Journal: IJGUC

Volume 14, Issue 6

553 -- 561Rihito Fuchigami, Tomoyuki Ishida. Virtual traditional craft simulation system in mixed reality environment
562 -- 582Torsak Soontornphand, Mizuho Iwaihara, Juggapong Natwichai. An efficient privacy-preservation algorithm for incremental data publishing
583 -- 596Hongfeng Yin, Baomin Xu, Weijing Li. Cloud workflow scheduling algorithm based on multi-objective particle swarm optimisation
597 -- 605Qian Li. Intelligent system design of urban street landscape device based on improved D*Lite algorithm
606 -- 616Umang Garg, Santosh Kumar, Manoj Kumar. INFRDET: IoT network flow regulariser-based detection and classification of IoT botnet
617 -- 631Victor Chang 0001, Sreeja Boddu, Qianwen Ariel Xu, Le Minh Thao Doan. Intrusion detection and prevention with machine learning algorithms
632 -- 643Nattapon Harnsamut, Juggapong Natwichai. Privacy-aware trajectory data publishing: an optimal efficient generalisation algorithm
644 -- 653Madhavi Latha Pandala, Samanthapudi Swathi, Abdul Hussain Sharief, Suresh Penchala, Ganga Rama Koteswara Rao, Pala Mahesh Kumar. Performance enhancement of MIMO-OFDM using hybrid equalisers-based ICI mitigation with channel estimation in time varying channels
654 -- 666Ramgouda Patil, V. Chandraprakash. Deer-based chicken swarm optimisation algorithm: a hybrid optimisation algorithm for output domain testing

Volume 14, Issue 5

411 -- 421B. Madhavi, M. V. Siva Prasad. Design and fabrication of dual band AMC-backed monopole antenna for WLAN and Wi-Fi applications
422 -- 435Arbër Beshiri, Anastas Mishev. Authentication and authorisation in service-oriented grid architecture
436 -- 442Munir Naveed, Yasir Javed, Mohammed Adnan, Israr Ahmed. Collaborative ambient intelligence-based demand variation prediction model
443 -- 454Yinnan Yao, Changhao Tang, Kun Ma. Toward stance parameter algorithm with aggregate comments for fake news detection
455 -- 468Costas Chaikalis, Dimitrios Kosmanos, Konstantinos E. Anagnostou, Ilias K. Savvas, Dimitros Bargiotas. Enhancing the 5G V2X reliability using turbo coding for short frames
469 -- 479Yuanyou Cui, Yunxuan Su, Zheng Tu, Jindan Zhang. Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage
480 -- 492Yingjun He, Wenhui Ouyang, Shaolong Li, Lin Wang, Jing Zhou, Wenwei Su, Shenzhang Li, Donghui Mei, Yan Shi, Yanxu Jin, Chenglin Li, Yonghui Ren. Cloud computing data privacy protection method based on blockchain
493 -- 504Erdal Özdogan, Resul Das. Layered management approach to cyber security of IoT solutions
505 -- 515Yu Ning. Research on the extraction of accounting multi-relationship information based on cloud computing and multimedia
516 -- 525Chalabi Baya, Yahya Slimani. Efficient data storage: adaptively changing chunk size in cloud computing storage systems
526 -- 538Jagdeep Singh, Sanjay Kumar Dhurandher. SMGSAF: a secure multi-geocasting scheme for opportunistic networks
539 -- 551Uttom Akash, Partha Protim Paul, Ahsan Habib. An event-driven and lightweight proactive auto-scaling architecture for cloud applications

Volume 14, Issue 4

297 -- 310Jamilson Dantas, Carlos Melo, Paulo Maciel 0001, Rúbens de Souza Matos Júnior. Cloud infrastructure planning: models considering an optimisation method, cost and performance requirements
311 -- 319Sirisha Potluri, Sachi Nandan Mohanty, Sarita Mohanty. QoS-driven hybrid task scheduling algorithm in a cloud computing environment
320 -- 338Bharati Mishra, Debasish Jena, Srikanta Patnaik. Fine-grained access control of files stored in cloud storage with traceable and revocable multi-authority CP-ABE scheme
339 -- 355Basima Elshqeirat, Ahmad A. Al-oqaily, Sieteng Soh, Kwan-Wu Chin, Amitava Datta. On generating Pareto optimal set in bi-objective reliable network topology design
356 -- 367Prithviraj Singh Bisht, Preeti Mishra, Pushpanjali Chauhan, R. C. Joshi 0001. HyperGuard: on designing out-VM malware analysis approach to detect intrusions from hypervisor in cloud environment
368 -- 381Priyanka Bharti, Rajeev Ranjan 0005. Dynamic Bayesian network based prediction of performance parameters in cloud computing
382 -- 388Abhishek Das, Mihir Narayan Mohanty. Handwritten Odia numeral recognition using combined CNN-RNN
389 -- 399Shubangini Patil, Rekha Patil. Jaya-based CAViaR: Hadamard product and key matrix for privacy preservation and data sharing in cloud computing environment
400 -- 410Yaroslav Matviychuk, Natalia Kryvinska, Nataliya Shakhovska, Aneta Poniszewska-Maranda. New principles of finding and removing elements of mathematical model for reducing computational and time complexity

Volume 14, Issue 2/3

75 -- 93Yan Xiao. Keyword extraction from news corpus by deep learning in the context of internet of things
94 -- 106Shanshan Ji, Jianxin Li, Jie Liu, Wenliang Cao, Bin Li, Fei Jiang, Yang Liu. Mobile visual search algorithm based on improved VGG-F and hash with application in IoT
107 -- 121Lanlan Kang, Naiwei Liu, Wenliang Cao, Yeh-Cheng Chen. Many-objective particle swarm optimisation algorithm based on multi-elite opposition mutation mechanism in the internet of things environment
122 -- 135Guangping Zhou. Security technology for data transmission to the internet of things devices under the application of blockchain technology
136 -- 145Xinglin Wen. Application of blockchain technology in copyright protection of digital music information
146 -- 155Bingjie Shen. Text complexity analysis of college English textbooks based on blockchain and deep learning algorithms under the internet of things
156 -- 168Wei Yi. Logistics scheduling optimisation and allocation of intercultural communication trade under internet of things and edge computing
169 -- 181Lanlan Kang, Xing Zhong, Wenliang Cao, Jianxin Li. A modified multi-objective particle swarm optimisation with entropy adaptive strategy and Levy mutation in the internet of things environment
182 -- 190Aiming Shen. Design of internet of things service system for logistics engineering by using the blockchain technology
191 -- 204Zhi Li, Yuemeng Ge, Min Jia, Yanrui Xu. Data protection of internet of things for edge computing and deep learning and governance of cyberspace
205 -- 215Shihui Liu. Application of the multi-objective model under the fuzzy differential equation to logistics operation of internet of things
216 -- 228Minzhi Wang. Design and supply chain management of intelligent logistics system using cloud computing under internet of things
229 -- 238Kun Tang. Optimising sports marketing strategy by the internet of things and blockchain technology
239 -- 249Chili He. The use mechanism of blockchain and internet of things technology in memorial architecture of smart city
250 -- 263Fei Jiang, Chen-Xian Jiang, Jian-Xin Li. Deep learning for blockchain in medical supply chain risk management
264 -- 277Yueming Xiong. Evaluation of customer service quality of platform-based online shopping under blockchain technology
278 -- 296Honghao Yu, Zhenqun Zou. The music education and teaching innovation using blockchain technology supported by artificial intelligence

Volume 14, Issue 1

1 -- 14Monika, Om Prakash Sangwan. Quality of service prediction model in cloud computing using adaptive dynamic programming parameter tuner
15 -- 28Pasquale Cantiello, Beniamino Di Martino, Michele Mastroianni, Luigi Colucci Cante, Mariangela Graziano. Towards a cloud model choice evaluation: comparison between cost/features and ontology-based analysis
29 -- 36Yusuke Gotoh, Toshihiro Kotani. An evaluation environment for high-performance computing combining supercomputing and cloud
37 -- 50Marta Catillo, Umberto Villano, Massimiliano Rak. A survey on auto-scaling: how to exploit cloud elasticity
51 -- 61Laércio Pioli, Victor Ströele, Mario A. R. Dantas. An effort to characterise enhancements I/O of storage environments
62 -- 71Jordi Conesa, Montserrat Garcia-Alsina, Josep-Maria Batalla-Busquets, Beni Gómez-Zúñiga, María J. Martínez-Argüelles, Tona Monjo, Enric Mor, María del Carmen Cruz Gil. A vision about lifelong learning and its barriers