Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image


Page 3 of 8

  1. At present, some existing tag anti-collision algorithms are used mostly in scenarios of fixed number of tags and they perform poorly in tag moving scenarios. Therefore, this paper proposes a double reader tag ...

    Authors: Haochen Lv, Xiaowu Li, Lianyin Jia, Runxin Li, Jiaman Ding and Jinguo You
    Citation: Journal of Cloud Computing 2021 10:12
  2. Intelligent transportation brings huge benefits to humans’ life and Industrial production in terms of vehicle control and traffic management. Now, the development of edge-cloud computing has once again promote...

    Authors: Bin Xie, Kun Zhang, Yi Zhao, Yunchun Zhang, Ying Cai and Tian Wang
    Citation: Journal of Cloud Computing 2021 10:10
  3. The performance levels of a computing machine running a given workload configuration are crucial for both users and providers of computing resources. Knowing how well a computing machine is running with a give...

    Authors: Lorenzo Luciano, Imre Kiss, Peter William Beardshear, Esther Kadosh and A. Ben Hamza
    Citation: Journal of Cloud Computing 2021 10:8
  4. Workload models are typically built based on user and application behavior in a system, limiting them to specific domains. Undoubtedly, such a practice creates a dilemma in a cloud computing (cloud) environmen...

    Authors: Cédric St-Onge, Souhila Benmakrelouf, Nadjia Kara, Hanine Tout, Claes Edstrom and Rafi Rabipour
    Citation: Journal of Cloud Computing 2021 10:6
  5. With the rapid development of hospital informatization and Internet medical service in recent years, most hospitals have launched online hospital appointment registration systems to remove patient queues and i...

    Authors: Junshu Wang, Guoming Zhang, Wei Wang, Ka Zhang and Yehua Sheng
    Citation: Journal of Cloud Computing 2021 10:4
  6. Cloud storage with sharing services is increasingly popular among data owners. However, it is difficult for the users to know if the cloud server providers (CSPs) indeed protect their data. To verify data inte...

    Authors: Yange Chen, Hequn Liu, Baocang Wang, Baljinnyam Sonompil, Yuan Ping and Zhili Zhang
    Citation: Journal of Cloud Computing 2021 10:3
  7. In cloud computing, there is a trade-off between SLAV (Service Level Agreement Violation) and system operating cost. Violation rates can be decreased when using more hosts, which increases system operating cos...

    Authors: Moon-Hyun Kim, Jun-Yeong Lee, Syed Asif Raza Shah, Tae-Hyung Kim and Seo-Young Noh
    Citation: Journal of Cloud Computing 2021 10:2
  8. With the continued appeal and adoption of cloud computing, an assessment of cloud run costs and migration affordability prior to adoption would assist enterprises that have several legacy applications targeted...

    Authors: Kent Ramchand, Mohan Baruwal Chhetri and Ryszard Kowalczyk
    Citation: Journal of Cloud Computing 2021 10:1
  9. With the rapid development of mobile edge computing, mobile social networks are gradually infiltrating into our daily lives, in which the communities are an important part of social networks. Internet of Peopl...

    Authors: Liang Jiang, Lu Liu, Jingjing Yao and Leilei Shi
    Citation: Journal of Cloud Computing 2020 9:69
  10. Classical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed stega...

    Authors: Leonel Moyou Metcheka and René Ndoundam
    Citation: Journal of Cloud Computing 2020 9:68
  11. Currently, rapidly developing digital technological innovations affect and change the integrated information management processes of all sectors. The high efficiency of these innovations has inevitably pushed ...

    Authors: Banu Çalış Uslu, Ertuğ Okay and Erkan Dursun
    Citation: Journal of Cloud Computing 2020 9:67
  12. In the Internet of Things (IoT) era, the capacity-limited Internet and uncontrollable service delays for various new applications, such as video streaming analysis and augmented reality, are challenges. Cloud ...

    Authors: VanDung Nguyen, Tran Trong Khanh, Tri D. T. Nguyen, Choong Seon Hong and Eui-Nam Huh
    Citation: Journal of Cloud Computing 2020 9:66
  13. In the past few years, significant progress has been made on spatio-temporal cyber-physical systems in achieving spatio-temporal properties on several long-standing tasks. With the broader specification of spa...

    Authors: Tengfei Li, Jing Liu, Haiying Sun, Xiang Chen, Lipeng Zhang and Junfeng Sun
    Citation: Journal of Cloud Computing 2020 9:65
  14. The growth of the Internet of things (IoT) has ushered in a new area of inter-connectivity and innovation in the home. Many devices, once separate, can now be interacted with remotely, improving efficiency and...

    Authors: Robin Gassais, Naser Ezzati-Jivan, Jose M. Fernandez, Daniel Aloise and Michel R. Dagenais
    Citation: Journal of Cloud Computing 2020 9:62
  15. Data redundancy is a significant issue that wastes plenty of storage space in the cloud-fog storage integrated environments. Most of the current techniques, which mainly center around the static scenes, for ex...

    Authors: Shynu P. G., Nadesh R. K., Varun G. Menon, Venu P., Mahdi Abbasi and Mohammad R. Khosravi
    Citation: Journal of Cloud Computing 2020 9:61
  16. Edge computing equipment is a new tool that has been widely used to monitor the operation state of industrial equipment and to diagnose and analyze faults. Therefore, the fault diagnosis algorithm used in the ...

    Authors: Xiaoping Zhao, Kaiyang Lv, Zhongyang Zhang, Yonghong Zhang and Yifei Wang
    Citation: Journal of Cloud Computing 2020 9:58
  17. The recommendation system is an effective means to solve the information overload problem that exists in social networks, which is also one of the most common applications of big data technology. Thus, the mat...

    Authors: Liang Jiang, Lu Liu, Jingjing Yao and Leilei Shi
    Citation: Journal of Cloud Computing 2020 9:57
  18. The video request service of users in 5G network will explode, and adaptive bit rate technology can provide users with reliable video response. Placing video resources on edge servers close to users can overco...

    Authors: Zhi Liu, Bo Qiao and Kui Fang
    Citation: Journal of Cloud Computing 2020 9:56
  19. The rapid development of vehicular ad hoc networks (VANETs) has brought significant improvement to traffic safety and efficiency. However, owing to limitations associated with VANETs’ own unchanging model and ...

    Authors: Hong Zhong, Yingxue Geng, Jie Cui, Yan Xu and Lu Liu
    Citation: Journal of Cloud Computing 2020 9:54
  20. As edge computing paradigm achieves great popularity in recent years, there remain some technical challenges that must be addressed to guarantee smart device security in Internet of Things (IoT) environment. G...

    Authors: Jiankun Sun, Xiong Luo, Honghao Gao, Weiping Wang, Yang Gao and Xi Yang
    Citation: Journal of Cloud Computing 2020 9:53
  21. This paper proposes a collaborative scheduling strategy for computing resources of the Internet of vehicles considering location privacy protection in the mobile edge computing environment. Firstly, a multi ar...

    Authors: Meiyu Pang, Li Wang and Ningsheng Fang
    Citation: Journal of Cloud Computing 2020 9:52
  22. Real-time data streaming fetches live sensory segments of the dataset in the heterogeneous distributed computing environment. This process assembles data chunks at a rapid encapsulation rate through a streamin...

    Authors: Jahwan Koo, Nawab Muhammad Faseeh Qureshi, Isma Farah Siddiqui, Asad Abbas and Ali Kashif Bashir
    Citation: Journal of Cloud Computing 2020 9:50
  23. The number of both service providers operating in the cloud market and customers consuming cloud-based services is constantly increasing, proving that the cloud computing paradigm has successfully delivered it...

    Authors: Orazio Tomarchio, Domenico Calcaterra and Giuseppe Di Modica
    Citation: Journal of Cloud Computing 2020 9:49
  24. Cloud repository is one of the most important services afforded by Cloud Computing where information is preserved, maintained, archived in distant servers and made available to the users over the Internet. Pro...

    Authors: Geeta C. Mara, Usharani Rathod, Shreyas Raju R. G., Raghavendra S., Rajkumar Buyya, Venugopal K. R., S. S. Iyengar and L. M. Patnaik
    Citation: Journal of Cloud Computing 2020 9:47
  25. Data management systems commonly use bitmap indices to increase the efficiency of querying scientific data. Bitmaps are usually highly compressible and can be queried directly using fast hardware-supported bit...

    Authors: Mitchell Nelson, Zachary Sorenson, Joseph M. Myre, Jason Sawin and David Chiu
    Citation: Journal of Cloud Computing 2020 9:44
  26. With the development of cloud computing, edge computing has been proposed to provide real-time and low-delay services to users. Current research usually integrates cloud computing and edge computing as cloud-e...

    Authors: Chen Ling, Weizhe Zhang, Hui He and Yu-chu Tian
    Citation: Journal of Cloud Computing 2020 9:43
  27. Cloud computing is a model for on-demand delivery of IT resources (e.g., servers, storage, databases, etc.) over the Internet with pay-as-you-go pricing. Although it provides numerous benefits to cloud service...

    Authors: Syed Rizvi, John Mitchell, Abdul Razaque, Mohammad R. Rizvi and Iyonna Williams
    Citation: Journal of Cloud Computing 2020 9:42
  28. Because of their portability, electric motorcycles are usually pushed into elevators by residents and charged in the home, which has serious safety risks. Traditional manual-based methods to manage this behavi...

    Authors: Zongwei Zhu, Jing Cao, Tiancheng Hao, Wenjie Zhai, Bin Sun, Gangyong Jia and Ming Li
    Citation: Journal of Cloud Computing 2020 9:41
  29. The two-phase commit (2PC) protocol is a key technique for achieving distributed transactions in storage systems such as relational databases and distributed databases. 2PC is a strongly consistent and central...

    Authors: Pan Fan, Jing Liu, Wei Yin, Hui Wang, Xiaohong Chen and Haiying Sun
    Citation: Journal of Cloud Computing 2020 9:40
  30. Video streaming is critical in IoT systems, enabling a variety of applications such as traffic monitoring and health caring. Traditional adaptive bitrate streaming (ABR) algorithms mainly focus on improving In...

    Authors: Zeng Zeng, Hang Che, Weiwei Miao, Jin Huang, Hao Tang, Mingxuan Zhang and Shaqian Zhang
    Citation: Journal of Cloud Computing 2020 9:38
  31. Blockchain-based cloud application (BCP) is an emerging cloud application architecture. By moving trust-critical functions onto blockchain, BCP offers unprecedented function transparency and data integrity. Et...

    Authors: Chao Liu, Jianbo Gao, Yue Li, Huihui Wang and Zhong Chen
    Citation: Journal of Cloud Computing 2020 9:35

Annual Journal Metrics

Benefit from our free funding service

New Content Item

We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. 

Learn more here