| 1 | -- | 0 | Mohammad A. Altahat, Tariq Daradkeh, Anjali Agarwal. Virtual machine scheduling and migration management across multi-cloud data centers: blockchain-based versus centralized frameworks |
| 2 | -- | 0 | Peng Liu, Xinglong Wu, Yanjun Peng, Hangguan Shan, Saïd Mahmoudi, Bong-Jun Choi, Haksrun Lao. Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing |
| 3 | -- | 0 | K. Babu, A. Gokula Chandar, S. Kannadhasan. Prediction and diagnosis of cardiovascular disease using cloud and machine learning design |
| 4 | -- | 0 | Jian Yu, Qiong Yu, Zhixing Lin, Xiangmei Xiao. An approach for multipath optimal selection of network service combinations based on golden eagle optimizer with double learning strategies |
| 5 | -- | 0 | Umesh Kumar Lilhore, Sarita Simaiya, Yogesh Kumar Sharma, Anjani Kumar Rai, S. M. Padmaja, Khan Vajid Nabilal, Vimal Kumar, Roobaea Alroobaea, Hamed Alsufyani. Cloud-edge hybrid deep learning framework for scalable IoT resource optimization |
| 6 | -- | 0 | Saulo Ferreira, Júlio Mendonça, Bruno C. S. Nogueira, Willy Tiengo, Ermeson Carneiro de Andrade. Correction to: Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications |
| 7 | -- | 0 | Hao Feng, Haoyu Li, Yuming Liu, Kun Cao, Xiumin Zhou. A novel virtual machine placement algorithm based on grey wolf optimization |
| 8 | -- | 0 | Ting-Yan Lai, I-Ching Hsu. Integrating semantic web into context-aware mobile application based on cloud computing |
| 9 | -- | 0 | B. Bhasker, S. Kaliraj, C. Gobinath, V. Sivakumar. Optimizing energy task offloading technique using IoMT cloud in healthcare applications |
| 10 | -- | 0 | Jincheng Zhou, Umesh Kumar Lilhore, Poongodi M, Tao Hai, Sarita Simaiya, Dayang Norhayati Abang Jawawi, Deema Mohammed alsekait, Sachin Ahuja, Cresantus Biamba, Mounir Hamdi. Correction to: Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing |
| 11 | -- | 0 | Xianmei Hua, Xinrong Zhan, Feng Li, Junwen Lu. Financial service composition with various privacy levels in multiple cloud environment |
| 12 | -- | 0 | Zhang Ting-ting, Chen Yan, Dong Ren-zhi, Chen Tao, Liu Yan, Zhang Kai-Ge, Song Ai-Guo, Lan Yu-Shi. Autonomous decision-making of UAV cluster with communication constraints based on reinforcement learning |
| 13 | -- | 0 | Lionel Nkenyereye, Boon-Giin Lee, Wan-Young Chung. Functionality-aware offloading technique for scheduling containerized edge applications in IoT edge computing |
| 14 | -- | 0 | Muhammad Younus, Eko Priyo Purnomo, Achmad Nurmandi, Dyah Mutiarin, Halimah Abdul Manaf, Fathiya Mumtaz, Tiara Khairunnisa. Analyzing the trend of government support for cloud computing usage in e-government architecture |
| 15 | -- | 0 | Jie Cao, Cuicui Zhang, Ping Qi, Kekun Hu. Utility-driven virtual machine allocation in edge cloud environments using a partheno-genetic algorithm |
| 16 | -- | 0 | Xianglong Kong, Qiyu Liu, Wei Huang, Jiayu Du, Hongfa Li, Wen Ji, Fan Zhang. Enhancing configuration security with heterogeneous read points |
| 17 | -- | 0 | Lukasz Pawlik. Google Cloud vs. Azure: sentiment analysis accuracy for Polish and English across content types |
| 18 | -- | 0 | Junjie Cao, Zhiyong Yu, Min Cao, Baohong Zhu, Jian Yang. Server deployment strategies considering robustness and resource constraints in edge computing |
| 19 | -- | 0 | Sultan H. Almotiri. AI driven IOMT security framework for advanced malware and ransomware detection in SDN |
| 20 | -- | 0 | Jay Dave, Kamalesh Ram R., Pratik Patil, Himanshu Patil, Sarvesh Borole, Subhrakanta Panda. Secure and efficient ownership verification for deduplicated cloud computing systems |
| 21 | -- | 0 | Altaf Hussain, Shuaiyong Li, Tariq Hussain, Razaz Waheeb Attar, Ahmed Alhomoud, Reem Alsagri, Ahmad Ali AlZubi. Blockchain-enabled Zero Trust-based Secure and Energy Efficient scheme for 6G-enabled UASNs |
| 22 | -- | 0 | Pietro Fusco, Alba Amato, Salvatore Venticinque. Cloud-based analysis of aerial imagery for unveiling ancient archaeological patterns |
| 23 | -- | 0 | José María López, Joaquín Entrialgo, Manuel García, Javier García 0002, José Luis Díaz, Rubén Usamentiaga. Fast autoscaling algorithm for cost optimization of container clusters |
| 24 | -- | 0 | Dinah Waref, Yomna Alayary, Nadeen Fathallah, Mohamed A. Abd El ghany, Mohammed A.-M. Salem. Client aware adaptive federated learning using UCB-based reinforcement for people re-identification |
| 25 | -- | 0 | Xiaojun Zhang, Zhizhong Liu, Dianhui Chu, Meiyue Zhao. Perception of premium services based on the evolution of hyper-service network in mobile edge computing |
| 26 | -- | 0 | Abdollah Rahimi, Mehdi Jafari Shahbazzadeh, Amid Khatibi Bardsiri. An adaptive intelligent thermal-aware routing protocol for wireless body area networks |
| 27 | -- | 0 | Neetesh Kumar Nema, Vivek Shukla, Rohit Miri, Praveen Chouksey, Rohit Raja, Kamred Udham Singh, Ankit Kumar, Mohd Asif Shah. Sentence type identification-based product review sentiment analysis using BeDi-DC and Log-Squish CNN |
| 28 | -- | 0 | Saulo Ferreira, Júlio Mendonça 0001, Bruno Nogueira 0001, Willy Tiengo, Ermeson C. Andrade. Correction: Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications |
| 29 | -- | 0 | Danilo Rafael de Lima Cabral, Pedro Antonino, Augusto Cezar Alves Sampaio. Demystification and near-perfect estimation of minimum gas limit and gas used for Ethereum smart contracts |
| 30 | -- | 0 | Vipin Jain, Lokesh Malviya, Anjana S. Optimized hybrid deep learning for cross-linguistic sentiment analysis: a novel approach |
| 31 | -- | 0 | Babar Shahzaad, Alistair Barros, Colin J. Fidge. Service function tree mapping of microservices on resource-constrained fog networks |
| 32 | -- | 0 | Hafiz Gulfam Ahmad Umar, Iqra Yasmeen, Muhammad Aoun, Tehseen Mazhar, Muhammad Amir Khan, Inès Hilali-Jaghdam, Habib Hamam. Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model |
| 33 | -- | 0 | Nasser S. Albalawi. Dynamic scheduling strategies for cloud-based load balancing in parallel and distributed systems |
| 34 | -- | 0 | Joonseok Park, Sumin Jeong, Keunhyuk Yeom. Private cloud bespoke orchestrator: techniques for constructing and operating bespoke-private cloud virtual machine environments for cloud users |
| 35 | -- | 0 | Umesh Kumar Lilhore, Sarita Simaiya, Roobaea Alroobaea, Abdullah M. Baqasah, Majed Alsafyani, Afnan Alhazmi, M. D. Monish Khan. SmartTrust: a hybrid deep learning framework for real-time threat detection in cloud environments using Zero-Trust Architecture |
| 36 | -- | 0 | Cong Liu 0012, Wenjuan Liu, Na Guo, Rongjia Song, Yan Gu, Long Cheng 0003, Qingtian Zeng. Comparative evaluation of encoding techniques for workflow process remaining time prediction for cloud applications |
| 37 | -- | 0 | Fanlong Zhang, Huanming Chen, Quan Chen, JianQi Liu. Cloud software code generation via knowledge graphs and multi-modal learning |
| 38 | -- | 0 | Seyed Salar Sefati, Bahman Arasteh, Octavian Fratu, Simona Halunga. SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation |
| 39 | -- | 0 | Yazeed Yasin Ghadi, Syed Faisal Abbas Shah, Wajahat Waheed, Tehseen Mazhar, Wasim Ahmad, Mamoon M. Saeed, Habib Hamam. Integration of wearable technology and artificial intelligence in digital health for remote patient care |
| 40 | -- | 0 | Huangyining Gao, Ruyue Xin, Peng Chen, Xi Li, Ning Lu, Peng You. Memory-augment graph transformer based unsupervised detection model for identifying performance anomalies in highly-dynamic cloud environments |
| 41 | -- | 0 | Yu-Fang Chen 0001, Frank Yeong-Sung Lin, Kuang-Yen Tai, Chiu-Han Hsiao, Wei-Hsin Wang, Ming-Chi Tsai, Tzu-Lung Sun. A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks |
| 42 | -- | 0 | Raúl Miñón, Josu Díaz-de-Arcaya, Ana I. Torre-Bastida, Juan López-de-Armentia, Gorka Zárate, Lander Bonilla, Asier Garcia-Perez, Jon Aguirre-Usandizaga. ArtifactOps and ArtifactDL: a methodology and a language for conceptualizing and operationalising different types of pipelines |
| 43 | -- | 0 | Abdullah Ayub Khan, Asif Ali Laghari, Hamad Almansour, Leila Jamel 0001, Fahima Hajjej, Vania Vieira Estrela, Mohamad Afendee Mohamed, Sajid Ullah. Quantum computing empowering blockchain technology with post quantum resistant cryptography for multimedia data privacy preservation in cloud-enabled public auditing platforms |
| 44 | -- | 0 | Nithin Melala Eshwarappa, Hojjat Baghban, Ching-Hsien Hsu, Po-Yen Hsu, Ren-Hung Hwang, Mu-Yen Chen. Communication-efficient and privacy-preserving federated learning for medical image classification in multi-institutional edge computing |
| 45 | -- | 0 | Guoxiu Zhang, Xinyi He, Xiaofeng Wang. PCL-RC: a parallel cloud resource load prediction model based on feature optimization |
| 46 | -- | 0 | Yang Zhang, Ling Yang, Yan Tan. Energy-efficient adaptive routing in heterogeneous wireless sensor networks via hybrid PSO and dynamic clustering |
| 47 | -- | 0 | Hatoon S. AlSagri, Ankit Kumar, Abdul Khader Jilani Saudagar, Abhishek Kumar 0013, Linesh Raja. Optimizing resource allocation in precision farming using quantum enhanced algorithms and quantum sensor networks |
| 48 | -- | 0 | Ahmed M. Alwakeel. Adaptive edge-fog healthcare networks: a novel framework for emergency response management |
| 49 | -- | 0 | Alaa O. Khadidos, Hariprasath Manoharan, Shitharth Selvarajan, Adil Omar Khadidos, Achyut Shankar, Gwanggil Jeon, Wattana Viriyasitavat. Secured transmission approach for transportation units with twin creations and artificial intelligence algorithm |
| 50 | -- | 0 | Xiaomo Yu, Mingjun Zhu, Menghan Zhu, Xiaomeng Zhou, Long Long. A novel Location-Aware job scheduling framework for optimizing Fog-Cloud IoT systems: insights from dynamic traffic management |
| 51 | -- | 0 | Shallu Duggal, Parminder Kaur, Mukesh Kumar, Vivek Bhardwaj 0001. IoT-enabled fog computing framework: heat stroke risk analysis |
| 52 | -- | 0 | Mohsen Ghorbian, Mostafa Ghobaei Arani, Leila Esmaeili. An energy-conscious scheduling framework for serverless edge computing in IoT |
| 53 | -- | 0 | Navjeet Kaur, Ayush Mittal, Anuj Jain, Umesh Kumar Lilhore, Sultan Mesfer Aldossary, Sarita Simaiya, Ehab Seif Ghith, Abdullah Baihan, Hanaa A. Abdallah, M. D. Monish Khan. Blockchain-enhanced security and bayesian trust assessment for secure task scheduling in latency-critical fog computing environments |
| 54 | -- | 0 | Umesh Kumar Lilhore, Scaria Alex, Vince Paul, Rahoof Puthan Purayil, Sultan Mesfer Aldossary, Sarita Simaiya, Ehab Seif Ghith, Heba G. Mohamed, M. D. Monish Khan. QHRMOF: A Quantum-Inspired hybrid Multi-Objective framework for Energy-Efficient task scheduling and load balancing in cloud computing |
| 55 | -- | 0 | Gavini Sreelatha, Tan Kuan Tak, Rajkumar Kalimuthu, Pravin R. Kshirsagar, Balajee Maram, T. Venkatakrishnamoorthy. Detecting hidden communication threats in cloud systems using advanced pattern and threat propagation analysis |
| 56 | -- | 0 | Kirupa Shankar Komathi Maathavan, Santhi Venkatraman. Integrating machine learning and encryption for effective data management in blood bank supply chains |
| 57 | -- | 0 | Aun Abbas, Muqaddas Salahuddin, Muhammad Zohaib Khan, Abdullah Ayub Khan, Fahim Uz Zaman, Syed Azeem Inam, Ghadah Aldehim, Tehseen Mazhar, Muhammad Amir Khan. Machine learning-based hybrid technique to enhance cyber-attack perspective |
| 58 | -- | 0 | Abdullah Ayub Khan, Abdul Khalique Shaikh, Roobaea Alroobaea, Abdullah M. Baqasah, Majed Alsafyani, Hamed Alsufyani, Asif Ali Laghari. Blockchain-enabled secure Internet of Medical Things (IoMT) architecture for multi-modal data fusion in precision cancer diagnosis and continuous monitoring |
| 59 | -- | 0 | Vishnu Prasad Verma, Sumit Kumar, Santosh Kumar 0006, Nenavath Srinivas Naik, Rishav Dubey. Optimizing Spark job scheduling with distributional deep learning in cloud environments |
| 60 | -- | 0 | Leeladhar Chourasiya, Sushma Khatri, Umesh Kumar Lilhore, Sarita Simaiya, Roobaea Alroobaea, Abdullah M. Baqasah, Majed Alsafyani, M. D. Monish Khan. Advanced system log analyzer for anomaly detection and cyber forensic investigations using LSTM and transformer networks |
| 61 | -- | 0 | Chunggeon Song, HeonChang Yu, Joon-Min Gil. MkRP: multiple k registry placement for fast container deployment on edge computing |
| 62 | -- | 0 | Michaelraj Kingston Roberts, Sampath Kumar Shanmugam, Muna Al-Razgan, Taha Alfakih. A nature-inspired dual phased fuzzy hybrid algorithm for adaptive self-healing and dynamic energy-aware resource management in cloud computing |
| 63 | -- | 0 | Seyedeh Somayeh Fateminasab, Nastaran Evaznia, Saeideh Memarian, María del Carmen Romero Ternero, Gloria Miró-amarante, Seyed Reza Kamel Tabbakh. An efficient blockchain-based resource allocation and secure data storage model using Fire Hawk Optimization and entropy in health tourism |
| 64 | -- | 0 | Lei Xi, Caizhong Li, Maryam Saberi Anari, Khosro Rezaee. Integrating wearable health devices with AI and edge computing for personalized rehabilitation |
| 65 | -- | 0 | Haibo Dong, Zhenxiang Liu, Edris Khezri. Optimized tourist point-of-interest recommendation through ARIMA and SVD in edge environment |
| 66 | -- | 0 | Amina Konswa, Amr Mohamed Abdelatif. Energy-aware real-time task partitioning on multi-core processors with shared resources |
| 67 | -- | 0 | Miaoer Li, Yi Zhu 0008, Yali Liu, Zexin Li, Junge Huang. Graph attention network vulnerability detection model with global feature augmentation for smart contracts |
| 68 | -- | 0 | Hongyuan Guo, Maryam Saberi Anari, Khosro Rezaee. Cloud-enabled style-aware artwork composite recommendation based on correlation graph |
| 69 | -- | 0 | Jun Ma, Pengtao Gao, Yuancheng Wang. Innovative IoT device identification method based on residual-connected Capsule Network |
| 70 | -- | 0 | Ruppikha Sree Shankar, Tanuja Shailesh, R. Vijaya Arjunan, Krishnaraj Chadaga, D. Cenitta. Smart health monitoring: an interactive Raspberry Pi-based system for managing diabetes and hypertension in children |
| 71 | -- | 0 | Sudhanshu Maurya, Karthik Sekhar, Priyadarsini K, P. C. Karthik, V. G. Saranya. Hybrid compression-based routing strategies for enhanced energy efficiency in wireless sensor networks |
| 72 | -- | 0 | Tarek Abid, Ahmed Ahmim, Faiz Maazouzi, Djalel Chefrour, Insaf Ullah, Marwa Ahmim, Reham Almukhlifi. A novel IoT threat detection using GWO feature selection and CNN-enhanced LightGBM |
| 73 | -- | 0 | Rashmi Verma, Manisha Jailia. A hybrid metaheuristic federated learning approach based attack detection system for multi-cloud environment |
| 74 | -- | 0 | Ahmad Salah Al-Ahmad, Anup Shrestha, Omar Ali, Hasan Kahtan. Cross-technology cloud offloading model |
| 75 | -- | 0 | Nahin F. Siddiqui, Zarif Safwan Hoque, Md. Ehsanul Haque, Abu Raihan Mostofa Kamal, A. K. M. Azad, Salem A. Alyami, Md Azam Hossain. SpectraNet: a lightweight hybrid time-frequency deep learning framework for sustainable cloud workload forecasting |
| 76 | -- | 0 | Ming Chen, Tianyi Zhang, Ping Qi, Zhihe Chen, Xiaoya Pi. Synergistic cloud-edge intelligence for real-time multimodal entity linking and knowledge retrieval |
| 77 | -- | 0 | Asif Ali, Izhar Ahmed Khan, Yuanqing Xia, Yuan Tian, Saba Sajid, Mohammed Alsuhaibani. A retrieval-augmented LLM framework for severity prediction of bug reports in cloud-based mobile applications |
| 78 | -- | 0 | Aarti Punia, Preeti Gulia, Nasib Singh Gill, Deepak Kaushik, Noha Alduaiji, Piyush Kumar Shukla, Ankur Pandey. An access control system for cloud-based healthcare systems driven by blockchain |
| 79 | -- | 0 | Maryam Gholamhosseini, Omid Mahdiyar, Mehdi Taghizadeh, Jasem Jamali. Collaborative smart detectors for edge surveillance in cognitive monitoring systems using Kullback-Leibler divergence |
| 80 | -- | 0 | S. Subashree, M. Rajakumaran, G. Pushpa, S. Senthilkumar. Hybrid dolphin swarm sparrow search optimization based multi-objective cloud workflow scheduling |
| 81 | -- | 0 | Haoran Pei, Yan Gu, Yajuan Sun, Qingle Wang, Cong Liu, Xiaomin Chen, Long Cheng 0003. LLM-based cost-aware task scheduling for cloud computing systems |
| 82 | -- | 0 | Xin He 0010, Zihao Zhang, Junchang Wang, Zheng Wu, Weibei Fan, Yiping Zuo. Rate-adaptive RDMA congestion control for AI clusters |
| 83 | -- | 0 | Yanxiang Chen, Zhihao Shen, Jiakai Chen, Quankeng Huang, Guanjie Zhou, Wenchao Jiang, Weiqi Dai. A virtual machine group-oriented TPM system for trusted cloud computing |
| 84 | -- | 0 | Michael Ayitey Junior, Peter Appiahene, Obed Appiah, Kwabena Adu. Cloud data privacy protection with homomorphic algorithm: a systematic literature review |
| 85 | -- | 0 | M. Rekha, P. Shobha Rani. Enhancing cloud security using attention-based improved RegNet with hybrid vigenere-shift transposition algorithm |
| 86 | -- | 0 | Nadeem Sarwar, Raed Alharthi, Hana Mohammed Mujlid, Faris A. Almalki. Enhancing IoT communication in fog computing: a lightweight remote user authentication and key management scheme utilizing ECC |
| 87 | -- | 0 | Ya Zhang, Song Qing, Hossein Ghayoumi Zadeh, Ali Fayazi. Secure and personalized sports media recommendation via federated knowledge graph embedding in edge computing |
| 88 | -- | 0 | Nura Shifa Musa, Thangavel Murugan, N. Nasurudeen Ahamed, Nada Masood Mirza. Research study on securing the cloud: utilizing conventional and blockchain-based access control mechanisms |