default search action
International Journal of Grid and Utility Computing, Volume 14
Volume 14, Number 1, 2023
- Monika, Om Prakash Sangwan:
Quality of service prediction model in cloud computing using adaptive dynamic programming parameter tuner. 1-14 - Pasquale Cantiello, Beniamino Di Martino, Michele Mastroianni, Luigi Colucci Cante, Mariangela Graziano:
Towards a cloud model choice evaluation: comparison between cost/features and ontology-based analysis. 15-28 - Yusuke Gotoh, Toshihiro Kotani:
An evaluation environment for high-performance computing combining supercomputing and cloud. 29-36 - Marta Catillo, Umberto Villano, Massimiliano Rak:
A survey on auto-scaling: how to exploit cloud elasticity. 37-50 - Laércio Pioli, Victor Ströele, Mario A. R. Dantas:
An effort to characterise enhancements I/O of storage environments. 51-61 - Jordi Conesa, Montserrat Garcia-Alsina, Josep-Maria Batalla-Busquets, Beni Gómez-Zúñiga, María J. Martínez-Argüelles, Tona Monjo, Enric Mor, María del Carmen Cruz Gil:
A vision about lifelong learning and its barriers. 62-71
Volume 14, Numbers 2/3, 2023
- Yan Xiao:
Keyword extraction from news corpus by deep learning in the context of internet of things. 75-93 - Shanshan Ji, Jianxin Li, Jie Liu, Wenliang Cao, Bin Li, Fei Jiang, Yang Liu:
Mobile visual search algorithm based on improved VGG-F and hash with application in IoT. 94-106 - Lanlan Kang, Naiwei Liu, Wenliang Cao, Yeh-Cheng Chen:
Many-objective particle swarm optimisation algorithm based on multi-elite opposition mutation mechanism in the internet of things environment. 107-121 - Guangping Zhou:
Security technology for data transmission to the internet of things devices under the application of blockchain technology. 122-135 - Xinglin Wen:
Application of blockchain technology in copyright protection of digital music information. 136-145 - Bingjie Shen:
Text complexity analysis of college English textbooks based on blockchain and deep learning algorithms under the internet of things. 146-155 - Wei Yi:
Logistics scheduling optimisation and allocation of intercultural communication trade under internet of things and edge computing. 156-168 - Lanlan Kang, Xing Zhong, Wenliang Cao, Jianxin Li:
A modified multi-objective particle swarm optimisation with entropy adaptive strategy and Levy mutation in the internet of things environment. 169-181 - Aiming Shen:
Design of internet of things service system for logistics engineering by using the blockchain technology. 182-190 - Zhi Li, Yuemeng Ge, Min Jia, Yanrui Xu:
Data protection of internet of things for edge computing and deep learning and governance of cyberspace. 191-204 - Shihui Liu:
Application of the multi-objective model under the fuzzy differential equation to logistics operation of internet of things. 205-215 - Minzhi Wang:
Design and supply chain management of intelligent logistics system using cloud computing under internet of things. 216-228 - Kun Tang:
Optimising sports marketing strategy by the internet of things and blockchain technology. 229-238 - Chili He:
The use mechanism of blockchain and internet of things technology in memorial architecture of smart city. 239-249 - Fei Jiang, Chen-Xian Jiang, Jian Xin Li:
Deep learning for blockchain in medical supply chain risk management. 250-263 - Yueming Xiong:
Evaluation of customer service quality of platform-based online shopping under blockchain technology. 264-277 - Honghao Yu, Zhenqun Zou:
The music education and teaching innovation using blockchain technology supported by artificial intelligence. 278-296
Volume 14, Number 4, 2023
- Jamilson Dantas, Carlos Melo, Paulo Maciel, Rúbens de Souza Matos Júnior:
Cloud infrastructure planning: models considering an optimisation method, cost and performance requirements. 297-310 - Sirisha Potluri, Sachi Nandan Mohanty, Sarita Mohanty:
QoS-driven hybrid task scheduling algorithm in a cloud computing environment. 311-319 - Bharati Mishra, Debasish Jena, Srikanta Patnaik:
Fine-grained access control of files stored in cloud storage with traceable and revocable multi-authority CP-ABE scheme. 320-338 - Basima Elshqeirat, Ahmad A. Al-Oqaily, Sieteng Soh, Kwan-Wu Chin, Amitava Datta:
On generating Pareto optimal set in bi-objective reliable network topology design. 339-355 - Prithviraj Singh Bisht, Preeti Mishra, Pushpanjali Chauhan, R. C. Joshi:
HyperGuard: on designing out-VM malware analysis approach to detect intrusions from hypervisor in cloud environment. 356-367 - Priyanka Bharti, Rajeev Ranjan:
Dynamic Bayesian network based prediction of performance parameters in cloud computing. 368-381 - Abhishek Das, Mihir Narayan Mohanty:
Handwritten Odia numeral recognition using combined CNN-RNN. 382-388 - Shubangini Patil, Rekha Patil:
Jaya-based CAViaR: Hadamard product and key matrix for privacy preservation and data sharing in cloud computing environment. 389-399 - Yaroslav Matviychuk, Natalia Kryvinska, Nataliya Shakhovska, Aneta Poniszewska-Maranda:
New principles of finding and removing elements of mathematical model for reducing computational and time complexity. 400-410
Volume 14, Number 5, 2023
- B. Madhavi, M. V. Siva Prasad:
Design and fabrication of dual band AMC-backed monopole antenna for WLAN and Wi-Fi applications. 411-421 - Arbër Beshiri, Anastas Mishev:
Authentication and authorisation in service-oriented grid architecture. 422-435 - Yinnan Yao, Changhao Tang, Kun Ma:
Toward stance parameter algorithm with aggregate comments for fake news detection. 443-454 - Costas Chaikalis, Dimitrios Kosmanos, Konstantinos E. Anagnostou, Ilias K. Savvas, Dimitros Bargiotas:
Enhancing the 5G V2X reliability using turbo coding for short frames. 455-468 - Yuanyou Cui, Yunxuan Su, Zheng Tu, Jindan Zhang:
Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage. 469-479 - Yingjun He, Wenhui Ouyang, Shaolong Li, Lin Wang, Jing Zhou, Wenwei Su, Shenzhang Li, Donghui Mei, Yan Shi, Yanxu Jin, Chenglin Li, Yonghui Ren:
Cloud computing data privacy protection method based on blockchain. 480-492 - Erdal Özdogan, Resul Das:
Layered management approach to cyber security of IoT solutions. 493-504 - Yu Ning:
Research on the extraction of accounting multi-relationship information based on cloud computing and multimedia. 505-515 - Chalabi Baya, Yahya Slimani:
Efficient data storage: adaptively changing chunk size in cloud computing storage systems. 516-525 - Jagdeep Singh, Sanjay Kumar Dhurandher:
SMGSAF: a secure multi-geocasting scheme for opportunistic networks. 526-538 - Uttom Akash, Partha Protim Paul, Ahsan Habib:
An event-driven and lightweight proactive auto-scaling architecture for cloud applications. 539-551
Volume 14, Number 6, 2023
- Rihito Fuchigami, Tomoyuki Ishida:
Virtual traditional craft simulation system in mixed reality environment. 553-561 - Torsak Soontornphand, Mizuho Iwaihara, Juggapong Natwichai:
An efficient privacy-preservation algorithm for incremental data publishing. 562-582 - Hongfeng Yin, Baomin Xu, Weijing Li:
Cloud workflow scheduling algorithm based on multi-objective particle swarm optimisation. 583-596 - Qian Li:
Intelligent system design of urban street landscape device based on improved D*Lite algorithm. 597-605 - Umang Garg, Santosh Kumar, Manoj Kumar:
INFRDET: IoT network flow regulariser-based detection and classification of IoT botnet. 606-616 - Victor Chang, Sreeja Boddu, Qianwen Ariel Xu, Le Minh Thao Doan:
Intrusion detection and prevention with machine learning algorithms. 617-631 - Nattapon Harnsamut, Juggapong Natwichai:
Privacy-aware trajectory data publishing: an optimal efficient generalisation algorithm. 632-643 - Madhavi Latha Pandala, Samanthapudi Swathi, Abdul Hussain Sharief, Suresh Penchala, Ganga Rama Koteswara Rao, Pala Mahesh Kumar:
Performance enhancement of MIMO-OFDM using hybrid equalisers-based ICI mitigation with channel estimation in time varying channels. 644-653 - Ramgouda Patil, V. Chandraprakash:
Deer-based chicken swarm optimisation algorithm: a hybrid optimisation algorithm for output domain testing. 654-666
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.