{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:36:38Z","timestamp":1774719398730,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:00:00Z","timestamp":1756512000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T00:00:00Z","timestamp":1756512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10586-025-05282-4","type":"journal-article","created":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T11:06:15Z","timestamp":1756551975000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Mitigating data leaks and optimizing task scheduling in cloud computing using EfficientNetV2 with federated learning and blockchain"],"prefix":"10.1007","volume":"28","author":[{"given":"C. V.","family":"Manjushree","sequence":"first","affiliation":[]},{"given":"H. Aruna","family":"Reddy","sequence":"additional","affiliation":[]},{"given":"D. C.","family":"Chandana","sequence":"additional","affiliation":[]},{"given":"C. A.","family":"Subasini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,30]]},"reference":[{"key":"5282_CR1","doi-asserted-by":"publisher","first-page":"100002","DOI":"10.1016\/j.csa.2022.100002","volume":"1","author":"SA Sheik","year":"2023","unstructured":"Sheik, S.A., Muniyandi, A.P.: Secure authentication schemes in cloud computing with glimpse of artificial neural networks: a review. Cyber Sec. Appl. 1, 100002 (2023). https:\/\/doi.org\/10.1016\/j.csa.2022.100002","journal-title":"Cyber Sec. Appl."},{"key":"5282_CR2","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v12i1.pp880-895","author":"N Arora","year":"2022","unstructured":"Arora, N., Banyal, R.K.: Hybrid scheduling algorithms in cloud computing: a review. Int. J. Electr. Comput. Eng. (2022). https:\/\/doi.org\/10.11591\/ijece.v12i1.pp880-895","journal-title":"Int. J. Electr. Comput. Eng."},{"issue":"7","key":"5282_CR3","doi-asserted-by":"publisher","first-page":"3910","DOI":"10.1016\/j.jksuci.2021.02.007","volume":"34","author":"D Abdulkareem Shafiq","year":"2022","unstructured":"Abdulkareem Shafiq, D., Jhanjhi, N.Z., Abdullah, A.: Load balancing techniques in cloud computing environment: a review. J. King Saud Univ. Comput. Inform. Sci. 34(7), 3910\u20133933 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2021.02.007","journal-title":"J. King Saud Univ. Comput. Inform. Sci."},{"key":"5282_CR4","doi-asserted-by":"publisher","first-page":"71247","DOI":"10.1109\/ACCESS.2022.3188110","volume":"10","author":"I Gupta","year":"2022","unstructured":"Gupta, I., Singh, A.K., Lee, C.-N., Buyya, R.: Secure data storage and sharing techniques for data protection in cloud environments: a systematic review, analysis, and future directions. IEEE Access 10, 71247\u201371277 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3188110","journal-title":"IEEE Access"},{"issue":"1","key":"5282_CR5","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1186\/s13677-021-00247-5","volume":"10","author":"W Li","year":"2021","unstructured":"Li, W., Wu, J., Cao, J., Chen, N., Zhang, Q., Buyya, R.: Blockchain-based trust management in cloud computing systems: a taxonomy, review and future directions. J. Cloud Comput. 10(1), 35 (2021)","journal-title":"J. Cloud Comput."},{"issue":"6","key":"5282_CR6","doi-asserted-by":"publisher","first-page":"2309","DOI":"10.1016\/j.jksuci.2022.03.027","volume":"34","author":"SA Murad","year":"2022","unstructured":"Murad, S.A., Abu Jafar, Md., Muzahid, Z.R., Azmi, M., Hoque, M.I., Kowsher, Md.: A review on job scheduling technique in cloud computing and priority rule based intelligent framework. J. King Saud Univ. Comput. Inform. Sci. 34(6), 2309\u20132331 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2022.03.027","journal-title":"J. King Saud Univ. Comput. Inform. Sci."},{"key":"5282_CR7","doi-asserted-by":"publisher","first-page":"57792","DOI":"10.1109\/ACCESS.2021.3073203","volume":"9","author":"B Alouffi","year":"2021","unstructured":"Alouffi, B., Hasnain, M., Alharbi, A., Alosaimi, W., Alyami, H., Ayaz, M.: A systematic literature review on cloud computing security: threats and mitigation strategies. IEEE Access 9, 57792\u201357807 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3073203","journal-title":"IEEE Access"},{"key":"5282_CR8","doi-asserted-by":"publisher","first-page":"1287","DOI":"10.1007\/s13198-025-02705-8","volume":"16","author":"A Sharma","year":"2025","unstructured":"Sharma, A., Singh, U.K.: Cloud computing security assurance modelling through risk analysis using machine learning. Int. J. Syst. Assurance Eng. Manage. 16, 1287\u20131300 (2025)","journal-title":"Int. J. Syst. Assurance Eng. Manage."},{"key":"5282_CR9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2024.3396511","author":"Z Chen","year":"2024","unstructured":"Chen, Z., Xiong, B., Chen, X., Min, G., Li, J.: Joint computation offloading and resource allocation in multi-edge smart communities with personalized federated deep reinforcement learning. IEEE Trans Mobile Comput (2024). https:\/\/doi.org\/10.1109\/TMC.2024.3396511","journal-title":"IEEE Trans Mobile Comput"},{"key":"5282_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2024.3497958","author":"Z Chen","year":"2024","unstructured":"Chen, Z., Liang, J., Yu, Z., Cheng, H., Min, G., Li, J.: Resilient collaborative caching for multi-edge systems with robust federated deep learning. IEEE\/ACM Trans. Netw. (2024). https:\/\/doi.org\/10.1109\/TNET.2024.3497958","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"5282_CR11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3459020","author":"Z Chen","year":"2024","unstructured":"Chen, Z., Zhang, J., Min, G., Ning, Z., Li, J.: Traffic-aware lightweight hierarchical offloading towards adaptive slicing-enabled sagin. IEEE J. Selected Areas Commun. (2024). https:\/\/doi.org\/10.1109\/JSAC.2024.3459020","journal-title":"IEEE J. Selected Areas Commun."},{"issue":"2","key":"5282_CR12","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1016\/j.jksuci.2023.01.016","volume":"35","author":"S Mangalampalli","year":"2023","unstructured":"Mangalampalli, S., Karri, G.R., Kose, U.: Multi objective trust aware task scheduling algorithm in cloud computing using whale optimization. J. King Saud Univ. Comput. Inform. Sci. 35(2), 791\u2013809 (2023). https:\/\/doi.org\/10.1016\/j.jksuci.2023.01.016","journal-title":"J. King Saud Univ. Comput. Inform. Sci."},{"issue":"5","key":"5282_CR13","doi-asserted-by":"publisher","first-page":"1906","DOI":"10.1016\/j.jksuci.2019.10.009","volume":"34","author":"KN Vhatkar","year":"2022","unstructured":"Vhatkar, K.N., Bhole, G.P.: Optimal container resource allocation in cloud architecture: a new hybrid model. J. King Saud Univ. Comput. Inform. Sci. 34(5), 1906\u20131918 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2019.10.009","journal-title":"J. King Saud Univ. Comput. Inform. Sci."},{"key":"5282_CR14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3344459","author":"K Sharma","year":"2023","unstructured":"Sharma, K., Hassan, M.M., Pandey, S.K., Saini, M., Doriya, R., Ojha, M.K., Sinha, A., Kaushal, C., Bairagi, A.K., Soliman, N.F.: Cloud based multi-robot task scheduling using PMW algorithm. IEEE Access (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3344459","journal-title":"IEEE Access"},{"issue":"6","key":"5282_CR15","doi-asserted-by":"publisher","first-page":"2391","DOI":"10.1016\/j.jksuci.2022.03.016","volume":"34","author":"A Belgacem","year":"2022","unstructured":"Belgacem, A., Mahmoudi, S., Kihl, M.: Intelligent multi-agent reinforcement learning model for resources allocation in cloud computing. J. King Saud Univ. Comput. Inform. Sci. 34(6), 2391\u20132404 (2022). https:\/\/doi.org\/10.1016\/j.jksuci.2022.03.016","journal-title":"J. King Saud Univ. Comput. Inform. Sci."},{"issue":"15","key":"5282_CR16","doi-asserted-by":"publisher","first-page":"3364","DOI":"10.3390\/math11153364","volume":"11","author":"Y Wang","year":"2023","unstructured":"Wang, Y., Dong, S., Fan, W.: Task scheduling mechanism based on reinforcement learning in cloud computing. Mathematics 11(15), 3364 (2023). https:\/\/doi.org\/10.3390\/math11153364","journal-title":"Mathematics"},{"key":"5282_CR17","doi-asserted-by":"publisher","first-page":"26149","DOI":"10.1109\/ACCESS.2022.3157435","volume":"10","author":"S Souravlas","year":"2022","unstructured":"Souravlas, S., Anastasiadou, S.D., Tantalaki, N., Katsavounis, S.: A fair, dynamic load balanced task distribution strategy for heterogeneous cloud platforms based on markov process modeling. IEEE Access 10, 26149\u201326162 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3157435","journal-title":"IEEE Access"},{"key":"5282_CR18","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/5889948","author":"S Supreeth","year":"2022","unstructured":"Supreeth, S., Patil, K., Patil, S.D., Rohith, S., Vishwanath, Y., Venkatesh Prasad, K.S.: An efficient policy-based scheduling and allocation of virtual machines in cloud computing environment. J. Electr. Comp. Eng. (2022). https:\/\/doi.org\/10.1155\/2022\/5889948","journal-title":"J. Electr. Comp. Eng."},{"key":"5282_CR19","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1186\/s13677-023-00392-z","volume":"12","author":"M Yadav","year":"2023","unstructured":"Yadav, M., Mishra, A.: An enhanced ordinal optimization with lower scheduling overhead based novel approach for task scheduling in cloud computing environment. J. Cloud Comp. 12, 8 (2023). https:\/\/doi.org\/10.1186\/s13677-023-00392-z","journal-title":"J. Cloud Comp."},{"issue":"3","key":"5282_CR20","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.3390\/s23031384","volume":"23","author":"S Mangalampalli","year":"2023","unstructured":"Mangalampalli, S., Karri, G.R., Elngar, A.A.: An efficient trust-aware task scheduling algorithm in cloud computing using firefly optimization. Sensors 23(3), 1384 (2023). https:\/\/doi.org\/10.3390\/s23031384","journal-title":"Sensors"},{"key":"5282_CR21","doi-asserted-by":"publisher","first-page":"100531","DOI":"10.1016\/j.measen.2022.100531","volume":"24","author":"N Sharma","year":"2022","unstructured":"Sharma, N., Sonal, Garg, P.: Ant colony-based optimization model for QoS-based task scheduling in cloud computing environment. Measure.: Sens. 24, 100531 (2022). https:\/\/doi.org\/10.1016\/j.measen.2022.100531","journal-title":"Measure.: Sens."},{"key":"5282_CR22","doi-asserted-by":"publisher","first-page":"36140","DOI":"10.1109\/ACCESS.2022.3163273","volume":"10","author":"H Mahmoud","year":"2022","unstructured":"Mahmoud, H., Thabet, M., Khafagy, M.H., Omara, F.A.: Multiobjective task scheduling in cloud environment using decision tree algorithm. IEEE Access 10, 36140\u201336151 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3163273","journal-title":"IEEE Access"},{"key":"5282_CR23","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/7873131","author":"F Shi","year":"2022","unstructured":"Shi, F., Lin, J.: Virtual machine resource allocation optimization in cloud computing based on multiobjective genetic algorithm. Comput. Intell. Neurosci. (2022). https:\/\/doi.org\/10.1155\/2022\/7873131","journal-title":"Comput. Intell. Neurosci."},{"key":"5282_CR24","doi-asserted-by":"publisher","first-page":"17803","DOI":"10.1109\/ACCESS.2022.3149955","volume":"10","author":"B Kruekaew","year":"2022","unstructured":"Kruekaew, B., Kimpan, W.: Multi-objective task scheduling optimization for load balancing in cloud computing environment using hybrid artificial bee colony algorithm with reinforcement learning. IEEE Access 10, 17803\u201317818 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3149955","journal-title":"IEEE Access"},{"issue":"9","key":"5282_CR25","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.3390\/electronics11091451","volume":"11","author":"AN Zhang","year":"2022","unstructured":"Zhang, A.N., Chu, S.C., Song, P.C., Wang, H., Pan, J.S.: Task scheduling in cloud computing environment using advanced phasmatodea population evolution algorithms. Electronics 11(9), 1451 (2022). https:\/\/doi.org\/10.3390\/electronics11091451","journal-title":"Electronics"},{"key":"5282_CR26","doi-asserted-by":"crossref","unstructured":"Kumar, R., Tripathi, R.: Secure healthcare framework using blockchain and public key cryptography.\u00a0Blockchain Cybersecurity, Trust and Privacy, 185\u2013202 (2020)","DOI":"10.1007\/978-3-030-38181-3_10"},{"key":"5282_CR27","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8113253","author":"AM Sauber","year":"2021","unstructured":"Sauber, A.M., El-Kafrawy, P.M., Shawish, A.F., Amin, M.A., Hagag, I.M.: A new secure model for data protection over cloud computing. Comput. Intell. Neurosci. (2021). https:\/\/doi.org\/10.1155\/2021\/8113253","journal-title":"Comput. Intell. Neurosci."},{"key":"5282_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.gltp.2021.01.013","author":"F Thabit","year":"2021","unstructured":"Thabit, F., Alhomdy, S., Al-Ahdal, A.H.A., Jagtap, S.: A new lightweight cryptographic algorithm for enhancing data security in cloud computing. Global Trans Proc (2021). https:\/\/doi.org\/10.1016\/j.gltp.2021.01.013","journal-title":"Global Trans Proc"},{"key":"5282_CR29","doi-asserted-by":"publisher","first-page":"63745","DOI":"10.1109\/ACCESS.2021.3075340","volume":"9","author":"H Song","year":"2021","unstructured":"Song, H., Li, J., Li, H.: A cloud secure storage mechanism based on data dispersion and encryption. IEEE Access 9, 63745\u201363751 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3075340","journal-title":"IEEE Access"},{"key":"5282_CR30","doi-asserted-by":"crossref","unstructured":"Kumar, P., Kumar, R., Garg, S., Kaur, K., Zhang, Y., Guizani, M.: A secure data dissemination scheme for IoT-based e-health systems using AI and blockchain. In: GLOBECOM 2022-2022 IEEE Global Communications Conference, pp. 1397\u20131403. IEEE, (2022)","DOI":"10.1109\/GLOBECOM48099.2022.10000801"},{"issue":"1","key":"5282_CR31","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.dcan.2023.01.014","volume":"10","author":"S Guan","year":"2024","unstructured":"Guan, S., Zhang, C., Wang, Y., Liu, W.: Hadoop-based secure storage solution for big data in cloud computing environment. Dig. Commun. Netw. 10(1), 227\u2013236 (2024). https:\/\/doi.org\/10.1016\/j.dcan.2023.01.014","journal-title":"Dig. Commun. Netw."},{"key":"5282_CR32","doi-asserted-by":"publisher","first-page":"100519","DOI":"10.1016\/j.eij.2024.100519","volume":"27","author":"S Ali","year":"2024","unstructured":"Ali, S., Wadho, S.A., Yichiet, A., Gan, M.L., Lee, C.K.: Advancing cloud security: unveiling the protective potential of homomorphic secret sharing in secure cloud computing. Egypt. Inform. J. 27, 100519 (2024). https:\/\/doi.org\/10.1016\/j.eij.2024.100519","journal-title":"Egypt. Inform. J."},{"issue":"6","key":"5282_CR33","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/MCOM.001.2200223","volume":"61","author":"Z Chen","year":"2023","unstructured":"Chen, Z., Zhengxin, Yu.: Intelligent offloading in blockchain-based mobile crowdsensing using deep reinforcement learning. IEEE Commun. Mag. 61(6), 118\u2013123 (2023)","journal-title":"IEEE Commun. Mag."},{"key":"5282_CR34","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1016\/j.future.2023.12.004","volume":"153","author":"Z Chen","year":"2024","unstructured":"Chen, Z., Zhang, J., Huang, Z., Wang, P., Zhengxin, Yu., Miao, W.: Computation offloading in blockchain-enabled MCS systems: a scalable deep reinforcement learning approach. Futur. Gener. Comput. Syst. 153, 301\u2013311 (2024)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"5282_CR35","doi-asserted-by":"publisher","first-page":"114381","DOI":"10.1109\/ACCESS.2021.3104357","volume":"9","author":"MK Dahouda","year":"2021","unstructured":"Dahouda, M.K., Joe, I.: A deep-learned embedding technique for categorical features encoding. IEEE Access 9, 114381\u2013114391 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3104357","journal-title":"IEEE Access"},{"key":"5282_CR36","doi-asserted-by":"publisher","first-page":"1097","DOI":"10.1109\/TNSRE.2023.3241241","volume":"31","author":"TD Pham","year":"2023","unstructured":"Pham, T.D.: Classification of motor-imagery tasks using a large EEG dataset by fusing classifiers learning on wavelet-scattering features. IEEE Trans. Neural Syst. Rehabil. Eng. 31, 1097\u20131107 (2023). https:\/\/doi.org\/10.1109\/TNSRE.2023.3241241","journal-title":"IEEE Trans. Neural Syst. Rehabil. Eng."},{"issue":"17","key":"5282_CR37","doi-asserted-by":"publisher","first-page":"2661","DOI":"10.3390\/math12172661","volume":"12","author":"J Lu","year":"2024","unstructured":"Lu, J., Zhu, Y., Dang, Y.: Symmetric ADMM-based federated learning with a relaxed step. Mathematics 12(17), 2661 (2024). https:\/\/doi.org\/10.3390\/math12172661","journal-title":"Mathematics"},{"key":"5282_CR38","doi-asserted-by":"crossref","unstructured":"Lazzarini R., Tianfield H., Charissis, V.: Federated Learning for IoT Intrusion Detection. AI. 4, 509\u2013530 (2023)","DOI":"10.3390\/ai4030028"},{"issue":"4","key":"5282_CR39","doi-asserted-by":"publisher","first-page":"622","DOI":"10.3390\/diagnostics13040622","volume":"13","author":"S Tummala","year":"2023","unstructured":"Tummala, S., Thadikemalla, V.S.G., Kadry, S., Sharaf, M., Rauf, H.T.: EfficientNetV2 based ensemble model for quality estimation of diabetic retinopathy images from DeepDRiD. Diagnostics 13(4), 622 (2023). https:\/\/doi.org\/10.3390\/diagnostics13040622","journal-title":"Diagnostics"},{"key":"5282_CR40","doi-asserted-by":"publisher","first-page":"105192","DOI":"10.1109\/ACCESS.2021.3100082","volume":"9","author":"X Zhang","year":"2021","unstructured":"Zhang, X., Li, L., Wang, Y., Chen, E., Shou, L.: Zeus: improving resource efficiency via workload colocation for massive kubernetes clusters. IEEE Access 9, 105192\u2013105204 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3100082","journal-title":"IEEE Access"},{"issue":"3","key":"5282_CR41","doi-asserted-by":"publisher","first-page":"651","DOI":"10.3390\/mi14030651","volume":"14","author":"S Wen","year":"2023","unstructured":"Wen, S., Han, R., Qiu, K., Ma, X., Li, Z., Deng, H., Liu, C.H.: K8sSim: a simulation tool for kubernetes schedulers and its applications in scheduling algorithm optimization. Micromachines 14(3), 651 (2023). https:\/\/doi.org\/10.3390\/mi14030651","journal-title":"Micromachines"},{"issue":"3","key":"5282_CR42","doi-asserted-by":"publisher","first-page":"203","DOI":"10.3390\/ijgi11030203","volume":"11","author":"Y Jiao","year":"2022","unstructured":"Jiao, Y., Lin, Z., Yu, L., Wu, X.: A fine-grain batching-based task allocation algorithm for spatial crowdsourcing. ISPRS Int. J. Geo-Inform. 11(3), 203 (2022). https:\/\/doi.org\/10.3390\/ijgi11030203","journal-title":"ISPRS Int. J. Geo-Inform."},{"issue":"14","key":"5282_CR43","doi-asserted-by":"publisher","first-page":"5100","DOI":"10.3390\/s22145100","volume":"22","author":"P Kang","year":"2022","unstructured":"Kang, P., Yang, W., Zheng, J.: Blockchain private file storage-sharing method based on IPFS. Sensors 22(14), 5100 (2022). https:\/\/doi.org\/10.3390\/s22145100","journal-title":"Sensors"},{"issue":"17","key":"5282_CR44","doi-asserted-by":"publisher","first-page":"2110","DOI":"10.3390\/electronics10172110","volume":"10","author":"D Ngabo","year":"2021","unstructured":"Ngabo, D., Wang, D., Iwendi, C., Anajemba, J.H., Ajao, L.A., Biamba, C.: Blockchain-based security mechanism for the medical data at fog computing architecture of internet of things. Electronics 10(17), 2110 (2021)","journal-title":"Electronics"},{"key":"5282_CR45","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3419084","author":"R Saidi","year":"2024","unstructured":"Saidi, R., Rahmany, I., Dhahri, S., Moulahi, T.: A privacy-enhanced framework for chest disease classification using federated learning and blockchain. IEEE Access (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3419084","journal-title":"IEEE Access"},{"key":"5282_CR46","unstructured":"CVC3345 Dataset link: https:\/\/data.world\/project22\/cvc3345. Accessed Oct 2024"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05282-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05282-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05282-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T21:22:52Z","timestamp":1758144172000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05282-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,30]]},"references-count":46,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["5282"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05282-4","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,8,30]]},"assertion":[{"value":"24 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The research is original and all the figures and tables are created by the authors of this manuscript.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Not applicable.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to participate"}},{"value":"All authors agree with the submission of the manuscript to this journal and possible publication afterwards.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"604"}}