


default search action
Transactions on Emerging Telecommunications Technologies, Volume 36
Volume 36, Number 1, January 2025
Research Article
- K. Vijaipriya
, M. Nesasudha, Prawin Angel Michael:
Joint Power and Delay Optimization-Based Resource Allocation in Mu-MIMO-OFDM System: Deep Convolutional Red Piranha Pyramid-Dilated Neural Network.
Survey Article
- Absalom E. Ezugwu
, Olutosin Taiwo, Ojonukpe S. Egwuche, Laith Abualigah
, Annette Van Der Merwe
, Jayanta Pal, Apu Kumar Saha, Ahmed Ibrahim Alzahrani, Fahad Alblehai
, Japie Greeff, Micheal Olusoji Olusanya:
Smart Homes of the Future.
Research Article
- Kavitha Dhanushkodi
, Kiruthika Venkataramani, Naghul Pranav K. R
, Ravikumar Sethuraman
:
BGHO-E2EB Model: Enhancing IoT Security With Gaussian Artificial Hummingbird Optimization and Blockchain Technology. - Abdul Mazid
, Sheeraz Kirmani, Manaullah, Mohit Yadav
:
FL-IDPP: A Federated Learning Based Intrusion Detection Approach With Privacy Preservation. - V. Rahul Chiranjeevi
, D. Malathi:
Innovative Video Anomaly Detection: TCN-AnoDetect With Self-Supervised Feature Learning. - M. Deivakani:
Anomaly Detection in IoT Network Traffic Using Bidirectional 3D Quasi-Recurrent Neural Network Optimize With Coati Optimization Algorithm. - Lingling Zhang, Yuan Zhang
:
Deep Reinforcement Learning Based Subcarrier Allocation With End-To-End Implicit CSI Acquisition in Multiuser OFDM Systems. - Adepu Vijaya, Viriyala Satya Surya Narayana Srinivasa Baba:
Design of Nonstandard Waveguide Slot Array Antenna for High-Power Applications. - Kalicharan Sahu
, Manoj Kumar Singh
, Maheshwari Niranjan, Pratibha Joshi
:
HACDRAN: A Novel Hybrid Atrous Convolution Model With Densenet and Residual Attenuation Network for Multi-Plant Leaf Disease Classification. - Samparna Parida
, Pawan Kumar, Santos Kumar Das:
Performance of SWIPT-Assisted CNOMA System With P-CSI User Selection Under Nakagami-m Fading. - K. Ravikumar, M. Mathivanan, A. Muruganandham, L. Raja:
Attentive Dual Residual Generative Adversarial Network for Energy-Aware Routing Through Golden Search Optimization Algorithm in Wireless Sensor Network Utilizing Cluster Head Selection. - Huahong Ma, Jingyun You, Honghai Wu, Ling Xing, Xiaohui Zhang:
A Probabilistic Routing Algorithm Based on CNN and Q-Learning for Vehicular Edge Network. - Meet Kumari
:
Modeling of Multi Hermite-Gaussian MDM Based Passive Star ITU G.989.x Standardardized PON System. - Jasleen Kaur
, Rinkle Rani, Nidhi Kalra:
Healthcare Data Security and Privacy Protection Framework Based on Dual Channel Blockchain. - G. Johncy
, R. S. Shaji, T. M. Angelin Monisha Sharean, U. Hubert:
Enhancing Smart Grid Security Using BLS Privacy Blockchain With Siamese Bi-LSTM for Electricity Theft Detection. - Harikrushna Gantayat, Trilochan Panigrahi, Pradyumna Patra:
An efficient RBF-DCNN based DOA estimation in multipath and impulse noise wireless environment. - Keerthana Sathiamoorthy
, Indumathi Ganesan:
Exploring Illumination and Communication: A Comprehensive Analysis of LED Lighting in Modern Interior Architectural Designs, Enhanced by Weighted Sum Model and Cluster Analysis for Informed Lighting Selection.
Volume 36, Number 2, February 2025
Research Article
- Danassou Karunkuzhali
, S. Pradeep
, Akey Sungheetha
, T. S. Ghouse Basha
:
Data-Aggregation-Aware Energy-Efficient in Wireless Sensor Networks Using Multi-Stream General Adversarial Network. - Monika Dandotiya
, Rajni Ranjan Singh Makwana
:
Secured DDoS Attack Detection in SDN Using TS-RBDM With MDPP-Streebog Based User Authentication. - Khaled M. Matrouk
, Punithavathi Rasappan
, Priyanka Bhutani, Shikha Mittal
, A. Sahaya Anselin Nisha
, Reddy Madhavi Konduru
:
Development of Heuristic Strategy With Hybrid Encryption for Energy Efficient and Secure Data Storage Scheme in Blockchain-Based Mobile Edge Computing. - Malak Abid Ali Khan
, Senlin Luo, Hongbin Ma, Amjad Iqbal:
LoRa Meets Artificial Intelligence to Optimize Indoor Networks for Static EDs. - Jiawen Qiao
, Na Wang, Junsong Fu, Lunzhi Deng
, Jingjing Wang, Jianwei Liu:
A Lightweight CP-ABE Scheme for EHR Over Cloud Based on Blockchain and Secure Multi-Party Computation. - Shikhar Bhardwaj
, Sandeep Harit, Shilpa Verma:
There is Mathematics for That!: A Formal Verification of Privacy and Simulative Analysis of Consumer-Centric Content Delivery in Iot. - Sara El Mattar
, Abdennaceur Baghdad
:
Beyond Traditional RFID: Unveiling the Potential of Wi-Fi, 5G, Bluetooth, and Zigbee for Backscatter Systems. - Rahul Singh, Laxminarayan Das
, Dharminder Chaudhary
:
Blockchain Empowered Quantum Safe Batch Aggregate Signature Algorithm for Authenticated Data Trading in Internet of Vehicles. - Mohanarangan Veerappermal Devarajan
, Akhil Raj Gaius Yallamelli, Rama Krishna Mani Kanta Yalla, Vijaykumar Mamidala, Thirusubramanian Ganesan, Aceng Sambas:
An Enhanced IOMT and Blockchain-Based Heart Disease Monitoring System Using BS-THA and OA-CNN. - He Zhu, Huihui Wu
, Yulong Shen, Xiaohong Jiang:
Optimal Beamforming for Covert Communication in MIMO Relay Systems.
Survey Article
- Supongmen Walling
, Sibesh Lodh:
An Extensive Review of Machine Learning and Deep Learning Techniques on Network Intrusion Detection for IoT.
Research Article
- Junzhe Li
, Rong Wang
, Yuan Huo, Wen Tian:
Distributed Cooperative Spectrum Optimization Method Based on Coalition Formation Game for Ocean and Traffic Iot. - Jamal Amadid
, Asma Khabba, Zakaria El Ouadi, Abdelouhab Zeroual:
Channel Estimation Based Intelligent Reflecting Surfaces for Massive MIMO System Considering Spatially Correlated Channels. - Bharathi S
, P. Durgadevi:
A Novel Approach to Driver Negligence Detection: EAXB-EVS Algorithm With IoT Integration. - Geetanjali Rathee, Chaker Abdelaziz Kerrache
, Anissa Cheriguene:
A Secure and Efficient Framework for Intelligent Transportation: Leveraging ISDF and Augmented Iot Algorithms. - Sunil Kumar Shah
, Raghavendra Sharma
, Neeraj Shukla:
Adaptive Entropy Lightweight Encryption Estimate for Software Defined Network to Mitigate Data Security Threats in Smart Cities. - Suganya Rangasamy, L. R. Sujithra, Ramesh Kumar Ayyasamy
, Ponnusamy Chinnasamy
:
Wireless mmWave Communication in 5G Network Slicing With Routing Model Based on IoT and Deep Learning Model.
Survey Article
- Xujun Tong, Marzieh Hamzei, Nima Jafari:
Towards Secure and Efficient Data Aggregation in Blockchain-Driven IoT Environments: A Comprehensive and Systematic Study.
Research Article
- R. Mahesh Muthulakshmi
, T. P. Anithaashri:
An Optimized Dual Generative Hyperbolic Graph Adversarial Network With Multi-Factor Random Permutation Pseudo Algorithm Based Encryption for Secured Industrial Healthcare Data Transferring. - R. Vijay Anand, I. Alagiri, P. Jayalakshmi, Madala Guru Brahmam
, Azween Bin Abdullah:
Lattice Homomorphic Assisted Privacy Preserving Electronic Health Records Data Transmission in Internet of Medical Things Using Blockchain.
Erratum
- Correction to "Energy Efficient Resource Allocation in Cache-Enabled Fog Networks".
Volume 36, Number 3, March 2025
Research Article
- M. Shwetha
, Krishnaveni Sannathammegowda
:
Optimizing Energy Efficient Routing Protocol Performance in Underwater Wireless Sensor Networks With Machine Learning Algorithms. - P. J. Sathish Kumar
, B. R. Tapas Bapu, S. Sridhar, V. Nagaraju:
An Efficient Cyber Security Attack Detection With Encryption Using Capsule Convolutional Polymorphic Graph Attention.
Survey Article
- Duraisamy Rekha
, L. Pavithra:
TSCH in Edge IoT: A Comprehensive Survey of Research Challenges.
Research Article
- V. Rajesh Kumar, P. Aruna Jeyanthy:
Fault Classification and Detection in Transmission Lines by Hybrid Algorithm Associated Support Vector Machine. - Esakki Muthu Santhanam
, Kartheeban Kamatchi:
Enhancing Agricultural Supply Chain Management With Blockchain Technology and DSA-TabNet: A PBFT-Driven Approach. - Xiaoyan Lu, Zhibin Xie
, Peiyu Yan:
Energy-Efficient Long Range Repair Connectivity Policy for Maritime Wireless Sensor Networks. - Sumit Singh Dhanda
, Vinod Kumar
, Sachin Kumar Gupta
, Deepak Panwar
, Pardeep Singh
:
A Comparison of 163-Bit Hybrid Karatsuba Multiplier and Word-Serial Multipliers for ECC Processors. - Jundale Poonam Abasaheb, Sujata V. Mallapur
:
Blockchain-Integrated Secure Healthcare Information Sharing via Advanced Blowfish Encryption Standard With Optimal Key Generation. - J. Poongodi
, Kavitha K
, S. Sathish
, R. Lakshmana Kumar
:
Hybrid AI-Driven Bio-Inspired Wearable Sensors With Aquasense AI Technology for Multimodal Health Monitoring and Rehabilitation in Dynamic Environments. - Dipesh Ramulal Agrawal, Farha Haneef
:
Eye Blinking Feature Processing Using Convolutional Generative Adversarial Network for Deep Fake Video Detection. - Aravind Karrothu
, G. V. Sriramakrishnan, V. Ragavi:
Gazelle-Dingo Optimization and Ensemble Classification: A Hybrid Approach for Intrusion Detection in Fog Computing.
Survey Article
- Anita Thakur
, Virender Ranga
, Ritu Agarwal:
Exploring the Transformative Impact of Blockchain Technology on Healthcare: Security, Challenges, Benefits, and Future Outlook.
Research Article
- Farhana Ajaz, Mohd Naseem, Janjhyam Venkata Naga Ramesh, Mohammad Shabaz
, Gulfam Ahamad:
Cluster Based Lion Optimization Routing Protocol for Internet of Vehicles (CLORP). - Fulai Liu
, Huiyang Shi, Ruiyan Du:
CNN-Based Local Quantized Hybrid Precoding for Low Complexity and Overhead. - Sumit Singh Dhanda
, Brahmjit Singh
, Poonam Jindal
, Vinod Kumar
, Sachin Kumar Gupta
:
AES-8: A Lightweight AES for Resource-Constrained IoT Devices. - Megha Santhosh Kumar
, Ramanathan Ramachandran
:
A Multiscale Principal Component Analysis Approach to Physical Layer Secret Key Generation in Indoor Environments. - Lakshmi Priya Isanaka
, Meenakshi Murugappa:
Feasibility Analysis for Deployment of Free Space Optical Links in Urban Coastal Environments. - Alka Prasad Sawlikar, Devashri Shrikant Raich, Bireshwar Swapan Ganguly, Lowlesh Nandkishor Yadav:
An Enhanced Encryption Scheme for IoT-Based Wireless Sensor Network Using DNA Enclosed Fully Homomorphic Approach. - K. P. Keerthana, K. Kalirajan:
An Effective Approach for Spectral Efficiency Improvement in Massive MIMO Network Using Hybridized Optimization Assisted Optimal Pilot-Based Vector Perturbation Precoding. - Ayat M. Alrjoob, Ahmad A. Ababnah, Mamoun F. Al-Mistarihi
:
Secure 5G Coordinating Spectrum Sharing System With Cooperation Transmitter and Receiver Pairs. - Chenfei Xie
, Songjie Yang
, Zhongpei Zhang
:
Channel Estimation for Reconfigurable Intelligent Surface-Assisted Cell-Free Communications. - Rohit Beniwal
, Vinod Kumar
, Vishal Sharma
:
A Multi-cluster Security Framework for Healthcare IoT: The Synergy of Redundant Byzantine Fault Tolerance with Extensions and Coati-Based Network. - Mir Aman Sheheryar, Sparsh Sharma:
Ensemble Feature Engineering and Deep Learning for Botnet Attacks Detection in the Internet of Things. - Karthikeyan R., Saleem Raja Abdul Samad, V. Balamurugan, Sundaravadivazhagan Balasubaramanian, Robin Cyriac
:
Workload Prediction in Cloud Data Centers Using Complex-Valued Spatio-Temporal Graph Convolutional Neural Network Optimized With Gazelle Optimization Algorithm.
Survey Article
- Juan Contreras-Castillo
, Sherali Zeadally
, Juan Antonio Guerrero Ibáñez, Pedro C. Santana-Mancilla
, Iyad A. Katib
:
Enabling Safe Co-Existence of Connected/Autonomous Cars and Road Users Using Machine Learning and Deep Learning Algorithms.
Research Article
- Yufeng Jia
, Jiadong Ren, Haitao He, Xianshan Li, Pengwei Zhang, Rong Li:
Reducing Latency in SDN: An Innovative Closed-Loop Migration Collaboration Architecture. - Yan Zou, Q. Cao, Habibeh Nazif
:
A New Energy-Aware Technique for Designing Resource Management System in the 5G-Enabled Internet of Things Based on Kohonen's Self-Organizing Neural Network. - Geetha Sarojini Karuppusamy, Manoj Kumar S:
TwoFish-Integrated Blockchain for Secure and Optimized Healthcare Data Processing in IoT-Edge-Cloud System.
Volume 36, Number 4, April 2025
Research Article
- Haewon Byeon, Mohammed E. Seno, Ajeet Kumar Srivastava, Azzah AlGhamdi, Ismail Keshta, Mukesh Soni, K. D. V. Prasad, Dilora Abdurakhimova, Mohammed Wasim Bhatt
:
Trust Management Scheme for Securing Vehicular Ad Hoc Networks Against Malicious Nodes and False Message Anomaly. - Ganesha H. S
, Rinki Gupta, Sindhu Hak Gupta:
Energy Efficient LoRa-Based AIoT Setup for Human Movement Classification.
Survey Article
- Geeta Sharma
, Sanjeev Jain
:
Flight Evolution: Decoding Autonomous UAV Navigation - Fundamentals, Taxonomy, and Challenges.
Research Article
- Nagarjuna Reddy Seelam, Chandra Sekhar Kolli
, Mohan Kumar Chandol
, R. Ravi Kumar, Ravi Kumar Balleda, Masthan Siva Krishna Munaga:
HHFHNet: Hybrid Deep Learning Network for Course Recommendation Using H-Matrix. - Ravi Gugulothu, Suneetha Bulla, Vijaya Saradhi Thommandru:
WS-DOA: Design of Hybrid Heuristic Algorithm for Deriving Multi-Objective Function of Optimal Task Scheduling and VM Migration Over Cloud Sector. - Ruixia Li, Chia Sien Lim, Muhammad Ehsan Rana, Xiancun Zhou, Jinhong Zhang
:
A Nash Bargaining Cooperative Game Policy in Mobile Edge Computing. - P. M. Sithar Selvam
, S. Shabana Begum, Yogesh Pingle
, Santhosh Srinivasan
:
Optimized Self-Guided Quantum Generative Adversarial Network Based Scheduling Framework for Efficient Resource Utilization in Cloud Computing to Enhance Performance and Reliability. - Sridhar Iyer
:
Performance Analysis of Dynamic Resource Assignment Technique for 6G Wireless Networks.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.