, Issue 4

435 -- 442P. Jayalakshmi, R. Saravanan 0001. ACO-based enhanced energy-efficient intelligent routing protocol for MANET
443 -- 456K. S. Preetha, S. Kalaivani. Analysis of spectrum handoff schemes for cognitive radio networks considering secondary user mobility
457 -- 467Kalaivani Dhanasegaran, P. V. S. S. R. Chandra Mouli. Link survivability rate-based clustering for QoS maximisation in VANET
468 -- 473Qiaoge Xu. Research on data access control algorithm based on fine-grained cloud storage
474 -- 485Dante Arias Torres, José Adán Hernández-Nolasco, Miguel A. Wister, Pablo Pancardo. Detection of fatigue on gait using accelerometer data and supervised machine learning
486 -- 495José dos Santos Machado, Edward David Moreno, Admilson de Ribamar Lima Ribeiro. A survey on Fog Computing and its research challenges
496 -- 508A. Stephen Dass, J. Prabhu. Hybrid coherent encryption scheme for multimedia big data management using cryptographic encryption methods
509 -- 516Priyan Malarvizhi Kumar, G. Usha Devi, Shakila Basheer, Parthasarathy Panchatcharam. A study on data de-duplication schemes in cloud storage
517 -- 524Mingcheng Qu, Xianghu Wu, Yongchao Tao, Guannan Wang, Ziyu Dong. Research on regression test method based on multiple UML graphic models
525 -- 532Weibin Wang, Minoru Uehara, Haruo Ozaki. Evaluation of navigation based on system optimal traffic assignment for connected cars
533 -- 539Lin Cheng. Research on relationship between geomantic omen and housing choice in big data era
540 -- 546Jianqiang Xiong, Le Yuan, Dingding Liao, Jun Wu. Study on NVH robustness evaluation method of high-mileage automobile based on systematic sampling
547 -- 553Li Jian. Multi-objective optimisation of traffic signal control based on particle swarm optimisation
554 -- 567José dos Santos Machado, Danilo Souza Silva, Raphael Silva Fontes, Adauto Cavalcante Menezes, Edward David Moreno, Admilson de Ribamar Lima Ribeiro. Performance analysis of StaaS on IoT devices in fog computing environment using embedded systems
568 -- 585Deepali R. Vora, R. Kamatchi. Predicting students' academic performance: Levy search of cuckoo-based hybrid classification

Volume 11, Issue 3

291 -- 301Jie Yang 0026, Tao Gao, Shengli Yuan, Heng Shi, Zhenli Zhang. Research on hardware-in-the-loop simulation of single point suspension system based on fuzzy PID
302 -- 314Amel Ksentini, Maha Jebalia, Sami Tabbane. A study on fog computing architectures and energy consumption approaches regarding QoS requirements
315 -- 329Dietmar Nedbal, Mark Stieninger. Success factor analysis for cloud services: a comparative study on software as a service
330 -- 344Maxwell Eduardo Monteiro, Rodolfo da Silva Villaça, Kaio Cesar Ferreira Simonassi, Renan Freire Tavares, Cássio Chaves Reginato. Implementing the software defined management framework
345 -- 366Mitali Bansal, Sanjay Kumar Malik, Sanjay Kumar Dhurandher, Isaac Woungang. Policies and mechanisms for enhancing the resource management in cloud computing: a performance perspective
367 -- 377Jing Wang, Arun Kumar Sangaiah, Wei Liu. A hybrid collaborative filtering recommendation algorithm: integrating content information and matrix factorisation
378 -- 387Lidia Ogiela, Makoto Takizawa 0001, Urszula Ogiela. Classification of cognitive algorithms for managing services used in cloud computing
388 -- 397Naoto Fukae, Hiroyoshi Miwa, Akihiro Fujihara. Model for generation of social network considering human mobility and interaction
398 -- 408Eliza Gomes, Mario A. R. Dantas, Patricia Della Mea Plentz. A proposal for a healthcare environment with a real-time approach
409 -- 418Takuro Fujita, Yusuke Gotoh. Design and implementation of broadcasting system for selective contents considering interruption time
419 -- 433João Ferreira 0002, Gustavo Callou, Paulo R. M. Maciel, Dietmar Tutsch. An algorithm to optimise the energy distribution of data centre electrical infrastructures

Volume 11, Issue 2

135 -- 142Silvia Angeloni. Domo Farm 4.0
143 -- 168Ihtisham Ali, Susmit Bagchi. Algorithmic node classification in AND/OR mobile workflow graph
169 -- 184Abrar Omar Alkhamisi, Seyed M. Buhari, Georgios Tsaramirsis, Mohammed Basheri. An integrated incentive and trust-based optimal path identification in ad hoc on-demand multipath distance vector routing for MANET
185 -- 195Jia-Chun Lin, Ming-Chang Lee, Ingrid Chieh Yu, Einar Broch Johnsen. A configurable and executable model of Spark Streaming on Apache YARN
196 -- 208Carlos Melo, Jamilson Dantas, Paulo R. M. Maciel, Danilo Mendonça Oliveira, Jean Araujo, Rubens de S. Matos, Iure Fé. Models for hyper-converged cloud computing infrastructures planning
209 -- 220Caio Yuri da Silva Costa, Eduardo Alchieri. Architecture for diversity in the implementation of dependable and secure services using the state machine replication approach
221 -- 229Koichiro Sugihara, Naohiro Hayashibara. Target exploration by Nomadic Lévy walk on unit disk graphs
230 -- 242Vinícius Fülber Garcia, Giovanni Venâncio de Souza, Elias Procópio Duarte Jr., Thales Nicolai Tavares, Leonardo da Cruz Marcuzzo, Carlos R. P. dos Santos, Muriel Figueredo Franco, Lucas Bondan, Lisandro Zambenedetti Granville, Alberto Egon Schaeffer Filho, Filip De Turck. On the design and development of emulation platforms for NFV-based infrastructures
243 -- 252Marco de Benedictis, Antonio Lioy, Paolo Smiraglia. Towards a secure and lightweight network function virtualisation environment
253 -- 266Wendy Osborn. A spatial access method approach to continuous k-nearest neighbour processing for location-based services
267 -- 277Valentina Casola, Alessandra De Benedictis, Massimiliano Rak, Umberto Villano. A methodology for automated penetration testing of cloud applications
278 -- 289Raziq Yaqub, Fahd Ali Shifa, Muhammad Fasih Uddin Butt. Preferential charging for government authorised emergency electric vehicles

Volume 11, Issue 1

1 -- 9Aomei Li, Wanli Jiang, Po Ma, Jiahui Guo, Weihua Yuan, Dehui Dai. A real-time matching algorithm using sparse matrix
10 -- 20Huanyu Li 0003. A novel web image retrieval method: bagging weighted hashing based on local structure information
21 -- 29Tetsuya Shigeyasu, Ayaka Sonoda. Detection and mitigation of collusive interest flooding attack on content centric networking
30 -- 48Abdelhalim Hacini, Mourad Amad. A new overlay P2P network for efficient routing in group communication with regular topologies
49 -- 61Rodrigo Moreira, Flávio de Oliveira Silva, Pedro Frosi Rosa, Rui L. Aguiar. A smart network and compute-aware Orchestrator to enhance QoS on cloud-based multimedia services
62 -- 71Alessandro Cilardo, Mirko Gagliardi, Daniele Passaretti. Hardware support for thread synchronisation in an experimental manycore system
72 -- 83Nuno Guimarães, Filipe Miranda, Álvaro Figueira. Identifying journalistically relevant social media texts using human and automatic methodologies
84 -- 92Kazunori Uchida, Leonard Barolli. Dijkstra algorithm-based ray tracing for tunnel-like structures
93 -- 102Tomoyuki Ishida, Yangzhicheng Lu, Akihiro Miyakawa, Kaoru Sugita, Yoshitaka Shibata. Implementation of a high-presence immersive traditional crafting system with remote collaborative work support
103 -- 114Alessandro Di Stefano, Antonella Di Stefano, Giovanni Morana. Scheduling communication-intensive applications on Mesos
115 -- 133Arianit Maraj, Ermir Rogova, Genc Jakupi. Testing of network security systems through DoS, SQL injection, reverse TCP and social engineering attacks