Journal: J. Cloud Computing

Volume 14, Issue 1

1 -- 0Mohammad A. Altahat, Tariq Daradkeh, Anjali Agarwal. Virtual machine scheduling and migration management across multi-cloud data centers: blockchain-based versus centralized frameworks
2 -- 0Peng Liu, Xinglong Wu, Yanjun Peng, Hangguan Shan, Saïd Mahmoudi, Bong-Jun Choi, Haksrun Lao. Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing
3 -- 0K. Babu, A. Gokula Chandar, S. Kannadhasan. Prediction and diagnosis of cardiovascular disease using cloud and machine learning design
4 -- 0Jian Yu, Qiong Yu, Zhixing Lin, Xiangmei Xiao. An approach for multipath optimal selection of network service combinations based on golden eagle optimizer with double learning strategies
5 -- 0Umesh Kumar Lilhore, Sarita Simaiya, Yogesh Kumar Sharma, Anjani Kumar Rai, S. M. Padmaja, Khan Vajid Nabilal, Vimal Kumar, Roobaea Alroobaea, Hamed Alsufyani. Cloud-edge hybrid deep learning framework for scalable IoT resource optimization
6 -- 0Saulo Ferreira, Júlio Mendonça, Bruno C. S. Nogueira, Willy Tiengo, Ermeson Carneiro de Andrade. Correction to: Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications
7 -- 0Hao Feng, Haoyu Li, Yuming Liu, Kun Cao, Xiumin Zhou. A novel virtual machine placement algorithm based on grey wolf optimization
8 -- 0Ting-Yan Lai, I-Ching Hsu. Integrating semantic web into context-aware mobile application based on cloud computing
9 -- 0B. Bhasker, S. Kaliraj, C. Gobinath, V. Sivakumar. Optimizing energy task offloading technique using IoMT cloud in healthcare applications
10 -- 0Jincheng Zhou, Umesh Kumar Lilhore, Poongodi M, Tao Hai, Sarita Simaiya, Dayang Norhayati Abang Jawawi, Deema Mohammed alsekait, Sachin Ahuja, Cresantus Biamba, Mounir Hamdi. Correction to: Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing
11 -- 0Xianmei Hua, Xinrong Zhan, Feng Li, Junwen Lu. Financial service composition with various privacy levels in multiple cloud environment
12 -- 0Zhang Ting-ting, Chen Yan, Dong Ren-zhi, Chen Tao, Liu Yan, Zhang Kai-Ge, Song Ai-Guo, Lan Yu-Shi. Autonomous decision-making of UAV cluster with communication constraints based on reinforcement learning
13 -- 0Lionel Nkenyereye, Boon-Giin Lee, Wan-Young Chung. Functionality-aware offloading technique for scheduling containerized edge applications in IoT edge computing
14 -- 0Muhammad Younus, Eko Priyo Purnomo, Achmad Nurmandi, Dyah Mutiarin, Halimah Abdul Manaf, Fathiya Mumtaz, Tiara Khairunnisa. Analyzing the trend of government support for cloud computing usage in e-government architecture
15 -- 0Jie Cao, Cuicui Zhang, Ping Qi, Kekun Hu. Utility-driven virtual machine allocation in edge cloud environments using a partheno-genetic algorithm
16 -- 0Xianglong Kong, Qiyu Liu, Wei Huang, Jiayu Du, Hongfa Li, Wen Ji, Fan Zhang. Enhancing configuration security with heterogeneous read points
17 -- 0Lukasz Pawlik. Google Cloud vs. Azure: sentiment analysis accuracy for Polish and English across content types
18 -- 0Junjie Cao, Zhiyong Yu, Min Cao, Baohong Zhu, Jian Yang. Server deployment strategies considering robustness and resource constraints in edge computing
19 -- 0Sultan H. Almotiri. AI driven IOMT security framework for advanced malware and ransomware detection in SDN
20 -- 0Jay Dave, Kamalesh Ram R., Pratik Patil, Himanshu Patil, Sarvesh Borole, Subhrakanta Panda. Secure and efficient ownership verification for deduplicated cloud computing systems
21 -- 0Altaf Hussain, Shuaiyong Li, Tariq Hussain, Razaz Waheeb Attar, Ahmed Alhomoud, Reem Alsagri, Ahmad Ali AlZubi. Blockchain-enabled Zero Trust-based Secure and Energy Efficient scheme for 6G-enabled UASNs
22 -- 0Pietro Fusco, Alba Amato, Salvatore Venticinque. Cloud-based analysis of aerial imagery for unveiling ancient archaeological patterns
23 -- 0José María López, Joaquín Entrialgo, Manuel García, Javier García 0002, José Luis Díaz, Rubén Usamentiaga. Fast autoscaling algorithm for cost optimization of container clusters
24 -- 0Dinah Waref, Yomna Alayary, Nadeen Fathallah, Mohamed A. Abd El ghany, Mohammed A.-M. Salem. Client aware adaptive federated learning using UCB-based reinforcement for people re-identification
25 -- 0Xiaojun Zhang, Zhizhong Liu, Dianhui Chu, Meiyue Zhao. Perception of premium services based on the evolution of hyper-service network in mobile edge computing
26 -- 0Abdollah Rahimi, Mehdi Jafari Shahbazzadeh, Amid Khatibi Bardsiri. An adaptive intelligent thermal-aware routing protocol for wireless body area networks
27 -- 0Neetesh Kumar Nema, Vivek Shukla, Rohit Miri, Praveen Chouksey, Rohit Raja, Kamred Udham Singh, Ankit Kumar, Mohd Asif Shah. Sentence type identification-based product review sentiment analysis using BeDi-DC and Log-Squish CNN
28 -- 0Saulo Ferreira, Júlio Mendonça 0001, Bruno Nogueira 0001, Willy Tiengo, Ermeson C. Andrade. Correction: Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications
29 -- 0Danilo Rafael de Lima Cabral, Pedro Antonino, Augusto Cezar Alves Sampaio. Demystification and near-perfect estimation of minimum gas limit and gas used for Ethereum smart contracts
30 -- 0Vipin Jain, Lokesh Malviya, Anjana S. Optimized hybrid deep learning for cross-linguistic sentiment analysis: a novel approach
31 -- 0Babar Shahzaad, Alistair Barros, Colin J. Fidge. Service function tree mapping of microservices on resource-constrained fog networks
32 -- 0Hafiz Gulfam Ahmad Umar, Iqra Yasmeen, Muhammad Aoun, Tehseen Mazhar, Muhammad Amir Khan, Inès Hilali-Jaghdam, Habib Hamam. Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model
33 -- 0Nasser S. Albalawi. Dynamic scheduling strategies for cloud-based load balancing in parallel and distributed systems
34 -- 0Joonseok Park, Sumin Jeong, Keunhyuk Yeom. Private cloud bespoke orchestrator: techniques for constructing and operating bespoke-private cloud virtual machine environments for cloud users
35 -- 0Umesh Kumar Lilhore, Sarita Simaiya, Roobaea Alroobaea, Abdullah M. Baqasah, Majed Alsafyani, Afnan Alhazmi, M. D. Monish Khan. SmartTrust: a hybrid deep learning framework for real-time threat detection in cloud environments using Zero-Trust Architecture
36 -- 0Cong Liu 0012, Wenjuan Liu, Na Guo, Rongjia Song, Yan Gu, Long Cheng 0003, Qingtian Zeng. Comparative evaluation of encoding techniques for workflow process remaining time prediction for cloud applications
37 -- 0Fanlong Zhang, Huanming Chen, Quan Chen, JianQi Liu. Cloud software code generation via knowledge graphs and multi-modal learning
38 -- 0Seyed Salar Sefati, Bahman Arasteh, Octavian Fratu, Simona Halunga. SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation
39 -- 0Yazeed Yasin Ghadi, Syed Faisal Abbas Shah, Wajahat Waheed, Tehseen Mazhar, Wasim Ahmad, Mamoon M. Saeed, Habib Hamam. Integration of wearable technology and artificial intelligence in digital health for remote patient care
40 -- 0Huangyining Gao, Ruyue Xin, Peng Chen, Xi Li, Ning Lu, Peng You. Memory-augment graph transformer based unsupervised detection model for identifying performance anomalies in highly-dynamic cloud environments
41 -- 0Yu-Fang Chen 0001, Frank Yeong-Sung Lin, Kuang-Yen Tai, Chiu-Han Hsiao, Wei-Hsin Wang, Ming-Chi Tsai, Tzu-Lung Sun. A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks
42 -- 0Raúl Miñón, Josu Díaz-de-Arcaya, Ana I. Torre-Bastida, Juan López-de-Armentia, Gorka Zárate, Lander Bonilla, Asier Garcia-Perez, Jon Aguirre-Usandizaga. ArtifactOps and ArtifactDL: a methodology and a language for conceptualizing and operationalising different types of pipelines
43 -- 0Abdullah Ayub Khan, Asif Ali Laghari, Hamad Almansour, Leila Jamel 0001, Fahima Hajjej, Vania Vieira Estrela, Mohamad Afendee Mohamed, Sajid Ullah. Quantum computing empowering blockchain technology with post quantum resistant cryptography for multimedia data privacy preservation in cloud-enabled public auditing platforms
44 -- 0Nithin Melala Eshwarappa, Hojjat Baghban, Ching-Hsien Hsu, Po-Yen Hsu, Ren-Hung Hwang, Mu-Yen Chen. Communication-efficient and privacy-preserving federated learning for medical image classification in multi-institutional edge computing
45 -- 0Guoxiu Zhang, Xinyi He, Xiaofeng Wang. PCL-RC: a parallel cloud resource load prediction model based on feature optimization
46 -- 0Yang Zhang, Ling Yang, Yan Tan. Energy-efficient adaptive routing in heterogeneous wireless sensor networks via hybrid PSO and dynamic clustering
47 -- 0Hatoon S. AlSagri, Ankit Kumar, Abdul Khader Jilani Saudagar, Abhishek Kumar 0013, Linesh Raja. Optimizing resource allocation in precision farming using quantum enhanced algorithms and quantum sensor networks
48 -- 0Ahmed M. Alwakeel. Adaptive edge-fog healthcare networks: a novel framework for emergency response management
49 -- 0Alaa O. Khadidos, Hariprasath Manoharan, Shitharth Selvarajan, Adil Omar Khadidos, Achyut Shankar, Gwanggil Jeon, Wattana Viriyasitavat. Secured transmission approach for transportation units with twin creations and artificial intelligence algorithm
50 -- 0Xiaomo Yu, Mingjun Zhu, Menghan Zhu, Xiaomeng Zhou, Long Long. A novel Location-Aware job scheduling framework for optimizing Fog-Cloud IoT systems: insights from dynamic traffic management
51 -- 0Shallu Duggal, Parminder Kaur, Mukesh Kumar, Vivek Bhardwaj 0001. IoT-enabled fog computing framework: heat stroke risk analysis
52 -- 0Mohsen Ghorbian, Mostafa Ghobaei Arani, Leila Esmaeili. An energy-conscious scheduling framework for serverless edge computing in IoT
53 -- 0Navjeet Kaur, Ayush Mittal, Anuj Jain, Umesh Kumar Lilhore, Sultan Mesfer Aldossary, Sarita Simaiya, Ehab Seif Ghith, Abdullah Baihan, Hanaa A. Abdallah, M. D. Monish Khan. Blockchain-enhanced security and bayesian trust assessment for secure task scheduling in latency-critical fog computing environments
54 -- 0Umesh Kumar Lilhore, Scaria Alex, Vince Paul, Rahoof Puthan Purayil, Sultan Mesfer Aldossary, Sarita Simaiya, Ehab Seif Ghith, Heba G. Mohamed, M. D. Monish Khan. QHRMOF: A Quantum-Inspired hybrid Multi-Objective framework for Energy-Efficient task scheduling and load balancing in cloud computing
55 -- 0Gavini Sreelatha, Tan Kuan Tak, Rajkumar Kalimuthu, Pravin R. Kshirsagar, Balajee Maram, T. Venkatakrishnamoorthy. Detecting hidden communication threats in cloud systems using advanced pattern and threat propagation analysis
56 -- 0Kirupa Shankar Komathi Maathavan, Santhi Venkatraman. Integrating machine learning and encryption for effective data management in blood bank supply chains
57 -- 0Aun Abbas, Muqaddas Salahuddin, Muhammad Zohaib Khan, Abdullah Ayub Khan, Fahim Uz Zaman, Syed Azeem Inam, Ghadah Aldehim, Tehseen Mazhar, Muhammad Amir Khan. Machine learning-based hybrid technique to enhance cyber-attack perspective
58 -- 0Abdullah Ayub Khan, Abdul Khalique Shaikh, Roobaea Alroobaea, Abdullah M. Baqasah, Majed Alsafyani, Hamed Alsufyani, Asif Ali Laghari. Blockchain-enabled secure Internet of Medical Things (IoMT) architecture for multi-modal data fusion in precision cancer diagnosis and continuous monitoring
59 -- 0Vishnu Prasad Verma, Sumit Kumar, Santosh Kumar 0006, Nenavath Srinivas Naik, Rishav Dubey. Optimizing Spark job scheduling with distributional deep learning in cloud environments
60 -- 0Leeladhar Chourasiya, Sushma Khatri, Umesh Kumar Lilhore, Sarita Simaiya, Roobaea Alroobaea, Abdullah M. Baqasah, Majed Alsafyani, M. D. Monish Khan. Advanced system log analyzer for anomaly detection and cyber forensic investigations using LSTM and transformer networks
61 -- 0Chunggeon Song, HeonChang Yu, Joon-Min Gil. MkRP: multiple k registry placement for fast container deployment on edge computing
62 -- 0Michaelraj Kingston Roberts, Sampath Kumar Shanmugam, Muna Al-Razgan, Taha Alfakih. A nature-inspired dual phased fuzzy hybrid algorithm for adaptive self-healing and dynamic energy-aware resource management in cloud computing
63 -- 0Seyedeh Somayeh Fateminasab, Nastaran Evaznia, Saeideh Memarian, María del Carmen Romero Ternero, Gloria Miró-amarante, Seyed Reza Kamel Tabbakh. An efficient blockchain-based resource allocation and secure data storage model using Fire Hawk Optimization and entropy in health tourism
64 -- 0Lei Xi, Caizhong Li, Maryam Saberi Anari, Khosro Rezaee. Integrating wearable health devices with AI and edge computing for personalized rehabilitation
65 -- 0Haibo Dong, Zhenxiang Liu, Edris Khezri. Optimized tourist point-of-interest recommendation through ARIMA and SVD in edge environment
66 -- 0Amina Konswa, Amr Mohamed Abdelatif. Energy-aware real-time task partitioning on multi-core processors with shared resources
67 -- 0Miaoer Li, Yi Zhu 0008, Yali Liu, Zexin Li, Junge Huang. Graph attention network vulnerability detection model with global feature augmentation for smart contracts
68 -- 0Hongyuan Guo, Maryam Saberi Anari, Khosro Rezaee. Cloud-enabled style-aware artwork composite recommendation based on correlation graph
69 -- 0Jun Ma, Pengtao Gao, Yuancheng Wang. Innovative IoT device identification method based on residual-connected Capsule Network
70 -- 0Ruppikha Sree Shankar, Tanuja Shailesh, R. Vijaya Arjunan, Krishnaraj Chadaga, D. Cenitta. Smart health monitoring: an interactive Raspberry Pi-based system for managing diabetes and hypertension in children
71 -- 0Sudhanshu Maurya, Karthik Sekhar, Priyadarsini K, P. C. Karthik, V. G. Saranya. Hybrid compression-based routing strategies for enhanced energy efficiency in wireless sensor networks
72 -- 0Tarek Abid, Ahmed Ahmim, Faiz Maazouzi, Djalel Chefrour, Insaf Ullah, Marwa Ahmim, Reham Almukhlifi. A novel IoT threat detection using GWO feature selection and CNN-enhanced LightGBM
73 -- 0Rashmi Verma, Manisha Jailia. A hybrid metaheuristic federated learning approach based attack detection system for multi-cloud environment
74 -- 0Ahmad Salah Al-Ahmad, Anup Shrestha, Omar Ali, Hasan Kahtan. Cross-technology cloud offloading model
75 -- 0Nahin F. Siddiqui, Zarif Safwan Hoque, Md. Ehsanul Haque, Abu Raihan Mostofa Kamal, A. K. M. Azad, Salem A. Alyami, Md Azam Hossain. SpectraNet: a lightweight hybrid time-frequency deep learning framework for sustainable cloud workload forecasting
76 -- 0Ming Chen, Tianyi Zhang, Ping Qi, Zhihe Chen, Xiaoya Pi. Synergistic cloud-edge intelligence for real-time multimodal entity linking and knowledge retrieval
77 -- 0Asif Ali, Izhar Ahmed Khan, Yuanqing Xia, Yuan Tian, Saba Sajid, Mohammed Alsuhaibani. A retrieval-augmented LLM framework for severity prediction of bug reports in cloud-based mobile applications
78 -- 0Aarti Punia, Preeti Gulia, Nasib Singh Gill, Deepak Kaushik, Noha Alduaiji, Piyush Kumar Shukla, Ankur Pandey. An access control system for cloud-based healthcare systems driven by blockchain
79 -- 0Maryam Gholamhosseini, Omid Mahdiyar, Mehdi Taghizadeh, Jasem Jamali. Collaborative smart detectors for edge surveillance in cognitive monitoring systems using Kullback-Leibler divergence
80 -- 0S. Subashree, M. Rajakumaran, G. Pushpa, S. Senthilkumar. Hybrid dolphin swarm sparrow search optimization based multi-objective cloud workflow scheduling
81 -- 0Haoran Pei, Yan Gu, Yajuan Sun, Qingle Wang, Cong Liu, Xiaomin Chen, Long Cheng 0003. LLM-based cost-aware task scheduling for cloud computing systems
82 -- 0Xin He 0010, Zihao Zhang, Junchang Wang, Zheng Wu, Weibei Fan, Yiping Zuo. Rate-adaptive RDMA congestion control for AI clusters
83 -- 0Yanxiang Chen, Zhihao Shen, Jiakai Chen, Quankeng Huang, Guanjie Zhou, Wenchao Jiang, Weiqi Dai. A virtual machine group-oriented TPM system for trusted cloud computing
84 -- 0Michael Ayitey Junior, Peter Appiahene, Obed Appiah, Kwabena Adu. Cloud data privacy protection with homomorphic algorithm: a systematic literature review
85 -- 0M. Rekha, P. Shobha Rani. Enhancing cloud security using attention-based improved RegNet with hybrid vigenere-shift transposition algorithm
86 -- 0Nadeem Sarwar, Raed Alharthi, Hana Mohammed Mujlid, Faris A. Almalki. Enhancing IoT communication in fog computing: a lightweight remote user authentication and key management scheme utilizing ECC
87 -- 0Ya Zhang, Song Qing, Hossein Ghayoumi Zadeh, Ali Fayazi. Secure and personalized sports media recommendation via federated knowledge graph embedding in edge computing
88 -- 0Nura Shifa Musa, Thangavel Murugan, N. Nasurudeen Ahamed, Nada Masood Mirza. Research study on securing the cloud: utilizing conventional and blockchain-based access control mechanisms