


default search action
International Journal of Grid and High Performance Computing, Volume 13
Volume 13, Number 1, 2021
- Shamik Tiwari:

An Ensemble Deep Neural Network Model for Onion-Routed Traffic Detection to Boost Cloud Security. 1-17 - Nithiya Baskaran

, Eswari Rajagopal:
An Efficient Threshold-Fuzzy-Based Algorithm for VM Consolidation in Cloud Datacenter. 18-46 - Bhupesh Kumar Dewangan

, M. Venkatadri, Amit Agarwal
, Ashutosh Pasricha, Tanupriya Choudhury
:
An Automated Self-Healing Cloud Computing Framework for Resource Scheduling. 47-64 - Rahaf Maher Ghazal, Samir Jafar, Mohammad Mounaf Alhamad:

Modeling of Two-Level Checkpointing With Silent and Fail-Stop Errors in Grid Computing Systems. 65-81 - Balaji Prabhu B. V., M. Dakshayini:

Machine Learning-Based Decision Support System for Effective Quality Farming. 82-109
Volume 13, Number 2, 2021
- Amarasimha T., V. Srinivasa Rao:

Efficient Energy Conservation and Faulty Node Detection on Machine Learning-Based Wireless Sensor Networks. 1-20 - P. Sarwesh

, K. Chandrasekaran, Thamizharasan S.:
Network Blueprint for Maximizing the Lifetime of Smart Devices in Low Power IoT Networks. 21-38 - Nabil Kadache

, Rachid Seghir:
A New Social Volunteer Computing Environment With Task-Adapted Scheduling Policy (TASP). 39-55 - Zhifeng Zhang, Junxia Ma

, Xiao Cui:
Genetic Algorithm With Three-Dimensional Population Dominance Strategy for University Course Timetabling Problem. 56-69 - Munish Khanna

, Abhishek Toofani, Siddharth Bansal, Mohammad Asif:
Performance Comparison of Various Algorithms During Software Fault Prediction. 70-94 - Mirvat Mahmoud Al-Qutt, Heba Khaled

, Rania El-Gohary:
Neural Network Inversion-Based Model for Predicting an Optimal Hardware Configuration: Solving Computationally Intensive Problems. 95-117 - Gokulnath Chandra Babu, Shantharajah S. Periyasamy:

Remote Health Patient Monitoring System for Early Detection of Heart Disease. 118-130
Volume 13, Number 3, 2021
- Vaishali Ravindra Thakare

, John Singh K
:
A Study of Computational Trust Models in Cloud Security. 1-11 - Tzung-Han Jeng, Wen-Yang Luo, Chuan-Chiang Huang, Chien-Chih Chen, Kuang-Hung Chang, Yi-Ming Chen:

Cloud Computing for Malicious Encrypted Traffic Analysis and Collaboration. 12-29 - Yu-Sheng Lin, Chi-Lung Wang, Chao-Tang Lee:

Remote Access NVMe SSD via NTB. 30-42 - Che-Nan Yang, Li-Chi Ku, Jiunn-Jye Chen:

A perfSONAR-Based Network Performance Weathermap System. 43-55
Volume 13, Number 4, 2021
- G. M. Siddesh, K. G. Srinivasa

:
IoT Solution for Enhancing the Quality of Life of Visually Impaired People. 1-23 - Srinivasan Palanisamy, Sankar S., Ramasubbareddy Somula, Ganesh Gopal Deverajan

:
Communication Trust and Energy-Aware Routing Protocol for WSN Using D-S Theory. 24-36 - D. Sumathi, S. S. Manivannan:

Analyzing Cognitive Radio Network Operation With the Mechanism of Deciding Handoff and Process of Handoff Employing Varied Distribution Models (5G). 37-64 - Ramesh C., Santhiya K., Rakesh Kumar Sakthivel, Rizwan Patan

:
Game the Oretic Approach for Cloud Service Negotiation. 65-74 - Dharmendra Singh Rajput, Praveen Kumar Reddy Maddikunta, Ramasubbareddy Somula, Bharath Bhushan S., Ravi Kumar Poluru:

A Novel Architectural Model for Dynamic Updating and Verification of Data Storage in Cloud Environment. 75-83

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














