Skip to main content

Advances, Systems and Applications

Journal of Cloud Computing Cover Image


Page 7 of 12

  1. In cloud service delivery, the cloud user is concerned about “what” function and performance the cloud service could provide, while the cloud provider is concerned about “how” to design proper underlying cloud...

    Authors: Chao Wu, Shingo Horiuchi, Kenji Murase, Hiroaki Kikushima and Kenichi Tayama
    Citation: Journal of Cloud Computing 2021 10:30
  2. This paper examines possibilities for improving the existing strategies of consistency management for highly-distributed transactional database in a hybrid cloud environment. With a detailed analysis of the ex...

    Authors: Jasmina Dizdarevic, Zikrija Avdagic, Fahrudin Orucevic and Samir Omanovic
    Citation: Journal of Cloud Computing 2021 10:27
  3. Cloud providers shares their resources and services through collaboration in order to increase resource utilization, profit and quality of services. The offered services with different access patterns, similar...

    Authors: Sameer Singh Chauhan, Emmanuel S. Pilli and R. C. Joshi
    Citation: Journal of Cloud Computing 2021 10:26
  4. We present an algorithm and a software architecture for a cloud-based system that executes cyclic scientific workflows whose structure may change during run time. Existing approaches either rely on workflow de...

    Authors: Michel Krämer, Hendrik M. Würz and Christian Altenhofen
    Citation: Journal of Cloud Computing 2021 10:25
  5. Adding buffers to networks is part of the fundamental advance in data communication. Since edge cloud computing is based on the heterogeneous collaboration network model in a federated environment, it is natur...

    Authors: Zheng Li, Francisco Millar-Bilbao, Gonzalo Rojas-Durán and Susana Ladra
    Citation: Journal of Cloud Computing 2021 10:24
  6. Modern applications demand resources at an unprecedented level. In this sense, data-centers are required to scale efficiently to cope with such demand. Resource disaggregation has the potential to improve reso...

    Authors: Marcelo Amaral, Jordà Polo, David Carrera, Nelson Gonzalez, Chih-Chieh Yang, Alessandro Morari, Bruce D’Amora, Alaa Youssef and Malgorzata Steinder
    Citation: Journal of Cloud Computing 2021 10:22
  7. Herein, we present a novel topic variation detection method that combines a topic extraction method and a change-point detection method. It extracts topics from time-series text data as the feature of each tim...

    Authors: Sota Kato, Takafumi Nakanishi, Budrul Ahsan and Hirokazu Shimauchi
    Citation: Journal of Cloud Computing 2021 10:21
  8. Vehicular fog computing (VFC) provisions computing services at the edge of networks by fully exploiting the idle resources of vehicle loaded computer systems. Task scheduling and resource allocation revolved a...

    Authors: Chaogang Tang, Shixiong Xia, Qing Li, Wei Chen and Weidong Fang
    Citation: Journal of Cloud Computing 2021 10:19
  9. Due to the high risk factors in the electric power industry, the safety of power system can be improved by using the surveillance system to predict and warn the operators’ nonstandard and unsafe actions in rea...

    Authors: Yanfang Yin, Jinjiao Lin, Nongliang Sun, Qigang Zhu, Shuaishuai Zhang, Yanjie Zhang and Ming Liu
    Citation: Journal of Cloud Computing 2021 10:17
  10. Containerisation demonstrates its efficiency in application deployment in Cloud Computing. Containers can encapsulate complex programs with their dependencies in isolated environments making applications more ...

    Authors: Naweiluo Zhou, Yiannis Georgiou, Marcin Pospieszny, Li Zhong, Huan Zhou, Christoph Niethammer, Branislav Pejak, Oskar Marko and Dennis Hoppe
    Citation: Journal of Cloud Computing 2021 10:16
  11. With the combination of Mobile Edge Computing (MEC) and the next generation cellular networks, computation requests from end devices can be offloaded promptly and accurately by edge servers equipped on Base St...

    Authors: Zhuofan Liao, Jingsheng Peng, Bing Xiong and Jiawei Huang
    Citation: Journal of Cloud Computing 2021 10:15
  12. At present, some existing tag anti-collision algorithms are used mostly in scenarios of fixed number of tags and they perform poorly in tag moving scenarios. Therefore, this paper proposes a double reader tag ...

    Authors: Haochen Lv, Xiaowu Li, Lianyin Jia, Runxin Li, Jiaman Ding and Jinguo You
    Citation: Journal of Cloud Computing 2021 10:12
  13. Intelligent transportation brings huge benefits to humans’ life and Industrial production in terms of vehicle control and traffic management. Now, the development of edge-cloud computing has once again promote...

    Authors: Bin Xie, Kun Zhang, Yi Zhao, Yunchun Zhang, Ying Cai and Tian Wang
    Citation: Journal of Cloud Computing 2021 10:10
  14. The performance levels of a computing machine running a given workload configuration are crucial for both users and providers of computing resources. Knowing how well a computing machine is running with a give...

    Authors: Lorenzo Luciano, Imre Kiss, Peter William Beardshear, Esther Kadosh and A. Ben Hamza
    Citation: Journal of Cloud Computing 2021 10:8
  15. Workload models are typically built based on user and application behavior in a system, limiting them to specific domains. Undoubtedly, such a practice creates a dilemma in a cloud computing (cloud) environmen...

    Authors: Cédric St-Onge, Souhila Benmakrelouf, Nadjia Kara, Hanine Tout, Claes Edstrom and Rafi Rabipour
    Citation: Journal of Cloud Computing 2021 10:6
  16. With the rapid development of hospital informatization and Internet medical service in recent years, most hospitals have launched online hospital appointment registration systems to remove patient queues and i...

    Authors: Junshu Wang, Guoming Zhang, Wei Wang, Ka Zhang and Yehua Sheng
    Citation: Journal of Cloud Computing 2021 10:4
  17. Cloud storage with sharing services is increasingly popular among data owners. However, it is difficult for the users to know if the cloud server providers (CSPs) indeed protect their data. To verify data inte...

    Authors: Yange Chen, Hequn Liu, Baocang Wang, Baljinnyam Sonompil, Yuan Ping and Zhili Zhang
    Citation: Journal of Cloud Computing 2021 10:3
  18. In cloud computing, there is a trade-off between SLAV (Service Level Agreement Violation) and system operating cost. Violation rates can be decreased when using more hosts, which increases system operating cos...

    Authors: Moon-Hyun Kim, Jun-Yeong Lee, Syed Asif Raza Shah, Tae-Hyung Kim and Seo-Young Noh
    Citation: Journal of Cloud Computing 2021 10:2
  19. With the continued appeal and adoption of cloud computing, an assessment of cloud run costs and migration affordability prior to adoption would assist enterprises that have several legacy applications targeted...

    Authors: Kent Ramchand, Mohan Baruwal Chhetri and Ryszard Kowalczyk
    Citation: Journal of Cloud Computing 2021 10:1
  20. With the rapid development of mobile edge computing, mobile social networks are gradually infiltrating into our daily lives, in which the communities are an important part of social networks. Internet of Peopl...

    Authors: Liang Jiang, Lu Liu, Jingjing Yao and Leilei Shi
    Citation: Journal of Cloud Computing 2020 9:69
  21. Classical or traditional steganography aims at hiding a secret in cover media such as text, image, audio, video or even in network protocols. Recent research has improved this approach called distributed stega...

    Authors: Leonel Moyou Metcheka and René Ndoundam
    Citation: Journal of Cloud Computing 2020 9:68
  22. Currently, rapidly developing digital technological innovations affect and change the integrated information management processes of all sectors. The high efficiency of these innovations has inevitably pushed ...

    Authors: Banu Çalış Uslu, Ertuğ Okay and Erkan Dursun
    Citation: Journal of Cloud Computing 2020 9:67
  23. In the Internet of Things (IoT) era, the capacity-limited Internet and uncontrollable service delays for various new applications, such as video streaming analysis and augmented reality, are challenges. Cloud ...

    Authors: VanDung Nguyen, Tran Trong Khanh, Tri D. T. Nguyen, Choong Seon Hong and Eui-Nam Huh
    Citation: Journal of Cloud Computing 2020 9:66
  24. In the past few years, significant progress has been made on spatio-temporal cyber-physical systems in achieving spatio-temporal properties on several long-standing tasks. With the broader specification of spa...

    Authors: Tengfei Li, Jing Liu, Haiying Sun, Xiang Chen, Lipeng Zhang and Junfeng Sun
    Citation: Journal of Cloud Computing 2020 9:65
  25. The growth of the Internet of things (IoT) has ushered in a new area of inter-connectivity and innovation in the home. Many devices, once separate, can now be interacted with remotely, improving efficiency and...

    Authors: Robin Gassais, Naser Ezzati-Jivan, Jose M. Fernandez, Daniel Aloise and Michel R. Dagenais
    Citation: Journal of Cloud Computing 2020 9:62
  26. Data redundancy is a significant issue that wastes plenty of storage space in the cloud-fog storage integrated environments. Most of the current techniques, which mainly center around the static scenes, for ex...

    Authors: Shynu P. G., Nadesh R. K., Varun G. Menon, Venu P., Mahdi Abbasi and Mohammad R. Khosravi
    Citation: Journal of Cloud Computing 2020 9:61
  27. Edge computing equipment is a new tool that has been widely used to monitor the operation state of industrial equipment and to diagnose and analyze faults. Therefore, the fault diagnosis algorithm used in the ...

    Authors: Xiaoping Zhao, Kaiyang Lv, Zhongyang Zhang, Yonghong Zhang and Yifei Wang
    Citation: Journal of Cloud Computing 2020 9:58
  28. The recommendation system is an effective means to solve the information overload problem that exists in social networks, which is also one of the most common applications of big data technology. Thus, the mat...

    Authors: Liang Jiang, Lu Liu, Jingjing Yao and Leilei Shi
    Citation: Journal of Cloud Computing 2020 9:57
  29. The video request service of users in 5G network will explode, and adaptive bit rate technology can provide users with reliable video response. Placing video resources on edge servers close to users can overco...

    Authors: Zhi Liu, Bo Qiao and Kui Fang
    Citation: Journal of Cloud Computing 2020 9:56
  30. The rapid development of vehicular ad hoc networks (VANETs) has brought significant improvement to traffic safety and efficiency. However, owing to limitations associated with VANETs’ own unchanging model and ...

    Authors: Hong Zhong, Yingxue Geng, Jie Cui, Yan Xu and Lu Liu
    Citation: Journal of Cloud Computing 2020 9:54
  31. As edge computing paradigm achieves great popularity in recent years, there remain some technical challenges that must be addressed to guarantee smart device security in Internet of Things (IoT) environment. G...

    Authors: Jiankun Sun, Xiong Luo, Honghao Gao, Weiping Wang, Yang Gao and Xi Yang
    Citation: Journal of Cloud Computing 2020 9:53
  32. This paper proposes a collaborative scheduling strategy for computing resources of the Internet of vehicles considering location privacy protection in the mobile edge computing environment. Firstly, a multi ar...

    Authors: Meiyu Pang, Li Wang and Ningsheng Fang
    Citation: Journal of Cloud Computing 2020 9:52

Annual Journal Metrics

  • 2022 Citation Impact
    4.0 - 2-year Impact Factor
    4.4 - 5-year Impact Factor
    1.711 - SNIP (Source Normalized Impact per Paper)
    0.976 - SJR (SCImago Journal Rank)

    2022 Speed
    12 days submission to first editorial decision for all manuscripts (Median)
    86 days submission to accept (Median)

    2022 Usage 
    124 Altmetric mentions 

Benefit from our free funding service

New Content Item

We offer a free open access support service to make it easier for you to discover and apply for article-processing charge (APC) funding. 

Learn more here