


default search action
International Journal of Grid and Utility Computing, Volume 14
Volume 14, Number 1, 2023
- Monika, Om Prakash Sangwan:

Quality of service prediction model in cloud computing using adaptive dynamic programming parameter tuner. 1-14 - Pasquale Cantiello, Beniamino Di Martino, Michele Mastroianni

, Luigi Colucci Cante, Mariangela Graziano:
Towards a cloud model choice evaluation: comparison between cost/features and ontology-based analysis. 15-28 - Yusuke Gotoh, Toshihiro Kotani:

An evaluation environment for high-performance computing combining supercomputing and cloud. 29-36 - Marta Catillo, Umberto Villano, Massimiliano Rak:

A survey on auto-scaling: how to exploit cloud elasticity. 37-50 - Laércio Pioli, Victor Ströele, Mario A. R. Dantas:

An effort to characterise enhancements I/O of storage environments. 51-61 - Jordi Conesa, Montserrat Garcia-Alsina, Josep-Maria Batalla-Busquets, Beni Gómez-Zúñiga, María J. Martínez-Argüelles, Tona Monjo, Enric Mor, María del Carmen Cruz Gil:

A vision about lifelong learning and its barriers. 62-71
Volume 14, Numbers 2/3, 2023
- Yan Xiao:

Keyword extraction from news corpus by deep learning in the context of internet of things. 75-93 - Shanshan Ji, Jianxin Li, Jie Liu, Wenliang Cao, Bin Li, Fei Jiang, Yang Liu:

Mobile visual search algorithm based on improved VGG-F and hash with application in IoT. 94-106 - Lanlan Kang, Naiwei Liu, Wenliang Cao, Yeh-Cheng Chen:

Many-objective particle swarm optimisation algorithm based on multi-elite opposition mutation mechanism in the internet of things environment. 107-121 - Guangping Zhou:

Security technology for data transmission to the internet of things devices under the application of blockchain technology. 122-135 - Xinglin Wen:

Application of blockchain technology in copyright protection of digital music information. 136-145 - Bingjie Shen:

Text complexity analysis of college English textbooks based on blockchain and deep learning algorithms under the internet of things. 146-155 - Wei Yi:

Logistics scheduling optimisation and allocation of intercultural communication trade under internet of things and edge computing. 156-168 - Lanlan Kang, Xing Zhong, Wenliang Cao, Jianxin Li:

A modified multi-objective particle swarm optimisation with entropy adaptive strategy and Levy mutation in the internet of things environment. 169-181 - Aiming Shen:

Design of internet of things service system for logistics engineering by using the blockchain technology. 182-190 - Zhi Li, Yuemeng Ge, Min Jia, Yanrui Xu:

Data protection of internet of things for edge computing and deep learning and governance of cyberspace. 191-204 - Shihui Liu:

Application of the multi-objective model under the fuzzy differential equation to logistics operation of internet of things. 205-215 - Minzhi Wang:

Design and supply chain management of intelligent logistics system using cloud computing under internet of things. 216-228 - Kun Tang:

Optimising sports marketing strategy by the internet of things and blockchain technology. 229-238 - Chili He:

The use mechanism of blockchain and internet of things technology in memorial architecture of smart city. 239-249 - Fei Jiang, Chen-Xian Jiang, Jian Xin Li:

Deep learning for blockchain in medical supply chain risk management. 250-263 - Yueming Xiong:

Evaluation of customer service quality of platform-based online shopping under blockchain technology. 264-277 - Honghao Yu, Zhenqun Zou:

The music education and teaching innovation using blockchain technology supported by artificial intelligence. 278-296
Volume 14, Number 4, 2023
- Jamilson Dantas, Carlos Melo, Paulo Maciel, Rúbens de Souza Matos Júnior:

Cloud infrastructure planning: models considering an optimisation method, cost and performance requirements. 297-310 - Sirisha Potluri

, Sachi Nandan Mohanty, Sarita Mohanty:
QoS-driven hybrid task scheduling algorithm in a cloud computing environment. 311-319 - Bharati Mishra, Debasish Jena, Srikanta Patnaik:

Fine-grained access control of files stored in cloud storage with traceable and revocable multi-authority CP-ABE scheme. 320-338 - Basima Elshqeirat, Ahmad A. Al-Oqaily, Sieteng Soh, Kwan-Wu Chin, Amitava Datta:

On generating Pareto optimal set in bi-objective reliable network topology design. 339-355 - Prithviraj Singh Bisht, Preeti Mishra

, Pushpanjali Chauhan, R. C. Joshi:
HyperGuard: on designing out-VM malware analysis approach to detect intrusions from hypervisor in cloud environment. 356-367 - Priyanka Bharti, Rajeev Ranjan

:
Dynamic Bayesian network based prediction of performance parameters in cloud computing. 368-381 - Abhishek Das

, Mihir Narayan Mohanty:
Handwritten Odia numeral recognition using combined CNN-RNN. 382-388 - Shubangini Patil, Rekha Patil:

Jaya-based CAViaR: Hadamard product and key matrix for privacy preservation and data sharing in cloud computing environment. 389-399 - Yaroslav Matviychuk, Natalia Kryvinska

, Nataliya Shakhovska, Aneta Poniszewska-Maranda
:
New principles of finding and removing elements of mathematical model for reducing computational and time complexity. 400-410
Volume 14, Number 5, 2023
- B. Madhavi, M. V. Siva Prasad:

Design and fabrication of dual band AMC-backed monopole antenna for WLAN and Wi-Fi applications. 411-421 - Arbër Beshiri, Anastas Mishev

:
Authentication and authorisation in service-oriented grid architecture. 422-435 - Yinnan Yao, Changhao Tang, Kun Ma:

Toward stance parameter algorithm with aggregate comments for fake news detection. 443-454 - Costas Chaikalis, Dimitrios Kosmanos, Konstantinos E. Anagnostou, Ilias K. Savvas, Dimitros Bargiotas:

Enhancing the 5G V2X reliability using turbo coding for short frames. 455-468 - Yuanyou Cui, Yunxuan Su, Zheng Tu, Jindan Zhang:

Improved identity-based proxy-oriented outsourcing with public auditing for secure cloud storage. 469-479 - Yingjun He, Wenhui Ouyang, Shaolong Li, Lin Wang, Jing Zhou, Wenwei Su, Shenzhang Li, Donghui Mei, Yan Shi, Yanxu Jin, Chenglin Li, Yonghui Ren:

Cloud computing data privacy protection method based on blockchain. 480-492 - Erdal Özdogan

, Resul Das
:
Layered management approach to cyber security of IoT solutions. 493-504 - Yu Ning:

Research on the extraction of accounting multi-relationship information based on cloud computing and multimedia. 505-515 - Chalabi Baya, Yahya Slimani:

Efficient data storage: adaptively changing chunk size in cloud computing storage systems. 516-525 - Jagdeep Singh

, Sanjay Kumar Dhurandher:
SMGSAF: a secure multi-geocasting scheme for opportunistic networks. 526-538 - Uttom Akash, Partha Protim Paul, Ahsan Habib:

An event-driven and lightweight proactive auto-scaling architecture for cloud applications. 539-551
Volume 14, Number 6, 2023
- Rihito Fuchigami, Tomoyuki Ishida:

Virtual traditional craft simulation system in mixed reality environment. 553-561 - Torsak Soontornphand

, Mizuho Iwaihara, Juggapong Natwichai:
An efficient privacy-preservation algorithm for incremental data publishing. 562-582 - Hongfeng Yin, Baomin Xu, Weijing Li:

Cloud workflow scheduling algorithm based on multi-objective particle swarm optimisation. 583-596 - Qian Li:

Intelligent system design of urban street landscape device based on improved D*Lite algorithm. 597-605 - Umang Garg, Santosh Kumar, Manoj Kumar

:
INFRDET: IoT network flow regulariser-based detection and classification of IoT botnet. 606-616 - Victor Chang, Sreeja Boddu, Qianwen Ariel Xu, Le Minh Thao Doan:

Intrusion detection and prevention with machine learning algorithms. 617-631 - Nattapon Harnsamut, Juggapong Natwichai:

Privacy-aware trajectory data publishing: an optimal efficient generalisation algorithm. 632-643 - Madhavi Latha Pandala, Samanthapudi Swathi, Abdul Hussain Sharief, Suresh Penchala, Ganga Rama Koteswara Rao, Pala Mahesh Kumar

:
Performance enhancement of MIMO-OFDM using hybrid equalisers-based ICI mitigation with channel estimation in time varying channels. 644-653 - Ramgouda Patil, V. Chandraprakash:

Deer-based chicken swarm optimisation algorithm: a hybrid optimisation algorithm for output domain testing. 654-666

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














