


default search action
Journal of Cloud Computing, Volume 14
Volume 14, Number 1, December 2025
- Mohammad A. Altahat

, Tariq Daradkeh, Anjali Agarwal:
Virtual machine scheduling and migration management across multi-cloud data centers: blockchain-based versus centralized frameworks. 1 - Peng Liu, Xinglong Wu, Yanjun Peng, Hangguan Shan, Saïd Mahmoudi, Bong Jun Choi, Haksrun Lao:

Trustworthy and efficient project scheduling in IIoT based on smart contracts and edge computing. 2 - K. Babu, A. Gokula Chandar, S. Kannadhasan

:
Prediction and diagnosis of cardiovascular disease using cloud and machine learning design. 3 - Jian Yu, Qiong Yu, Zhixing Lin, Xiangmei Xiao:

An approach for multipath optimal selection of network service combinations based on golden eagle optimizer with double learning strategies. 4 - Umesh Kumar Lilhore, Sarita Simaiya

, Yogesh Kumar Sharma
, Anjani Kumar Rai, S. M. Padmaja, Khan Vajid Nabilal, Vimal Kumar, Roobaea Alroobaea
, Hamed Alsufyani:
Cloud-edge hybrid deep learning framework for scalable IoT resource optimization. 5 - Saulo Ferreira, Júlio Mendonça, Bruno C. S. Nogueira, Willy Tiengo, Ermeson Carneiro de Andrade:

Correction to: Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications. 6 - Hao Feng, Haoyu Li, Yuming Liu, Kun Cao, Xiumin Zhou:

A novel virtual machine placement algorithm based on grey wolf optimization. 7 - Ting-Yan Lai, I-Ching Hsu:

Integrating semantic web into context-aware mobile application based on cloud computing. 8 - B. Bhasker, S. Kaliraj, C. Gobinath, V. Sivakumar:

Optimizing energy task offloading technique using IoMT cloud in healthcare applications. 9 - Jincheng Zhou, Umesh Kumar Lilhore, Poongodi M, Tao Hai, Sarita Simaiya

, Dayang Norhayati Abang Jawawi, Deema Mohammed Alsekait, Sachin Ahuja, Cresantus N. Biamba, Mounir Hamdi:
Correction to: Comparative analysis of metaheuristic load balancing algorithms for efficient load balancing in cloud computing. 10 - Xianmei Hua, Xinrong Zhan, Feng Li, Junwen Lu:

Financial service composition with various privacy levels in multiple cloud environment. 11 - Zhang Ting-Ting, Chen Yan, Dong Ren-zhi, Chen Tao

, Liu Yan, Zhang Kai-Ge, Song Ai-Guo, Lan Yu-Shi:
Autonomous decision-making of UAV cluster with communication constraints based on reinforcement learning. 12 - Lionel Nkenyereye, Boon-Giin Lee

, Wan-Young Chung:
Functionality-aware offloading technique for scheduling containerized edge applications in IoT edge computing. 13 - Muhammad Younus, Eko Priyo Purnomo, Achmad Nurmandi, Dyah Mutiarin, Halimah Abdul Manaf, Fathiya Mumtaz, Tiara Khairunnisa:

Analyzing the trend of government support for cloud computing usage in e-government architecture. 14 - Jie Cao, Cuicui Zhang, Ping Qi, Kekun Hu:

Utility-driven virtual machine allocation in edge cloud environments using a partheno-genetic algorithm. 15 - Xianglong Kong, Qiyu Liu, Wei Huang, Jiayu Du, Hongfa Li, Wen Ji, Fan Zhang:

Enhancing configuration security with heterogeneous read points. 16 - Lukasz Pawlik

:
Google Cloud vs. Azure: sentiment analysis accuracy for Polish and English across content types. 17 - Junjie Cao, Zhiyong Yu, Min Cao, Baohong Zhu, Jian Yang:

Server deployment strategies considering robustness and resource constraints in edge computing. 18 - Sultan H. Almotiri

:
AI driven IOMT security framework for advanced malware and ransomware detection in SDN. 19 - Jay Dave, Kamalesh Ram R., Pratik Patil, Himanshu Patil, Sarvesh Borole, Subhrakanta Panda:

Secure and efficient ownership verification for deduplicated cloud computing systems. 20 - Altaf Hussain, Shuaiyong Li, Tariq Hussain, Razaz Waheeb Attar, Ahmed Alhomoud, Reem Alsagri, Ahmad Ali AlZubi:

Blockchain-enabled Zero Trust-based Secure and Energy Efficient scheme for 6G-enabled UASNs. 21 - Pietro Fusco, Alba Amato

, Salvatore Venticinque:
Cloud-based analysis of aerial imagery for unveiling ancient archaeological patterns. 22 - José María López, Joaquín Entrialgo

, Manuel García, Javier García, José Luis Díaz, Rubén Usamentiaga:
Fast autoscaling algorithm for cost optimization of container clusters. 23 - Dinah Waref

, Yomna Alayary, Nadeen Fathallah, Mohamed A. Abd El Ghany, Mohammed A.-M. Salem:
Client aware adaptive federated learning using UCB-based reinforcement for people re-identification. 24 - Xiaojun Zhang, Zhizhong Liu, Dianhui Chu, Meiyue Zhao:

Perception of premium services based on the evolution of hyper-service network in mobile edge computing. 25 - Abdollah Rahimi, Mehdi Jafari Shahbazzadeh, Amid Khatibi Bardsiri:

An adaptive intelligent thermal-aware routing protocol for wireless body area networks. 26 - Neetesh Kumar Nema, Vivek Shukla, Rohit Miri, Praveen Chouksey, Rohit Raja, Kamred Udham Singh, Ankit Kumar

, Mohd Asif Shah:
Sentence type identification-based product review sentiment analysis using BeDi-DC and Log-Squish CNN. 27 - Saulo Ferreira, Júlio Mendonça, Bruno Nogueira, Willy Tiengo, Ermeson C. Andrade:

Correction: Impacts of data consistency levels in cloud-based NoSQL for data-intensive applications. 28 - Danilo Rafael de Lima Cabral, Pedro Antonino, Augusto Cezar Alves Sampaio:

Demystification and near-perfect estimation of minimum gas limit and gas used for Ethereum smart contracts. 29 - Vipin Jain

, Lokesh Malviya, Anjana S:
Optimized hybrid deep learning for cross-linguistic sentiment analysis: a novel approach. 30 - Babar Shahzaad, Alistair Barros, Colin J. Fidge:

Service function tree mapping of microservices on resource-constrained fog networks. 31 - Hafiz Gulfam Ahmad Umar, Iqra Yasmeen, Muhammad Aoun, Tehseen Mazhar, Muhammad Amir Khan, Inès Hilali-Jaghdam, Habib Hamam:

Energy-efficient deep learning-based intrusion detection system for edge computing: a novel DNN-KDQ model. 32 - Nasser S. Albalawi

:
Dynamic scheduling strategies for cloud-based load balancing in parallel and distributed systems. 33 - Joonseok Park, Sumin Jeong, Keunhyuk Yeom:

Private cloud bespoke orchestrator: techniques for constructing and operating bespoke-private cloud virtual machine environments for cloud users. 34 - Umesh Kumar Lilhore, Sarita Simaiya, Roobaea Alroobaea

, Abdullah M. Baqasah, Majed Alsafyani, Afnan Alhazmi, M. D. Monish Khan:
SmartTrust: a hybrid deep learning framework for real-time threat detection in cloud environments using Zero-Trust Architecture. 35 - Cong Liu, Wenjuan Liu, Na Guo, Rongjia Song, Yan Gu, Long Cheng, Qingtian Zeng:

Comparative evaluation of encoding techniques for workflow process remaining time prediction for cloud applications. 36 - Fanlong Zhang, Huanming Chen, Quan Chen, Jianqi Liu

:
Cloud software code generation via knowledge graphs and multi-modal learning. 37 - Seyed Salar Sefati, Bahman Arasteh, Octavian Fratu, Simona Halunga:

SSLA: a semi-supervised framework for real-time injection detection and anomaly monitoring in cloud-based web applications with real-world implementation and evaluation. 38 - Yazeed Yasin Ghadi, Syed Faisal Abbas Shah, Wajahat Waheed, Tehseen Mazhar, Wasim Ahmad

, Mamoon M. Saeed
, Habib Hamam:
Integration of wearable technology and artificial intelligence in digital health for remote patient care. 39 - Huangyining Gao, Ruyue Xin, Peng Chen

, Xi Li, Ning Lu, Peng You:
Memory-augment graph transformer based unsupervised detection model for identifying performance anomalies in highly-dynamic cloud environments. 40 - Yu-Fang Chen, Frank Yeong-Sung Lin, Kuang-Yen Tai, Chiu-Han Hsiao, Wei-Hsin Wang, Ming-Chi Tsai, Tzu-Lung Sun:

A near-optimal resource allocation strategy for minimizing the worse-case impact of malicious attacks on cloud networks. 41 - Raúl Miñón, Josu Díaz-de-Arcaya, Ana I. Torre-Bastida, Juan López-de-Armentia, Gorka Zárate, Lander Bonilla, Asier Garcia-Perez

, Jon Aguirre-Usandizaga:
ArtifactOps and ArtifactDL: a methodology and a language for conceptualizing and operationalising different types of pipelines. 42 - Abdullah Ayub Khan, Asif Ali Laghari, Hamad Almansour, Leila Jamel, Fahima Hajjej, Vania Vieira Estrela, Mohamad Afendee Mohamed, Sajid Ullah:

Quantum computing empowering blockchain technology with post quantum resistant cryptography for multimedia data privacy preservation in cloud-enabled public auditing platforms. 43 - Nithin Melala Eshwarappa

, Hojjat Baghban, Ching-Hsien Hsu, Po-Yen Hsu, Ren-Hung Hwang, Mu-Yen Chen:
Communication-efficient and privacy-preserving federated learning for medical image classification in multi-institutional edge computing. 44 - Guoxiu Zhang, Xinyi He, Xiaofeng Wang:

PCL-RC: a parallel cloud resource load prediction model based on feature optimization. 45 - Yang Zhang, Ling Yang, Yan Tan:

Energy-efficient adaptive routing in heterogeneous wireless sensor networks via hybrid PSO and dynamic clustering. 46 - Hatoon S. AlSagri

, Ankit Kumar, Abdul Khader Jilani Saudagar, Abhishek Kumar, Linesh Raja:
Optimizing resource allocation in precision farming using quantum enhanced algorithms and quantum sensor networks. 47 - Ahmed M. Alwakeel:

Adaptive edge-fog healthcare networks: a novel framework for emergency response management. 48 - Alaa O. Khadidos, Hariprasath Manoharan, Shitharth Selvarajan, Adil Omar Khadidos, Achyut Shankar, Gwanggil Jeon, Wattana Viriyasitavat:

Secured transmission approach for transportation units with twin creations and artificial intelligence algorithm. 49 - Xiaomo Yu, Mingjun Zhu, Menghan Zhu, Xiaomeng Zhou, Long Long:

A novel Location-Aware job scheduling framework for optimizing Fog-Cloud IoT systems: insights from dynamic traffic management. 50 - Shallu Duggal, Parminder Kaur, Mukesh Kumar, Vivek Bhardwaj:

IoT-enabled fog computing framework: heat stroke risk analysis. 51 - Mohsen Ghorbian, Mostafa Ghobaei-Arani, Leila Esmaeili:

An energy-conscious scheduling framework for serverless edge computing in IoT. 52 - Navjeet Kaur, Ayush Mittal, Anuj Jain, Umesh Kumar Lilhore, Sultan Mesfer Aldossary, Sarita Simaiya, Ehab Seif Ghith, Abdullah Baihan, Hanaa A. Abdallah, M. D. Monish Khan:

Blockchain-enhanced security and bayesian trust assessment for secure task scheduling in latency-critical fog computing environments. 53 - Umesh Kumar Lilhore, Scaria Alex, Vince Paul, Rahoof Puthan Purayil, Sultan Mesfer Aldossary, Sarita Simaiya, Ehab Seif Ghith, Heba G. Mohamed, M. D. Monish Khan:

QHRMOF: A Quantum-Inspired hybrid Multi-Objective framework for Energy-Efficient task scheduling and load balancing in cloud computing. 54 - Gavini Sreelatha, Tan Kuan Tak, Rajkumar Kalimuthu, Pravin R. Kshirsagar, Balajee Maram, T. Venkatakrishnamoorthy:

Detecting hidden communication threats in cloud systems using advanced pattern and threat propagation analysis. 55 - Kirupa Shankar Komathi Maathavan, Santhi Venkatraman

:
Integrating machine learning and encryption for effective data management in blood bank supply chains. 56 - Aun Abbas, Muqaddas Salahuddin, Muhammad Zohaib Khan, Abdullah Ayub Khan, Fahim Uz Zaman, Syed Azeem Inam, Ghadah Aldehim, Tehseen Mazhar, Muhammad Amir Khan:

Machine learning-based hybrid technique to enhance cyber-attack perspective. 57 - Abdullah Ayub Khan, Abdul Khalique Shaikh, Roobaea Alroobaea, Abdullah M. Baqasah, Majed Alsafyani, Hamed Alsufyani, Asif Ali Laghari:

Blockchain-enabled secure Internet of Medical Things (IoMT) architecture for multi-modal data fusion in precision cancer diagnosis and continuous monitoring. 58

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














