Journal of Cloud Computing: Advances, Systems and Applications, Vol. 11, 2022
Articles
1.) HCorrection: Violence detection approach based on cloud data and Neutrosophic cognitive maps. --Mohammad Saif Wajid, Hugo Terashima-Marin, Peyman Najafrad Paul Rad and Mohd Anas Wajid
2.) Job scheduling problem in fog-cloud-based environment using reinforced social spider optimization. --P. Kuppusamy, N. Marline Joys Kumari, Wael Y. Alghamdi, Hashem Alyami, Rajakumar Ramalingam, Abdul Rehman Javed and Mamoon Rashid
3.) Improved Jellyfish Algorithm-based multi-aspect task scheduling model for IoT tasks over fog integrated cloud environment. --Nupur Jangu and Zahid Raza
4.) A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system. --Ahmed A. Mawgoud, Mohamed Hamed N. Taha, Amr Abu-Talleb and Amira Kotb
5.) PMHE: a wearable medical sensor assisted framework for health care based on blockchain and privacy computing. --Jindong Zhao, Wenshuo Wang, Dan Wang, Xuan Wang and Chunxiao Mu
6.) A systematic review on effective energy utilization management strategies in cloud data centers. --Suraj Singh Panwar, M. M. S. Rauthan and Varun Barthwal
7.) Federated learning in cloud-edge collaborative architecture: key technologies, applications and challenges. --Guanming Bao and Ping Guo
8.) A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique. --Qian Zhou, Chengzhe Lai, Qili Guo, Haoyan Ma and Dong Zheng
9.) Efficient 3D object recognition in mobile edge environment. --Mofei Song and Qi Guo
10.) NIDD: an intelligent network intrusion detection model for nursing homes. --Feng Zhou, Xin Du, Wenli Li, Zhihui Lu and Jie Wu
11.) Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning. --Juan Chen, Peng Chen, Xianhua Niu, Zongling Wu, Ling Xiong and Canghong Shi
12.) Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments. --Chingfang Hsu, Lein Harn, Zhe Xia, Linyan Bai and Ze Zhang
13.) A novel vehicular task deployment method in hybrid MEC. --Xifeng Xu, Yunni Xia, Feng Zeng, Fan Li, Hong Xie, Xiaodong Fu and Mengdi Wang
14.) Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm. --Moses Ashawa, Oyakhire Douglas, Jude Osamor and Riley Jackie
15.) Task partitioning and offloading in IoT cloud-edge collaborative computing framework: a survey. --Haiming Chen, Wei Qin and Lei Wang
-------
-------
1.) HCorrection: Violence detection approach based on cloud data and Neutrosophic cognitive maps. --Mohammad Saif Wajid, Hugo Terashima-Marin, Peyman Najafrad Paul Rad and Mohd Anas Wajid
2.) Job scheduling problem in fog-cloud-based environment using reinforced social spider optimization. --P. Kuppusamy, N. Marline Joys Kumari, Wael Y. Alghamdi, Hashem Alyami, Rajakumar Ramalingam, Abdul Rehman Javed and Mamoon Rashid
3.) Improved Jellyfish Algorithm-based multi-aspect task scheduling model for IoT tasks over fog integrated cloud environment. --Nupur Jangu and Zahid Raza
4.) A deep learning based steganography integration framework for ad-hoc cloud computing data security augmentation using the V-BOINC system. --Ahmed A. Mawgoud, Mohamed Hamed N. Taha, Amr Abu-Talleb and Amira Kotb
5.) PMHE: a wearable medical sensor assisted framework for health care based on blockchain and privacy computing. --Jindong Zhao, Wenshuo Wang, Dan Wang, Xuan Wang and Chunxiao Mu
6.) A systematic review on effective energy utilization management strategies in cloud data centers. --Suraj Singh Panwar, M. M. S. Rauthan and Varun Barthwal
7.) Federated learning in cloud-edge collaborative architecture: key technologies, applications and challenges. --Guanming Bao and Ping Guo
8.) A novel privacy protection scheme for internet of things based on blockchain and privacy set intersection technique. --Qian Zhou, Chengzhe Lai, Qili Guo, Haoyan Ma and Dong Zheng
9.) Efficient 3D object recognition in mobile edge environment. --Mofei Song and Qi Guo
10.) NIDD: an intelligent network intrusion detection model for nursing homes. --Feng Zhou, Xin Du, Wenli Li, Zhihui Lu and Jie Wu
11.) Task offloading in hybrid-decision-based multi-cloud computing network: a cooperative multi-agent deep reinforcement learning. --Juan Chen, Peng Chen, Xianhua Niu, Zongling Wu, Ling Xiong and Canghong Shi
12.) Information-theoretic secure rational secret sharing in asynchronous networks for untrusted cloud environments. --Chingfang Hsu, Lein Harn, Zhe Xia, Linyan Bai and Ze Zhang
13.) A novel vehicular task deployment method in hybrid MEC. --Xifeng Xu, Yunni Xia, Feng Zeng, Fan Li, Hong Xie, Xiaodong Fu and Mengdi Wang
14.) Improving cloud efficiency through optimized resource allocation technique for load balancing using LSTM machine learning algorithm. --Moses Ashawa, Oyakhire Douglas, Jude Osamor and Riley Jackie
15.) Task partitioning and offloading in IoT cloud-edge collaborative computing framework: a survey. --Haiming Chen, Wei Qin and Lei Wang
-------
-------
Mohammad Saif Wajid - Personal Name
Chingfang Hsu - Personal Name
Juan Chen - Personal Name
Feng Zhou - Personal Name
Mofei Song - Personal Name
Qian Zhou - Personal Name
Guanming Bao - Personal Name
Suraj Singh Panwar - Personal Name
Jindong Zhao - Personal Name
Ahmed A. Mawgoud - Personal Name
Nupur Jangu - Personal Name
P. Kuppusamy - Personal Name
Xifeng Xu - Personal Name
Chingfang Hsu - Personal Name
Juan Chen - Personal Name
Feng Zhou - Personal Name
Mofei Song - Personal Name
Qian Zhou - Personal Name
Guanming Bao - Personal Name
Suraj Singh Panwar - Personal Name
Jindong Zhao - Personal Name
Ahmed A. Mawgoud - Personal Name
Nupur Jangu - Personal Name
P. Kuppusamy - Personal Name
Xifeng Xu - Personal Name
Vol. 11, 2022
2192-113X
e-Journal TI
Inggris
Springer Nature
2022
Cambridge, United Kingdom
LOADING LIST...
LOADING LIST...