Forthcoming and Online First Articles

International Journal of Grid and Utility Computing

International Journal of Grid and Utility Computing (IJGUC)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

International Journal of Grid and Utility Computing (34 papers in press)

Regular Issues

  • Recommendation system based on space-time user similarity
    by Wei Luo, Zhihao Peng, Ansheng Deng 
    Abstract: With the advent of 5G, the way people get information and the means of information transmission have become more and more important. As the main platform of information transmission, social media not only brings convenience to people's lives, but also generates huge amounts of redundant information because of the speed of information updating. In order to meet the personalised needs of users and enable users to find interesting information in a large volume of data, recommendation systems emerged as the times require. Recommendation systems, as an important tool to help users to filter internet information, play an extremely important role in both academia and industry. The traditional recommendation system assumes that all users are independent. In this paper, in order to improve the prediction accuracy, a recommendation system based on space-time user similarity is proposed. The experimental results on Sina Weibo dataset show that, compared with the traditional collaborative filtering recommendation system based on user similarity, the proposed method has better performance in precision, recall and F-measure evaluation value.
    Keywords: time-based user similarity; space-based user similarity; recommendation system; user preference; collaborative filtering.

  • Joint end-to-end recognition deep network and data augmentation for industrial mould number recognition   Order a copy of this article
    by RuiMing Li, ChaoJun Dong, JiaCong Chen, YiKui Zhai 
    Abstract: With the booming manufacturing industry, the significance of mould management is increasing. At present, manual management is gradually eliminated owing to need for a large amount of labour, while the effect of a radiofrequency identification (RFID) system is not ideal, which is limited by the characteristics of the metal, such as rust and erosion. Fortunately, the rise of convolutional neural networks (CNNs) brings down to the solution of mould management from the perspective of images that management by identifying the digital number on the mould. Yet there is no trace of a public database for mould recognition, and there is no special recognition method in this field. To address this problem, this paper first presents a novel data set aiming to support the CNN training. The images in the database are collected in the real scene and finely manually labelled, which can train an effective recognition model and generalise to the actual scenario. Besides, we combined the mainstream text spotter and the data augmentation specifically designed for the real world, and found that it has a considerable effect on mould recognition.
    Keywords: mould recognition database; text spotter; mould recognition; data augmentation.

  • University ranking approach with bibliometrics and augmented social perception data   Order a copy of this article
    by Kittayaporn Chantaranimi, Rattasit Sukhahuta, Juggapong Natwichai 
    Abstract: Typically, universities aim to achieve a high position in ranking systems for their reputation. However, self-evaluating rankings could be costly because the indicators are not only from bibliometrics, but also the results of over a thousand surveys. In this paper, we propose a novel approach to estimate university rankings based on traditional data, i.e., bibliometrics, and non-traditional data, i.e., Altmetric Attention Score, and Sustainable Development Goals indicators. Our approach estimates subject-areas rankings in Arts & Humanities, Engineering & Technology, Life Sciences & Medicine, Natural Sciences, and Social Sciences & Management. Then, by using Spearman rank-order correlation and overlapping rate, our results are evaluated by comparing with the QS subject ranking. From the result, our approach, particularly the top-10 ranking, performed estimating effectively and then could assist stakeholders in estimating the university's position when the survey is not available.
    Keywords: university ranking; rank similarity; bibliometrics; augmented social perception data; sustainable development goals; Altmetrics.

  • Enhancing fruit farming efficiency through IoT-driven soil moisture analysis and classifier ensemble   Order a copy of this article
    by Chinmayee Senapati, Swagatika Senapati, Satyaprakash Swain 
    Abstract: Effective soil moisture management is a key to optimising fruit farming productivity. This research work model integrates IoT devices, clustering techniques, PCA and ensemble learning to enhance soil moisture classification for crops like pomegranate, mulberry, mango, grapes, ragi and potato. Among various classifiers tested, the Random Forest model demonstrated superior accuracy. However, a stacked Random Forest-SVM model further improved accuracy to 94.65%. This research underscores the importance of IoT-driven data and machine learning in precision agriculture, demonstrating how advanced techniques can refine soil moisture management. By optimising soil moisture, we directly enhance nutrient availability, root development, and water uptake, leading to better crop yield, quality and sustainability. This approach highlights the synergy between technology and machine learning, advancing sustainable and efficient fruit cultivation
    Keywords: IoT; PCA; NBM; RBF; K-star; RF; SVM; KNN; GNB; DT; clustering.
    DOI: 10.1504/IJGUC.2024.10066245
     
  • Optimising DNNs for load forecasting: the power of hyperparameter tuning   Order a copy of this article
    by Faisal Mehmood Butt, Seong-O Shim, Safa Habibullah, Abdulwahab Ali Almazroi, Lal Hussain, Umair Ahmed Salaria 
    Abstract: This study demonstrates the effectiveness of deep learning for electricity demand forecasting across various timescales Interestingly, the optimal network structures differed depending on the prediction horizon We explored configurations with varying numbers of neurons (similar to adjusting hidden layer units) For one-day forecasts, a double hidden layer network with ReLU and sigmoid activation functions achieved the lowest Mean Absolute Percentage Error (MAPE) of 4 23%, with just 4 neurons in the hidden layers In contrast, a single hidden layer with ReLU activation and 6 neurons yielded the best MAPE of 1 95% for one-week forecasts For longer timescales,more complex architectures were necessary The one-month forecast achieved a MAPE of 2 78% with a double ReLU-sigmoid network and 12 neurons in the hidden layers Even three-month forecasts, a challenging task, were tackled effectively by a double ReLU network with 10 neurons, resulting in a MAPE of 2 75%.
    Keywords: optimisation; ReLU; rectified linear unit; convolutional neural; networks; deep neural networks; signature function; neurons; layers.
    DOI: 10.1504/IJGUC.2024.10067738
     
  • Low-powered IoT device for monitoring dementia patients using A9G module and ESP32 C3 MCU in cloud environment   Order a copy of this article
    by Kumar Saurabh, Manish Madhava Tripathi, Satyasundara Mahapatra 
    Abstract: As the growing age of world's population, more and more people are affected by a disease known as dementia that causes gradual mental decline. Owing to this, not only the patient but also the caregiver's personal life and health system faces challenges. To keep the system smart, an intelligent monitoring system is needed. Development of an optimised IoT device with the latest sensors and microcontrollers which stores the data in cloud environment in systematic manner is the basic objective. This research presents a methodology which optimizes a normal monitoring device into advanced IoT system using A9G Module and ESP32 C3 MCU. After the optimisation, the evaluation of the device is based on various qualitative parameters and overall effectiveness in real-world applications. The findings suggest that while simple IoT devices offer indoor monitoring, the proposed device provide comprehensive monitoring which enhance the patient safety and caregiver peace of mind.
    Keywords: dementia; efficient utilisation; IoT based monitoring; patient care; data analysis; privacy; wearable devices.
    DOI: 10.1504/IJGUC.2024.10067985
     
  • Innovative edge computing-driven recognition of cardiac monitoring application   Order a copy of this article
    by R. Kishore Kanna, Rajendar Sandiri, Biswajit Brahma, Bhawani Sankar Panigrahi, Susanta Kumar Sahoo, Rajitha Ala 
    Abstract: Cardiac disease has been emerged as a significant global health concern. The incidence of cardiac arrests has been steadily rising. The mortality rate for abrupt cardiac arrest is high. Continuous monitoring of an individual's physical condition has the potential to save up to 60% of human lives. Lately, the Internet of Things has been gaining traction as a very promising technology. If the doctor is unable to directly see the patient, The IoT executes a vital part in the remote monitoring of a patient’s status. The widespread utilization of wearable devices will further enhance the impact of the Internet of Things (IoT). This study evaluates five prediction models for specific data and selects the random forest algorithm as the best method in edge computing applications. Suggests MAX30102 The strong plan is equivalent to patient’s assessment, their remains, lingam, blood pressure, genetic subject, and they are the matrix. Enhanced online versions of the schedule have been incorporated. - Check the situation regularly. The User authentication will be loaded on the server’s database, and checked.
    Keywords: computing; edge computing; cardiac; healthcare.
    DOI: 10.1504/IJGUC.2024.10068165
     
  • Assessment of a cuckoo search-based intelligent system for mesh routers placement optimisation in WMNs considering various distributions of mesh clients   Order a copy of this article
    by Shinji Sakamoto 
    Abstract: Wireless Mesh Networks (WMNs) have many advantages. However, they have several issues related to wireless communication. An effective approach to deal with these problems is the optimization of mesh routers placement in WMNs, but this is an NP-hard problem. Thus, heuristic and intelligent algorithms are needed. In the previous work, we developed an intelligent simulation system based on Cuckoo Search (CS) (WMN-CS), which is a meta-heuristic algorithm. In this work, we evaluate the WMN-CS performance for various distributions of mesh clients: Uniform, Normal, Exponential, Weibull and Chi-square distributions. The simulation results show that for Normal distribution the WMN-CS system can find suitable locations of mesh routers for about 30 phases. The Uniform distribution has the lowest performance compared to the other distributions. Also, Exponential andWeibull distributions converge slower than Chi-square distribution. However, Exponential distribution converges faster than Weibull distribution.
    Keywords: wireless mesh networks; node placement problem; cuckoo search; client distributions.
    DOI: 10.1504/IJGUC.2024.10068275
     
  • Analysis of cybersecurity attacks and solution approaches   Order a copy of this article
    by Ali Yılmaz, Resul Das 
    Abstract: Numerous cybersecurity vulnerabilities have emerged as a result of the quickly changing digital environment, posing serious risks to people, corporations, and governments alike The article "An analysis cybersecurity attacks and solution approaches" delves into the subtleties of this contemporary conflict zone and offers a thorough analysis of the many assault vectors, techniques, and their far-reaching effects This article examines the full spectrum of online hazards, from well-known enemies such as malware, phishing, and denial-of-service attacks to more sophisticated and sneaky threats such as advanced persistent threats (APT) It explores the methods and strategies employed by cybercriminals, offering light on their always-changing approaches This article also sheds light on preventive measures and problem-solving techniques created to combat these risks Provides an overview of a wide range of cybersecurity techniques and tools, including artificial intelligence, intrusion detection systems, encryption, and multifactor authentication Individuals and organizations can protect their digital domains from the onslaught of cyberattacks by being aware of the threats and having the necessary tools and knowledge. With a clearer grasp of the cyberthreat landscape and the various solutions to reduce these risks, readers should be better equipped to use the internet safely as a result of this thorough analysis.
    Keywords: information security; cybersecurity; malware; network security; attacks; cyberthreats.
    DOI: 10.1504/IJGUC.2024.10068492
     
  • Reinforcing blockchain security with advanced anomaly detection in edge computing using EDGESENTRY   Order a copy of this article
    by B. Senthilkumar, Prashant Bachanna, U. Barakkath Nisha, M. Sravani, S. Swathi, K. Srihari, Bathini Thrivikram, R. Yasir Abdullah 
    Abstract: Within the realm of distributed systems, the fusion of blockchain technology and edge computing has generated considerable attention, offering the potential for improved security and efficiency in decentralized applications This article presents EDGESENTRY, an abbreviation for "Enhanced Detection for Genuine Edge Security," a novel anomaly detection technique designed exclusively for blockchain-integrated edge computing settings A comparison between EDGESENTRY and currently available anomaly detection algorithms developed for edge computing were conducted This comparison focuses on highlighting the distinctive characteristics and performance benefits of EDGESENTRY By conducting thorough experimentation and assessment, which includes comparing against the most advanced methodologies, the efficiency of EDGESENTRY in identifying and reducing irregularities in blockchain transactions that occur at the outer edges of the network was calculated The findings demonstrate that EDGESENTRY surpasses current methods in terms of detection accuracy, false positive rates, and computational efficiency Furthermore, the incorporation of blockchain technology improves the security and dependability .
    Keywords: anomaly detection; blockchain security; edge computing; EDGESENTRY; reliability.
    DOI: 10.1504/IJGUC.2024.10069049
     
  • An architectural framework for interoperable security anomaly detection in edge computing and SDN using gradient-boosted trees   Order a copy of this article
    by R. Gowrishankar, Jaganathan Arulkarthick, A.P. Janani, K. Sundaresan, U. Barakkath Nisha, R. Yasir Abdullah, Thrivikram Bathini 
    Abstract: In the ever-changing environment of edge computing and software-defined networking (SDN), it is crucial to have strong security measures in place to protect against new threats and ensure compatibility between different systems Conventional anomaly detection algorithms frequently have difficulties in dealing with the intricacy and dynamic characteristics of such situations This paper presents a specialized architectural framework designed for edge computing and SDN, utilizing the sophisticated capabilities of Gradient-Boosted Trees (GBT) to achieve efficient anomaly detection Our framework aims to improve security in edge computing and SDN infrastructures by utilizing the predictive capabilities and adaptability of GBT GBT offers enhanced precision in identifying security anomalies when compared to conventional approaches by examining extensive and diverse data streams prevalent in such contexts The framework is specifically designed to effortlessly include edge computing and SDN architectures, guaranteeing compatibility and interoperability across a wide range of devices.
    Keywords: edge computing; SDN; software-defined networking; security anomaly detection; GBT; gradient-boosted trees; interoperability; framework architecture.
    DOI: 10.1504/IJGUC.2024.10069455
     
  • Leveraging a hybrid whale-grey wolf optimisation algorithm to enhance fifth generation deployment efficiency in multi-access edge computing   Order a copy of this article
    by B. Senthilkumar, U. Barakkath Nisha, Vadivelu Kalpana, Priscilla Joy, S. Gokila 
    Abstract: In contemporary advanced manufacturing environments, deploying numerous intelligent mobile devices is crucial to meet the rising need for adaptable production capabilities This research article focuses on addressing critical challenges in modern connected environments where intelligent mobile devices play a crucial role These devices are equipped with a variety of sensors and constantly synchronize massive datasets Furthermore, with the increasing importance of energy efficiency, current studies highlight energy use as a substantial expense Nevertheless, previous research has mostly focused on analysing energy consumption in cloud servers, neglecting to include the energy usage associated with edge computing and underestimating the influence of various mobile devices This becomes further crucial as interconnected settings increase The research article presents an integer programming paradigm that addresses the difficulty of efficiently deploying MEC servers and fifth generation small cells Given the NP-hard nature of edge server deployment, the research article proposes a novel HWGWO algorithm.
    Keywords: MEC; multi-access edge computing; HWGWO; hybrid whale-grey wolf optimisation.
    DOI: 10.1504/IJGUC.2024.10069979
     
  • LIDS security shield: lightweight intrusion detection system (IDS) for detecting DDoS attacks on IoT environment   Order a copy of this article
    by Sai Suchith Kurra, Likhitha Rayana, Sai Anurag Ayyalasomayajula, Sirajudeen Yoosuf Mohamed 
    Abstract: The proliferation of edge computing and the Internet of Things (IoT) has raised serious concerns about linked device's susceptibility to Distributed Denial of Service (DDoS) attacks. The new lightweight Intrusion Detection System (IDS) model proposed in this study is intended only for the detection of DDoS assaults against edge and Internet of Things devices. Because they frequently use a lot of resources, traditional IDS solutions are inappropriate for resource constrained IoT and edge computing settings. With minimal computing overhead, the suggested methodology uses anomaly detection and machine learning techniques to find patterns linked to DDoS assaults. In addition, the model considers the particularities of IoT and edge devices, considering things like constrained computing power, energy limitations, and communication protocols. The IDS model's lightweight design ensures its applicability to resource-constrained devices, making it an invaluable tool for bolstering security in the rapidly expanding IoT and edge computing ecosystems.
    Keywords: IoT; DDoS attack; edge device; cyber-security; light-weight IDS system.
    DOI: 10.1504/IJGUC.2024.10069499
     
  • Effort forecasting approach for new generation agile projects   Order a copy of this article
    by Anupama Kaushik, Prabhjot Kaur, Tirimula Rao Benala, Mohammed Altaf Ahmed 
    Abstract: Now-a-days many software companies are undertaking agile software development along with traditional software development based on waterfall model. Effort estimation is an important constituent of any software development firm as it can measure the success or failure of a software project. In this paper analogy-based model for effort estimation is proposed for agile projects. The model is evaluated on three agile datasets and evaluation criteria used are mean magnitude of relative error (MMRE), Median magnitude of relative error (MdMRE) and prediction (PRED). The results demonstrated that the analogy-based model for effort estimation which was extensively used for traditional software development works well with the projects developed using agile methodologies also. Statistical analysis is also performed and, it also shows the proposed technique supports the agile projects as well.
    Keywords: software development effort; analogy estimation; agile projects; agile methodologies; agile effort; similarity measures; Zia Dataset; CD-1 Dataset; CD-2 Dataset.
    DOI: 10.1504/IJGUC.2024.10069592
     
  • Generative AI in IoT: transforming cloud services with intelligent automation   Order a copy of this article
    by Ashwin Raiyani, Sheetal Pandya, Kaushal Jani, Zalak Vyas 
    Abstract: This paper explores how Generative AI can revolutionize cloud services, enabling smart automation over the Internet of Things (IoT). It outlines the potential use of Generative AI in smart homes, industrial automation, healthcare, and transportation, proposing an architecture that integrates cloud computing, edge computing, and IoT computing for Generative AI. The integration allows IoT devices to assess data, make independent decisions, and manage themselves based on customized user experiences and functionality. Case studies and experimental evaluations demonstrate significant productivity, efficiency, and user satisfaction improvements. However, challenges such as data heterogeneity, security issues, and ethical considerations must be addressed for reliable AI-enabled IoT applications. Collaboration with academicians, business experts, and governmental representatives is suggested to build trustworthy spaces for integrating AI capabilities into IoT cloud services, leveraging the joint effort between Gen AI and IoT for innovation, productivity, and competitiveness.
    Keywords: generative AI; internet of things; cloud services; intelligent automation; AI-Driven IoT.
    DOI: 10.1504/IJGUC.2024.10069892
     
  • An exploration of edge-based energy harvesting and routing strategies to enhance communication efficiency in IoT networks   Order a copy of this article
    by B.Senthil Kumar, Prashant Bachanna, S. Chandragandhi, U. Barakkath Nisha, M. Sravani, S. Swathi, Penchala Prasanth, R. Yasir Abdullah 
    Abstract: This article explores the domain of Internet of Things (IoT) sensor networks, with a specific emphasis on improving sustainability and communication efficiency. Given the widespread use of interconnected devices, it is crucial to prioritise sustainable functioning and effective communication. Energy harvesting is becoming a promising approach for overcoming power limitations, allowing sensors to gather energy from their environment. Furthermore, routing algorithms have a crucial function in optimising communication efficiency inside these networks. The aim of this paper is to investigate various methods of harnessing energy and routing algorithms to discover novel approaches that promote sustainability and improve communication performance in IoT sensor networks. This study aims to offer significant insights and recommendations for creating resilient and environmentally friendly IoT solutions through a thorough analysis. The study assesses a range of energy acquisition techniques, encompassing solar, kinetic, thermal, and radio frequency acquisition. Every solution has distinct benefits and difficulties, requiring a detailed evaluation of their appropriateness for implementing IoT sensors in different situations.
    Keywords: IoT sensor networks; energy harvesting; routing algorithms; sustainability; communication efficiency; and renewable energy.
    DOI: 10.1504/IJGUC.2024.10069951
     
  • SHO: an efficient multi-objective task scheduling in hybrid cloud-fog computing environment   Order a copy of this article
    by Santhosh Kumar Medishetti, Ganesh Reddy 
    Abstract: Cloud-Fog computing (CFC) has emerged as a solution to meet the growing demand for efficient processing in diverse applications. Task scheduling (TS) within CFC is crucial for resource optimization and meeting user needs. This paper presents a novel approach to TS using the SHO Algorithm, drawing inspiration from hyena pack dynamics. SHO aims to minimize makespan, energy consumption, and execution time while enhancing throughput. The study extensively evaluates SHO's adaptability to dynamic workloads and varying user demands through simulations. Results demonstrate SHO's superior performance over existing algorithms, highlighting its potential to enhance CFC system efficiency and reliability. The proposed algorithm is effectively balanced the makespan time by 13.69%, execution time by 26.06%, energy saving by 30.99% and increased throughput by 14.59% over three existing advanced scheduling algorithms. This research contributes to the ongoing optimization of TS in CFC, offering valuable insights into nature-inspired algorithms' effectiveness in addressing complex computational challenges.
    Keywords: task scheduling; cloud fog computing; spotted hyena optimisation; makespan; execution time; energy consumption.
    DOI: 10.1504/IJGUC.2024.10070065
     
  • Secure and privacy-preserving medical image retrieval model in cloud-edge computing   Order a copy of this article
    by Sirisha Potluri, R. Balamurali, B. Ravikrishna 
    Abstract: Content-based image retrieval is one of the significant image retrieval techniques. There is a challenging task for Content based image retrieval due to the risk of privacy concerns, leakage of sensitive data, and encryption of the images before keeping them in the cloud. In our work, we propose a secure and privacy-preserving medical image retrieval model to support multiple image sources/owners and sharing concerns. We securely encrypt the image features with a multi-party computation and sharing model with their keys. This allows us to achieve efficient image retrieval over several images collected from multiple sources with guaranteed image privacy. Using this technique, we can also get similarity measurements of the images to avoid keeping image similarity information in the cloud. Results demonstrate that our proposed model achieved improved image retrieval accuracy while preserving the security and privacy of the image.
    Keywords: content-based image retrieval; healthcare; computer vision; cloud computing; edge computing; encryption.
    DOI: 10.1504/IJGUC.2024.10070218
     
  • Combining classifier ensembles for efficient big data analytics in edge-cloud environments   Order a copy of this article
    by Sirisha Potluri, Khasim Syed, Santi Swarup Basa, J. Kavitha, Pavan Kumar 
    Abstract: Big Data analytics is essential for modern organizations because of the exponential expansion of data from various sources such as social media, sensors, mobile devices, and the Internet of Things. By examining this data, organizations can learn a great deal about consumer behaviour, industry trends, operational inefficiencies, and creative potential. In our work we are proposing an efficient ensemble classification model by using metaheuristic optimization algorithms- Chaotic Pigeon Inspired Optimization (CPIO), Random Forest (RF) and Support Vector Machine (SVM). Our proposed model performs better feature selection and assigns appropriate class labels for the given cloud service data. This ensemble model supports the classification process and boosts the performance of the model. We have performed a series of simulation operations to observe the outcomes under several dimensions and parameters. The resultant outcomes emphasized the efficiency of the proposed model over the recent practices in edge-cloud computing platforms.
    Keywords: machine learning; artificial intelligence; cloud computing; edge computing; ensemble classification; big data analytics.
    DOI: 10.1504/IJGUC.2024.10070219
     
  • A two-stage intrusion detection framework in IoT using random forest for binary and multi-class classification   Order a copy of this article
    by Arash Salehpour, Pejman Hosseinioun, MohammadAli Balafar 
    Abstract: The proliferation of IoT devices due to cyber threats, which have become increasingly sophisticated, requires a strong security framework. This paper proposed a new framework for Intrusion Detection System-IoT-IDs using a Random Forest classifier to first classify the attack into binary features and prepare a new dataset that would enable multiclass classification. It achieved an overall accuracy of 0.98 on the comprehensive UNSW-NB15 dataset, with very good performance in detecting 'Generic' attacks, having almost perfect precision, recall, and F1-score. it also presented cases of 'Analysis' and 'Backdoor' types of attacks, where further improvements should be done. All these models have been analyzed to find the pros and cons in IoT settings. The Random Forests, XGBoost and MLP. Further studies based on the research could be done on multiplying models with improved features, intrusion detection in real time, and more strong AI techniques. This paper focuses on addressing challenges with imbalanced classes and scalability concerns using data privacy preservation methods for improving the performance of IDS.
    Keywords: IDS; intrusion detection system; IoT; internet of things; ensemble learning; UNSWNB15; cybersecurity; hybrid models.
    DOI: 10.1504/IJGUC.2024.10071203
     
  • Multi-objective enhanced task scheduling algorithm for SLA violation mitigation in cloud computing using deep reinforcement learning   Order a copy of this article
    by Mallu Shiva Rama Krishna, Khasim Vali Dudekula 
    Abstract: Task scheduling in distributed heterogeneous cloud environments presents challenges due to NP-hard complexity, non-linear dynamics, and multi-objective optimisation requirements. To address these challenges, we propose an intelligent scheduling framework that combines real-time workload monitoring with predictive task analysis using Deep Q-Network (DQN) reinforcement learning. Our adaptive solution continuously optimises resource allocation through experiential learning, improving system performance while reducing energy consumption and minimising SLA violations in dynamic cloud environments. We evaluate the Multi-Objective Enhanced Task Scheduling Algorithm for SLA Violation Mitigation in Cloud Computing using Deep Reinforcement Learning (METCD) against baseline algorithms, including WOA, CA, GWO, ALO, and GA. The results demonstrate that METCD outperforms existing approaches, reducing makespan by 28.76% to 40.03%, SLA violations by 29.59% to 47.12%, and energy consumption by 32.82% to 42.2%. These improvements emphasise the efficiency of METCD in optimising task scheduling within cloud computing environments.
    Keywords: SLA violation; cloud computing; task scheduling; energy consumption; machine learning; makespan; deep Q-learning.
    DOI: 10.1504/IJGUC.2025.10071740
     
  • Fractional red panda optimisation-based cluster head selection and routing in IoT   Order a copy of this article
    by Nandkumar Prabhakar Kulkarni, Meena Chavan, Amar Rajendra Mudiraj 
    Abstract: In the present world, the IoT has been developed as a widespread network for various smart devices in numerous applications. IoT is considered a significant technology for achieving the requirements for a variety of applications. However, load balancing, energy inadequate battery power, and security may affect the performance of IoT. Therefore, the Fractional Red Panda Optimization (FrRPO)-based Cluster Head (CH) selection and routing is proposed in this paper. The IoT network simulation is the primary process. The Deep Q Net (DQN) is used for predicting the energy. The FrRPO with fitness factors like predicted energy, delay, and distance are used to select the CH. Moreover, the FrRPO with fitness factors like throughput, energy, distance, and reliability are utilized for routing. The metrics like energy consumption, delay, and throughput are considered to validate the model, which attains the optimal results of 0.555 J, 0.666 s, and 89.02 Mbps.
    Keywords: cluster head; red panda optimisation; internet of things; routing; fractional calculus.
    DOI: 10.1504/IJGUC.2025.10072128
     
  • Comparable IoT and DL methods of drinking water usage   Order a copy of this article
    by Arber Musliu, Naim Baftiu 
    Abstract: IoT applications have actively employed advanced technology, utilizing neural networks to comprehend and connect with their surroundings. Significantly, Amazon Echo exemplifies an IoT application by bridging physical and human realms with the digital domain, employing deep learning for voice command comprehension. Similarly, Microsoft's Windows facial recognition security system integrates DL to unlock doors upon facial recognition. This research explores the integration of IoT with DL techniques to enhance the monitoring and analysis of drinking water quality assessment, evaluating various methods to determine drinkability. Various machine learning algorithms, including Random Forest, LightGBM, and Bagging Classifier, are employed to predict water quality based on multiple parameters such as pH, conductivity, and turbidity. The study uses a comprehensive dataset featuring 3277 values for nine different water quality indicators. Comparative analysis revealed similar outcomes: Random Forest demonstrated the highest accuracy, achieving a predictive accuracy of 0.824695, followed by Light GBM and and Bagging Classifier. This research contributes to the ongoing efforts to employ advanced computational techniques in environmental monitoring, providing a reliable methodological framework for future studies to enhance water quality assessment.
    Keywords: drinking water usage; IoT; DL methods; water monitoring; smart water systems.
    DOI: 10.1504/IJGUC.2024.10072181
     
  • Strongly correlated high-utility item-sets recommendation in e-commerce applications using EGUI-tree over data stream   Order a copy of this article
    by P. Amaranatha Reddy, M.H.M. Krishna Prasad, S. Rao Chintalapudi 
    Abstract: The product recommendation feature in e-commerce applications plays a vital role in helping customers choose the right items. By analysing their purchase history, the system recommends relevant items. Although customers have the freedom to choose from the suggestions, if they do purchase them, it benefits both buyers and sellers. Sellers experience increased sales, while buyers save time searching for products. To meet these requirements, a recommendation system should prioritise items with High Utility (HU) and strong correlation. HU items generate high profits, and strongly correlated items have a higher probability of being selected. Here, since up-to-date data in the data stream are got, the stream of purchase transactions is mined using the sliding window technique to extract such item-sets. To store the immediately processed results, a tree like structure termed Extended Global Utility Item-sets Tree is used. Experimental results on real-time data prove the proposed algorithm is optimistic and scalable.
    Keywords: HUIM; high utility item-set mining; recommendation system; utility; correlation; data stream; sliding window.
    DOI: 10.1504/IJGUC.2023.10057772
     
  • SDSAM: a service-oriented approach for descriptive statistical analysis of multidimensional spatio-temporal big data   Order a copy of this article
    by Weilong Ding, Zhuofeng Zhao, Jie Zhou, Han Li 
    Abstract: With the expansion of the Internet of Things, spatio-temporal data has been widely used and generated. The rise of 'big data' in space and time has led to the flood of new applications with statistical analysis characteristics. In addition, applications based on statistical analysis of these data must deal with the large capacity, diversity and frequent changes of data, as well as the query, integration and visualisation of data. Developing such applications is essentially a challenging and time-consuming task. In order to simplify the statistical analysis of spatio-temporal data, a service-oriented method is proposed in this paper. This method defines the model of spatio-temporal data service and functional service. Define a process-based application of spatio-temporal big data statistics to invoke basic data services and functional services. This paper proposes an implementation method of spatio-temporal data service and functional service based on Hadoop environment. Taking the highway big data analysis as an example, the validity and applicability of this method are verified. The effectiveness of this method is verified by an example. The validity and applicability of the method are verified by the case study of expressway large data analysis. An example is given to verify the validity of the method.
    Keywords: spatio-temporal data; RESTful; web service.
    DOI: 10.1504/IJGUC.2025.10072049
     
  • Design and analysis of novel hybrid load balancing algorithm for cloud data centre   Order a copy of this article
    by Ajay Kumar Dubey, Vimal Mishra 
    Abstract: In recent years there is paradigm shift in computing, now data is used to store and compute in cloud environment. The Cloud Service Provider (CSP) maintains a huge shared pool of computing resources that provides on-demand services. The cloud customers are able to access the services and pay according to uses. When millions of users across the globe connect to cloud for their storage and computational needs, there might be issues such as delay in services. The proposed Novel Hybrid Load Balancing (NHLB) algorithm manages the load of the virtual machine in data centre. This paper is focused on certain problems like optimisation of performance, maximum throughput, minimisation of makespan, etc. NHLB algorithm is more efficient than conventional load balancing algorithms with reducing makespan, load imbalance and standard deviation. We compare the result of proposed NHLB algorithm with dynamic load balancing algorithm and honeybee algorithm. The result shows that the proposed NHLB algorithm is better than the dynamic and honeybee algorithms.
    Keywords: cloud computing; data centre; load balancing; virtual machine; makespan; performance optimisation.
    DOI: 10.1504/IJGUC.2025.10072050
     
  • Data collection in underwater wireless sensor networks: performance evaluation of FBR and epidemic routing protocols for node density and area shape   Order a copy of this article
    by Elis Kulla 
    Abstract: Data collection in Underwater Wireless Sensor Networks (UWSN) is not a trivial problem, because of unpredictable delays and unstable links between underwater devices. Moreover, when nodes are mobile continuous connectivity is not guaranteed. Therefore, data collection in UWSN, node scarcity and movement patterns create different environment for data collection in underwater communication. In this paper, we investigate the impact of the area shape and node density in UWSN, by comparing Focused Beam Routing (FBR) and Epidemic Routing protocols. Furthermore, we also analyse the correlation between different performance metrics. From simulation results we found that when using FBR, delay and delivery probability slightly decrease (2.1%) but the overhead ratio decreases noticeably (46.9%). The correlation between performance metrics is stronger for square area shape, and not noticeable for deep area shape.
    Keywords: underwater wireless sensor networks; UWSN; focused beam routing; FBR; delay tolerant network; DTN; ONE simulator; area shape; node density; data collection.
    DOI: 10.1504/IJGUC.2025.10072051
     
  • Detection of DDoS attacks using supervised ML and deep learning approaches for SDN   Order a copy of this article
    by Priyanka Kujur, Sanjeev Patel 
    Abstract: Software Defined Networking (SDN) has gained attention and has become very popular due to its capability to provide simple and efficient techniques for controlling computer networks. This paper examines how supervised machine learning, unsupervised machine learning and supervised neural network approaches are implemented to detect DDoS attacks. To lessen and avoid DDoS attacks, the analysis procedure requires training and implementing the right model for the assigned network. It has been observed from our extensive evaluation of these learning techniques that K-Nearest Neighbour (KNN) reflects the highest degree of accuracy of 97.50% among all supervised machine learning approaches. In contrast, CNN reflects the highest degree of accuracy of 99.41% among supervised neural network approaches. In addition, we have also evaluated the silhouette score for unsupervised machine learning techniques where K-means with Principal Component Analysis (PCA) outperforms K-means with T-distributed Stochastic Neighbour Embedding (TSNE).
    Keywords: SDN; DDoS attack; detection; supervised learning; unsupervised learning; neural network.
    DOI: 10.1504/IJGUC.2025.10070364
     
  • Examining determinants of blockchain-based smart contract adoption in local government: an empirical study in developing countries   Order a copy of this article
    by Luma Fawaz Jarallah, Baraa Bassam Yahya, M.A. Alsalem 
    Abstract: Smart contracts based on blockchain technology offer significant opportunities for local governments - particularly in developing countries like Iraq - to enhance operational efficiency. This study explores the factors influencing the adoption of smart contracts in the Nineveh Governorate. Employing a quantitative approach, the research draws on relevant literature and applies the Technology-Organisation-Environment (TOE) framework, supplemented by elements from the Technology Acceptance Model (TAM). The key factors examined include perceived compatibility, perceived benefits, cost, organisational readiness, top management support, and government support. Data were collected via a questionnaire distributed to 87 local government employees in Nineveh. The results indicate that perceived benefits, cost, organisational readiness, and government support positively influence the intention to adopt smart contracts. However, perceived compatibility and top management support did not show a significant impact on adoption behaviour. Conducted in an emerging market context like Iraq, this study offers valuable insights for policymakers, researchers, and public sector professionals aiming to implement blockchain-based solutions.
    Keywords: blockchain; smart contract; local government; developing countries; TOE; TAM.
    DOI: 10.1504/IJGUC.2025.10070652
     

Special Issue on: AMLDA 2022 Applied Machine Learning and Data Analytics Applications, Challenges, and Future Directions

  • Fuzzy forests for feature selection in high-dimensional survey data: an application to the 2020 US Presidential Election   Order a copy of this article
    by Sreemanti Dey, R. Michael Alvarez 
    Abstract: An increasingly common methodological issue in the field of social science is high-dimensional and highly correlated datasets that are unamenable to the traditional deductive framework of study. Analysis of candidate choice in the 2020 Presidential Election is one area in which this issue presents itself: in order to test the many theories explaining the outcome of the election, it is necessary to use data such as the 2020 Cooperative Election Study Common Content, with hundreds of highly correlated features. We present the fuzzy forests algorithm, a variant of the popular random forests ensemble method, as an efficient way to reduce the feature space in such cases with minimal bias, while also maintaining predictive performance on par with common algorithms such as random forests and logit. Using fuzzy forests, we isolate the top correlates of candidate choice and find that partisan polarisation was the strongest factor driving the 2020 Presidential Election.
    Keywords: fuzzy forests; machine learning; ensemble methods; dimensionality reduction; American elections; candidate choice; correlation; partisanship; issue voting; Trump; Biden.

  • An efficient intrusion detection system using unsupervised learning AutoEncoder   Order a copy of this article
    by N.D. Patel, B.M. Mehtre, Rajeev Wankar 
    Abstract: As attacks on the network environment are rapidly becoming more sophisticated and intelligent in recent years, the limitations of the existing signature-based intrusion detection system are becoming more evident. For new attacks such as Advanced Persistent Threat (APT), the signature pattern has a problem of poor generalisation performance. Research on intrusion detection systems based on machine learning is being actively conducted to solve this problem. However, the attack sample is collected less than the normal sample in the actual network environment, so it suffers a class imbalance problem. When a supervised learning-based anomaly detection model is trained with these data, the results are biased toward normal samples. In this paper, AutoEncoder (AE) is used to perform single-class anomaly detection to solve this imbalance problem. The experimental evaluation was conducted using the CIC-IDS2017 dataset, and the performance of the proposed method was compared with supervised models to evaluate the performance
    Keywords: intrusion detection system; advanced persistent threat; CICIDS2017; AutoEncoder; machine learning; data analytics.

Special Issue on: Cloud and Fog Computing for Corporate Entrepreneurship in the Digital Era

  • Study on the economic consequences of enterprise financial sharing model   Order a copy of this article
    by Yu Yang, Zecheng Yin 
    Abstract: Using enterprise system ideas to examine the business process requirements of firms, the Financial Enterprise Model (FEM) is a demanding program. This major integrates finance, accounting, and other critical business processes. Conventional financial face difficulties due to low economic inclusion, restricted access to capital, lack of data, poor R&D expenditures, underdeveloped distribution channels, and so on. This paper mentions making, consuming, and redistributing goods through collaborative platform networks. These three instances highlight how ICTs (Information and Communication Technologies) can be exploited as a new source of company innovation. The sharing economy model can help social companies solve their market problems since social value can be embedded into their sharing economy cycles. As part of the ICT-based sharing economy, new business models for social entrepreneurship can be developed by employing creative and proactive platforms. Unlike most public organizations, double-bottom-line organizations can create social and economic advantages. There are implications for developing and propagating societal values based on these findings.
    Keywords: finance; economy; enterprise; ICT; social advantage.

  • Enhanced speculative approach for big data processing using BM-LOA algorithm in cloud environment   Order a copy of this article
    by Hetal A. Joshiara, Chirag S. Thaker, Sanjay M. Shah, Darshan B. Choksi 
    Abstract: In the event that one of the several tasks is being allocated to an undependable or jam-packed machine, a hugely parallel processing job can be delayed considerably. Hence, the majority of the parallel processing methodologies, namely MR, have espoused diverse strategies to conquer the issue called the straggler problem. Here, the scheme may speculatively introduce extra copies of a similar task if its development is unnaturally slow when an additional idling resource is present. In the strategies-centred processes, the dead node is exhibited. The RT along with backup time of the slow task is assessed. The slow task is rerun with the aid of BM-LOA subsequent to the evaluation. In both heterogeneous and homogeneous environments, the proposed approach is performed. Centred on the performance metrics, the proposed research technique's performance is scrutinised in experimental investigation. Thus, when weighed against the other approaches, the proposed technique achieves superior performance.
    Keywords: MEWMA; modified exponentially weighted moving average; speculative execution; strategy; Hadoop-SRP; Hadoop supreme rate performance; big data processing and rerun.
    DOI: 10.1504/IJGUC.2022.10063581
     
  • Importance of big data for analysing models in social networks and improving business   Order a copy of this article
    by Zhenbo Zang, Honglei Zhang, Hongjun Zhu 
    Abstract: The digital revolution fuels business growth through participatory websites and active user involvement. However, literature lacks emphasis on profitable business-to-business transactions. User knowledge and big data search are valuable. Social media data analysis offers promising research. Technological advances enable commercial storage and analysis of large data volumes. Big data represents real-time, organised, and unstructured data sources. Managing vast networks poses challenges and advantages. Social network data grows daily, providing a rich data pool. This article demonstrates a data framework using text mining and natural language processing for social network big data analysis, achieving 98.30% successful in-time access and simultaneous applications.
    Keywords: big data; business-to-business; data analytics; text mining; social networks.
    DOI: 10.1504/IJGUC.2025.10072052