Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image

Articles

Page 5 of 14

  1. The rise of 5G technology has driven the development of edge computing. Computation offloading is the key and challenging point in edge computing, which investigates offloading resource-intensive computing tas...

    Authors: Qinghang Gao, Jianmao Xiao, Yuanlong Cao, Shuiguang Deng, Chuying Ouyang and Zhiyong Feng
    Citation: Journal of Cloud Computing 2023 12:72
  2. Public sports service is an important component of the modern government construction service system. They play an important role in strengthening the national physique, improving people’s satisfaction with pu...

    Authors: Yangyang Hao, Zhaoyi Qiu, Qiner Xu, Qiuhong He, Xuemo Fang and Chuyun Wang
    Citation: Journal of Cloud Computing 2023 12:69
  3. Cloud Mobile Ad-hoc Networks (Cloud-MANETs) is a framework that can access and deliver cloud services to MANET users through their smart devices. MANETs is a pool of self-organized mobile gadgets that can comm...

    Authors: Tao Hai, Jincheng Zhou, Ye Lu, Dayang Jawawi, Dan Wang, Edeh Michael Onyema and Cresantus Biamba
    Citation: Journal of Cloud Computing 2023 12:68
  4. A major challenge in Cloud-Fog settings is the scheduling of workflow applications with time constraints as the environment is highly volatile and dynamic. Furthermore, adding the complexities of handling IoT ...

    Authors: Masoumeh Hajvali, Sahar Adabi, Ali Rezaee and Mehdi Hosseinzadeh
    Citation: Journal of Cloud Computing 2023 12:66
  5. Containers as a service (CaaS) are a kind of services that permits the organization to handle the containers more effectively. Containers are lightweight, require less computing resources, portable, and facili...

    Authors: Manoj Kumar Patra, Bibhudatta Sahoo, Ashok Kumar Turuk and Sanjay Misra
    Citation: Journal of Cloud Computing 2023 12:65
  6. Currently, cloud computing provides users all over the globe with Information and Communication Technology facilities that are utility-oriented. This technology is trying to drive the development of data cente...

    Authors: Yu Zhang and Haoyun Dong
    Citation: Journal of Cloud Computing 2023 12:64
  7. With the introduction of emerging technologies such as cloud computing, the railway communication network has the characteristics of complex structure and blurred boundaries, which leads to a series of securit...

    Authors: Yuan Feng, Zhangdui Zhong, Xiaofang Sun, Lei Wang, Yunlong Lu and Yongsheng Zhu
    Citation: Journal of Cloud Computing 2023 12:62
  8. With the rapid development of cloud computing technology, how to achieve secure access to cloud data has become a current research hotspot. Attribute-based encryption technology provides the feasibility to ach...

    Authors: Liang Yan, Lina Ge, Zhe Wang, Guifen Zhang, Jingya Xu and Zheng Hu
    Citation: Journal of Cloud Computing 2023 12:61
  9. Containers are light, numerous, and interdependent, which are prone to cascading fault, increasing the probability of fault and the difficulty of detection. Existing detection methods are usually based on a ca...

    Authors: Ningjiang Chen, Qingwei Zhong, Yifei Liu, Weitao Liu, Lin Bai and Liangqing Hu
    Citation: Journal of Cloud Computing 2023 12:59
  10. Edge-to-cloud continuum connects and extends the calculation from edge side via network to cloud platforms, where diverse workflows go back and forth, getting executed on scheduled calculation resources. To be...

    Authors: Hongyun Liu, Ruyue Xin, Peng Chen, Hui Gao, Paola Grosso and Zhiming Zhao
    Citation: Journal of Cloud Computing 2023 12:58
  11. The combination of federated learning and recommender system aims to solve the privacy problems of recommendation through keeping user data locally at the client device during the model training session. Howev...

    Authors: Jiangcheng Qin, Xueyuan Zhang, Baisong Liu and Jiangbo Qian
    Citation: Journal of Cloud Computing 2023 12:57
  12. By transferring power-hungry huge data centers to lightweight Internet of Things (IoT) mobile devices, mobile edge computing (MEC) has completely changed the IoT. For MEC, to optimize economic gains and motiva...

    Authors: Xiao Zheng, Syed Bilal Hussian Shah, Saeeda Usman, Saoucene Mahfoudh, Fathima Shemim KS and Piyush Kumar Shukla
    Citation: Journal of Cloud Computing 2023 12:56
  13. During the last decades, tourism has been augmented worldwide through which the diversity of tourists’ interests is increased and is challenging to tackle with the traditional management system. Such challenge...

    Authors: Inayat Khan, Anwar Sadad, Gauhar Ali, Mohammed ElAffendi, Razaullah Khan and Tariq Sadad
    Citation: Journal of Cloud Computing 2023 12:54
  14. The rapid advancement of the Internet has brought a exponential growth in network traffic. At present, devices deployed at edge nodes process huge amount of data, extract key features of network traffic and th...

    Authors: Yan Zhou, Huiling Shi, Yanling Zhao, Wei Ding, Jing Han, Hongyang Sun, Xianheng Zhang, Chang Tang and Wei Zhang
    Citation: Journal of Cloud Computing 2023 12:53
  15. Aiming at solving the problems of low success rate and weak robustness of object tracking algorithms based on siamese network in complex scenes with occlusion, deformation, and rotation, a siamese network obje...

    Authors: Jinping Sun and Dan Li
    Citation: Journal of Cloud Computing 2023 12:51

    The Correction to this article has been published in Journal of Cloud Computing 2023 12:78

  16. IoT is one of the fastest-growing technologies and it is estimated that more than a billion devices would be utilised across the globe by the end of 2030. To maximise the capability of these connected entities...

    Authors: Muhammad Aaqib, Aftab Ali, Liming Chen and Omar Nibouche
    Citation: Journal of Cloud Computing 2023 12:42
  17. The Industrial Internet of Things (IIoT) promises to deliver innovative business models across multiple domains by providing ubiquitous connectivity, intelligent data, predictive analytics, and decision-making...

    Authors: Shitharth Selvarajan, Gautam Srivastava, Alaa O. Khadidos, Adil O. Khadidos, Mohamed Baza, Ali Alshehri and Jerry Chun-Wei Lin
    Citation: Journal of Cloud Computing 2023 12:38
  18. Cloud file sharing (CFS) has become one of the important tools for enterprises to reduce technology operating costs and improve their competitiveness. Due to the untrustworthy cloud service provider, access co...

    Authors: Boxue Huang, Juntao Gao and Xuelian Li
    Citation: Journal of Cloud Computing 2023 12:37
  19. Multi-access edge computing (MEC) has unique interests in processing intensive and delay-critical computation tasks for vehicular application through computation offloading. However, due to the spatial inhomog...

    Authors: Duan Xue, Yan Guo, Ning Li, Xiaoxiang Song and Lixiong Zhang
    Citation: Journal of Cloud Computing 2023 12:33
  20. Remote sensing is an important technical tool for rapid detection of illegal mining behavior. Due to the complex features of open-pit coal mines, there are few studies about automatic extraction of open-pit co...

    Authors: Yang Liu and Jin Zhang
    Citation: Journal of Cloud Computing 2023 12:32
  21. With the awakening of health awareness, people are raising a series of health-related requirements for the buildings they live in, with a view to improving their living conditions. In this context, BIM (Buildi...

    Authors: Min Yang, Chengmin Ge, Xiaoran Zhao and Huaizhen Kou
    Citation: Journal of Cloud Computing 2023 12:31
  22. Broadcasting more educating and language-reviving contents are ways radio stations can help revitalize the use of the English language in the Hunan province of China. The challenges faced in communicating in ...

    Authors: Ruihua Zhang, Jincheng Zhou, Tao Hai, Shixue Zhang, Marvellous Iwendi, Mohd Asif Shah and Jude Osamor
    Citation: Journal of Cloud Computing 2023 12:28
  23. Network Intrusion Detection Systems (NIDS) and firewalls are the de facto solutions in the modern cloud to detect cyberattacks and minimize potential hazards for tenant networks. Most of the existing firewalls...

    Authors: Prabhakar Krishnan, Kurunandan Jain, Amjad Aldweesh, P. Prabu and Rajkumar Buyya
    Citation: Journal of Cloud Computing 2023 12:26
  24. In recent ages, the use of deep learning approaches to extract ground object information from remote sensing high-resolution images has attracted extensive attention in many fields. Nevertheless, due to the hi...

    Authors: Jiayuan Kong and Yanjun Zhang
    Citation: Journal of Cloud Computing 2023 12:25
  25. Cloud Computing, the efficiency of task scheduling is proportional to the effectiveness of users. The improved scheduling efficiency algorithm (also known as the improved Wild Horse Optimization, or IWHO) is p...

    Authors: G. Saravanan, S. Neelakandan, P. Ezhumalai and Sudhanshu Maurya
    Citation: Journal of Cloud Computing 2023 12:24

    The Correction to this article has been published in Journal of Cloud Computing 2023 12:55

Annual Journal Metrics

  • 2022 Citation Impact
    4.0 - 2-year Impact Factor
    4.4 - 5-year Impact Factor
    1.711 - SNIP (Source Normalized Impact per Paper)
    0.976 - SJR (SCImago Journal Rank)

    2023 Speed
    10 days submission to first editorial decision for all manuscripts (Median)
    116 days submission to accept (Median)

    2023 Usage 
    733,672 downloads
    49 Altmetric mentions 

Benefit from our free funding service

New Content Item

We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. 

Learn more here

.