


default search action
International Journal of Grid and Utility Computing, Volume 16
Volume 16, Number 1, 2025
- Reddy Sai Sindhu Theja, Gopal K. Shyam, Shanthi Makka:
Optimal attack detection using an enhanced machine learning algorithm. 1-14 - Nassima Bouchareb:
An intelligent mechanism for requirements change management of cloud computing requests. 15-28 - Alba Haveriku
, Hakik Paci, Nelda Kote
, Paola Shasivari, Elinda Kajo Meçe
:
A systematic review of eye-tracking data in NLP: exploring low-cost and cross-lingual possibilities. 29-40 - Kaveri Kori, Sridevi Hosmani:
Hybrid optimisation-based reliable routing with traffic management and congestion control. 41-59 - Tatsuya Oogami, Hitomi Tamura, Daiki Nobayashi, Kazuya Tsukamoto:
Experimental evaluation of downlink communication performance of IEEE 802.11ax wireless LAN: OFDM vs. OFDMA. 60-68 - Phudit Ampririt, Shunya Higashi, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
A fuzzy-based system for handover in 5G wireless networks considering different network slicing constraints: a comparison study of two implemented models. 69-81
Volume 16, Number 2, 2025
- Shunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, Leonard Barolli:
A fuzzy-based system for assessment of emotional trust: a comparison study of two implemented models. 83-93 - Admir Barolli:
Assessment of six router replacement methods for router placement optimisation in WMNs considering different network scales and subway mesh client distribution. 94-104 - Momoka Hagihara, Naho Kuriya, Tomoyuki Ishida:
Real-time video avatar generation method for realistic communication in the metaverse. 105-116 - Takumi Takeshita, Yoshihiro Okada:
Native two-hands gesture input interface of IntelligentBox using leap motion controller and its applications. 117-127 - Mingyu Zhou, Xiong Zhang, Yuanhang Zhang, Liu Hao, Guangming Wu:
An improved redactable signature-based public auditing scheme for the COVID-19 cloud data. 128-137 - Xiaoxuan Xu, Yuanyou Cui, Dianhua Tang, Yunfei Cao, Jindan Zhang:
Improved data integrity audit scheme based on certificateless public key cryptography and its application in COVID-19 epidemic data management. 138-150 - Davinder Kaur, Suleyman Uslu, Arjan Durresi:
Quantum algorithms use in trust-centric AI applications. 151-161 - Wei Lu:
Web-based botnet for blocking control flow in open-source medical syringe pump. 162-172 - Akari Kanazawa, Tetsuya Shigeyasu:
Neighbour caching content retrieval in named data networking: an enhanced utilisation method. 173-182 - Makoto Ikeda, Naoki Tanaka, Hibiki Tanaka, Leonard Barolli:
An AI-driven support system for detecting distracted driving behaviour and improving safe driving. 183-190
Volume 16, Number 3, 2025
- Yuling Chen, Hongyan Yin, Yaocheng Zhang, Wei Ren, Yi Ren:
A privacy-aware and fair self-exchanging self-trading scheme for IoT data based on smart contract. 191-201 - Georgia Garani, Nunziato Cassavia, Ilias K. Savvas:
A cloud-based spatiotemporal data warehouse approach. 202-210 - Carlos Melo, Jean Araujo, Jamilson Dantas, Paulo Pereira, Felipe Oliveira, Paulo Maciel:
Cloud infrastructure planning considering the impact of maintenance and self-healing routines over cost and dependability attributes. 211-223 - Devendra Kumar, Laxman Singh, Anil Kumar:
An experimental analysis of traditional machine learning techniques for classification of non-functional requirements. 224-237 - Reiya Yahada, Tomoyuki Ishida:
Implementation and evaluation of a mixed reality traditional craft sharing system. 238-246 - Purvi Tandel, Jitendra Nasriwala
:
Quantum-safe authentication mechanism for IoT devices using hash-based post-quantum signature schemes: a short review. 247-258 - Dilawaer Duolikun, Tomoya Enokido, Makoto Takizawa:
An SMIM algorithm for reduction of energy consumption of virtual machines in a cluster. 259-268 - Bhagwat Prasad Chaudhury, Kasturi Dhal
, Srikanta Patnaik, Ajit Kumar Nayak:
FIAC: fine-grained access control mechanism for cloud based IoT framework. 269-278 - Prateek Thakral
, Pardeep Kumar, Yugal Kumar:
An improved transient search optimisation technique for effective data clustering. 279-295
Volume 16, Number 4, 2025
- Hetal A. Joshiara, Chirag S. Thaker, Sanjay M. Shah, Darshan B. Choksi:
Enhanced speculative approach for big data processing using BM-LOA algorithm in cloud environment. 297-309 - Zhenbo Zang, Honglei Zhang, Hongjun Zhu:
Importance of big data for analysing models in social networks and improving business. 310-324 - Pandillapalli Amaranatha Reddy, M. H. M. Krishna Prasad, S. Rao Chintalapudi:
Strongly correlated high-utility item-sets recommendation in e-commerce applications using EGUI-tree over data stream. 325-337 - Weilong Ding, Zhuofeng Zhao, Jie Zhou, Han Li:
SDSAM: a service-oriented approach for descriptive statistical analysis of multidimensional spatio-temporal big data. 338-348 - Ajay Kumar Dubey, Vimal Mishra:
Design and analysis of novel hybrid load balancing algorithm for cloud data centre. 349-362 - Elis Kulla:
Data collection in underwater wireless sensor networks: performance evaluation of FBR and epidemic routing protocols for node density and area shape. 363-370 - Priyanka Kujur, Sanjeev Patel:
Detection of DDoS attacks using supervised ML and deep learning approaches for SDN. 371-391 - Luma Fawaz Jarallah, Baraa Bassam Yahya, M. A. Alsalem:
Examining determinants of blockchain-based smart contract adoption in local government: an empirical study in developing countries. 392-406

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.