Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Articles

Page 1 of 14

  1. Bitcoin exchange security is crucial because of MEC's widespread use. Cryptojacking has compromised MEC app security and bitcoin exchange ecosystem functionality. This paper propose a cutting-edge neural netwo...

    Authors: Uma Rani, Sunil Kumar, Neeraj Dahiya, Kamna Solanki, Shanu Rakesh Kuttan, Sajid Shah, Momina Shaheen and Faizan Ahmad
    Citation: Journal of Cloud Computing 2024 13:63
  2. Traditional machine learning requires collecting data from participants for training, which may lead to malicious acquisition of privacy in participants’ data. Federated learning provides a method to protect p...

    Authors: Huiyong Wang, Qi Wang, Yong Ding, Shijie Tang and Yujue Wang
    Citation: Journal of Cloud Computing 2024 13:62
  3. Deep learning achieves an outstanding success in the edge scene due to the appearance of lightweight neural network. However, a number of works show that these networks are vulnerable for adversarial examples,...

    Authors: Weiwei Miao, Yuanyi Xia, Rui Zhang, Xinjian Zhao, Qianmu Li, Tao Wang and Shunmei Meng
    Citation: Journal of Cloud Computing 2024 13:61
  4. Stratosphere computing platforms (SCPs) benefit from free cooling but face challenges necessitating transmission control protocol (TCP) re-design. The redesign should be considered due to stratospheric gravity...

    Authors: A. A. Periola
    Citation: Journal of Cloud Computing 2024 13:60
  5. Given the prohibited operating zones, losses, and valve point effects in power systems, energy optimization analysis in such systems includes numerous non-convex and non-smooth parameters, such as economic dis...

    Authors: Zhiqing Bai, Caizhong Li, Javad Pourzamani, Xuan Yang and Dejuan Li
    Citation: Journal of Cloud Computing 2024 13:59
  6. With the rapid growth of Internet of Vehicles (IoV) technology, the performance and privacy of IoV terminals (IoVT) have become increasingly important. This paper proposes a federated learning model for IoVT c...

    Authors: Kai Yang, Jiawei Du, Jingchao Liu, Feng Xu, Ye Tang, Ming Liu and Zhibin Li
    Citation: Journal of Cloud Computing 2024 13:57
  7. In the LEO satellite communication system, the resource utilization rate is very low due to the constrained resources on satellites and the non-uniform distribution of traffics. In addition, the rapid movement...

    Authors: Yu Hu, Feipeng Qiu, Fei Zheng and Jilong Zhao
    Citation: Journal of Cloud Computing 2024 13:56
  8. In this study, we present a sophisticated multi-label deep learning framework for the prediction of RNA-RBP (RNA-binding protein) interactions, a critical aspect in understanding RNA functionality modulation a...

    Authors: Huirui Han, Bandeh Ali Talpur, Wei Liu, Limei Wang, Bilal Ahmed, Nadia Sarhan and Emad Mahrous Awwad
    Citation: Journal of Cloud Computing 2024 13:54
  9. Trajectory anomalies serve as early indicators of potential issues and frequently provide valuable insights into event occurrence. Existing methods for detecting abnormal trajectories primarily focus on compar...

    Authors: Guohao Tang, Huaying Zhao and Baohua Yu
    Citation: Journal of Cloud Computing 2024 13:53
  10. In Mobile Edge Computing, the framework of federated learning can enable collaborative learning models across edge nodes, without necessitating the direct exchange of data from edge nodes. It addresses signifi...

    Authors: Momina Shaheen, Muhammad S. Farooq and Tariq Umer
    Citation: Journal of Cloud Computing 2024 13:52
  11. Virtual and augmented reality digital twins are becoming increasingly prevalent in a number of industries, though the production of digital-twin systems applications is still prohibitively expensive for many s...

    Authors: Ben Roullier, Frank McQuade, Ashiq Anjum, Craig Bower and Lu Liu
    Citation: Journal of Cloud Computing 2024 13:51
  12. Cotton, a crucial cash crop in Pakistan, faces persistent threats from diseases, notably the Cotton Leaf Curl Virus (CLCuV). Detecting these diseases accurately and early is vital for effective management. Thi...

    Authors: Rubaina Nazeer, Sajid Ali, Zhihua Hu, Ghulam Jillani Ansari, Muna Al-Razgan, Emad Mahrous Awwad and Yazeed Yasin Ghadi
    Citation: Journal of Cloud Computing 2024 13:50
  13. Anomaly detection in Wireless Sensor Networks (WSNs) is critical for their reliable and secure operation. Optimizing resource efficiency is crucial for reducing energy consumption. Two new algorithms developed...

    Authors: S. Gayathri and D. Surendran
    Citation: Journal of Cloud Computing 2024 13:49
  14. The integration of edge intelligence (EI) in animation design, particularly when dealing with large models, represents a significant advancement in the field of computer graphics and animation. This survey aim...

    Authors: Jing Zhu, Chuanjiang Hu, Edris Khezri and Mohd Mustafa Mohd Ghazali
    Citation: Journal of Cloud Computing 2024 13:48
  15. Automatic target tracking in emerging remote sensing video-generating tools based on microwave imaging technology and radars has been investigated in this paper. A moving target tracking system is proposed to ...

    Authors: Meiyan Li, Qinyong Wang and Yuwei Liao
    Citation: Journal of Cloud Computing 2024 13:47
  16. Cloud computing provides outsourcing of computing services at a lower cost, making it a popular choice for many businesses. In recent years, cloud data storage has gained significant success, thanks to its adv...

    Authors: Paromita Goswami, Neetu Faujdar, Somen Debnath, Ajoy Kumar Khan and Ghanshyam Singh
    Citation: Journal of Cloud Computing 2024 13:45
  17. With the rapid development of the Internet of Medical Things (IoMT) and the increasing concern for personal health, sharing Electronic Medical Record (EMR) data is widely recognized as a crucial method for enh...

    Authors: Guijiang Liu, Haibo Xie, Wenming Wang and Haiping Huang
    Citation: Journal of Cloud Computing 2024 13:44
  18. The Smart Grid (SG) heavily depends on the Advanced Metering Infrastructure (AMI) technology, which has shown its vulnerability to intrusions. To effectively monitor and raise alarms in response to anomalous a...

    Authors: Noshina Tariq, Amjad Alsirhani, Mamoona Humayun, Faeiz Alserhani and Momina Shaheen
    Citation: Journal of Cloud Computing 2024 13:43
  19. Cloud computing is a new paradigm in this new cyber era. Nowadays, most organizations are showing more reliability in this environment. The increasing reliability of the Cloud also makes it vulnerable. As vuln...

    Authors: Mohammad Zunnun Khan, Mohd Shoaib, Mohd Shahid Husain, Khair Ul Nisa and Mohammad. Tabrez Quasim
    Citation: Journal of Cloud Computing 2024 13:42
  20. Optimizing resource allocation and routing to satisfy service needs is paramount in large-scale networks. Software-defined networking (SDN) is a new network paradigm that decouples forwarding and control, enab...

    Authors: Junyan Chen, Wei Xiao, Hongmei Zhang, Jiacheng Zuo and Xinmei Li
    Citation: Journal of Cloud Computing 2024 13:41
  21. The detection of different types of concept drift has wide applications in the fields of cloud computing and security information detection. Concept drift detection can indeed assist in promptly identifying in...

    Authors: Jing Chen, Shengyi Yang, Ting Gao, Yue Ying, Tian Li and Peng Li
    Citation: Journal of Cloud Computing 2024 13:40
  22. Mobile edge computing (MEC) has revolutionized the way of teaching in universities. It enables more interactive and immersive experiences in the classroom, enhancing student engagement and learning outcomes. A...

    Authors: Huiling Zhang, Huatao Wu, Zhengde Li, Wenwen Gong and Yan Yan
    Citation: Journal of Cloud Computing 2024 13:38
  23. Blockchain technologies (BCT) are utilized in healthcare to facilitate a smart and secure transmission of patient data. BCT solutions, however, are unable to store data produced by IoT devices in smart healthc...

    Authors: Mamoona Humayun, Amjad Alsirhani, Faeiz Alserhani, Momina Shaheen and Ghadah Alwakid
    Citation: Journal of Cloud Computing 2024 13:37
  24. The Internet of Things (IoT) devices are not able to execute resource-intensive tasks due to their limited storage and computing power. Therefore, Mobile edge computing (MEC) technology has recently been utili...

    Authors: Mohamed Abdel-Basset, Reda Mohamed, Ibrahim M. Hezam, Karam M. Sallam, Abdelaziz Foul and Ibrahim A. Hameed
    Citation: Journal of Cloud Computing 2024 13:35
  25. With the exponential growth of various data interactions on network systems, network intrusions are also increasing. The emergence of edge computing technology brings a new solution to network security. Howeve...

    Authors: Yue Yang, Jieren Cheng, Zhaowu Liu, Huimin Li and Ganglou Xu
    Citation: Journal of Cloud Computing 2024 13:31
  26. Owing to the emergence and rapid advances of new-generation information and digitalization technologies, the concept of model-driven digital twin has received widespread attentions and is developing vigorously...

    Authors: Jiaxing Guo, Dongliang Zhao, Chunxiang Gu, Xi Chen, Xieli Zhang and Mengcheng Ju
    Citation: Journal of Cloud Computing 2024 13:28
  27. Mangroves are ecosystems that grow in the intertidal areas of coastal zones, playing crucial ecological roles and possessing unique economic and social values. They have garnered significant attention and rese...

    Authors: Lixiang Fu, Jinbiao Chen, Zhuoying Wang, Tao Zang, Huandong Chen, Shulei Wu and Yuchen Zhao
    Citation: Journal of Cloud Computing 2024 13:27
  28. Software-Defined Networking (SDN) has emerged as an innovative networking method that offers effective management and remarkable flexibility. However, current SDN-based solutions primarily focus on static netw...

    Authors: Gan Huang, Ihsan Ullah, Hanyao Huang and Kyung Tae Kim
    Citation: Journal of Cloud Computing 2024 13:26
  29. The substantial computational demands associated with Deep Neural Network (DNN)-based camera relocalization during the reasoning process impede their integration into autonomous vehicles. Cost and energy effic...

    Authors: Dengbo Li, Hanning Zhang, Jieren Cheng and Bernie Liu
    Citation: Journal of Cloud Computing 2024 13:25
  30. The emergence of mobile edge computing (MEC) has brought cloud services to nearby edge servers facilitating penetration of real-time and resource-consuming applications from smart mobile devices at a high rate...

    Authors: Nawmi Nujhat, Fahmida Haque Shanta, Sujan Sarker, Palash Roy, Md. Abdur Razzaque, Md. Mamun-Or-Rashid, Mohammad Mehedi Hassan and Giancarlo Fortino
    Citation: Journal of Cloud Computing 2024 13:23
  31. Web3.0 represents the ongoing evolution of blockchain technology, placing a strong emphasis on establishing a decentralized and user-controlled Internet. Current data delegation solutions for Web3.0 predominan...

    Authors: Hongmin Gao, Pengfei Duan, Xiaofeng Pan, Xiaojing Zhang, Keke Ye and Ziyuan Zhong
    Citation: Journal of Cloud Computing 2024 13:21
  32. In this study, we present the EEG-GCN, a novel hybrid model for the prediction of time series data, adept at addressing the inherent challenges posed by the data's complex, non-linear, and periodic nature, as ...

    Authors: Huimin Han, Harold Neira-Molin, Asad Khan, Meie Fang, Haitham A. Mahmoud, Emad Mahrous Awwad, Bilal Ahmed and Yazeed Yasin Ghadi
    Citation: Journal of Cloud Computing 2024 13:20
  33. The study aims to evaluate and compare the performance of various machine learning (ML) classifiers in the context of detecting cyber-trolling behaviors. With the rising prevalence of online harassment, develo...

    Authors: Huimin Han, Muhammad Asif, Emad Mahrous Awwad, Nadia Sarhan, Yazeed Yasid Ghadi and Bo Xu
    Citation: Journal of Cloud Computing 2024 13:19
  34. The emergence of the Fifth Generation (5G) era has ushered in a new era of diverse business scenarios, primarily characterized by data-intensive and latency-sensitive applications. Edge computing technology in...

    Authors: Shizhan Lan, Zhuoxi Duan, Song Lu, Bin Tan, Shi Chen, Yeyu Liang and Shan Chen
    Citation: Journal of Cloud Computing 2024 13:18
  35. A small object Lentinus Edodes logs contamination detection method (SRW-YOLO) based on improved YOLOv7 in edge-cloud computing environment was proposed to address the problem of the difficulty in the detection...

    Authors: Xuefei Chen, Shouxin Sun, Chao Chen, Xinlong Song, Qiulan Wu and Feng Zhang
    Citation: Journal of Cloud Computing 2024 13:14

Annual Journal Metrics

  • 2022 Citation Impact
    4.0 - 2-year Impact Factor
    4.4 - 5-year Impact Factor
    1.711 - SNIP (Source Normalized Impact per Paper)
    0.976 - SJR (SCImago Journal Rank)

    2023 Speed
    10 days submission to first editorial decision for all manuscripts (Median)
    116 days submission to accept (Median)

    2023 Usage 
    733,672 downloads
    49 Altmetric mentions 

Benefit from our free funding service

New Content Item

We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. 

Learn more here

.