Loading…
Loading…
Generalized PVO‐based dynamic block reversible data hiding for secure transmission using firefly algorithm
Abbasi, Rashid, Faseeh Qureshi, Nawab Muhammad, Hassan, Haseeb, Saba, Tanzila, Rehman, Amjad, Luo, Bin, Bashir, Ali Kashif
Published in Transactions on emerging telecommunications technologies (01.03.2022)
Published in Transactions on emerging telecommunications technologies (01.03.2022)
Get full text
Journal Article
Loading…
Loading…
Loading…
Loading…
Loading…
Loading…
Cooperative NOMA with full‐duplex amplify‐and‐forward relaying
Abbasi, Omid, Ebrahimi, Afshin
Published in Transactions on emerging telecommunications technologies (01.07.2018)
Published in Transactions on emerging telecommunications technologies (01.07.2018)
Get full text
Journal Article
Loading…
Loading…
GIJA:Enhanced geyser‐inspired Jaya algorithm for task scheduling optimization in cloud computing
Abualigah, Laith, Hussein, Ahmad MohdAziz, Almomani, Mohammad H., Zitar, Raed Abu, Daoud, Mohammad Sh, Migdady, Hazem, Alzahrani, Ahmed Ibrahim, Alwadain, Ayed
Published in Transactions on emerging telecommunications technologies (01.07.2024)
Published in Transactions on emerging telecommunications technologies (01.07.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
Performance analysis of Beaulieu‐Xie fading channel with MRC diversity reception
Kaur, Manpreet, Yadav, Rajesh Kumar
Published in Transactions on emerging telecommunications technologies (01.07.2020)
Published in Transactions on emerging telecommunications technologies (01.07.2020)
Get full text
Journal Article
Loading…
Loading…
Hybrid‐360: An adaptive bitrate algorithm for tile‐based 360 video streaming
Yang, Shujie, Hu, Jialu, Jiang, Ke, Xiao, Han, Wang, Mu
Published in Transactions on emerging telecommunications technologies (01.04.2022)
Published in Transactions on emerging telecommunications technologies (01.04.2022)
Get full text
Journal Article
Loading…
TamForen: A tamper‐proof cloud forensic framework
Ye, Fei, Zheng, Yunzhi, Fu, Xiao, Luo, Bin, Du, Xiaojiang, Guizani, Mohsen
Published in Transactions on emerging telecommunications technologies (01.04.2022)
Published in Transactions on emerging telecommunications technologies (01.04.2022)
Get full text
Journal Article
Loading…
Loading…
Challenges in human centric intelligent systems for wireless sensor networks: A state of art
Alferaidi, Ali, Yadav, Kusum, Alharbi, Yasser, Alshudukhi, Jalawi Sulaiman, Alreshidi, Abdulrahman, Alreshidi, Eissa Jaber, Kachout, Mnaouer, Sharif, Md Haidar
Published in Transactions on emerging telecommunications technologies (01.04.2024)
Published in Transactions on emerging telecommunications technologies (01.04.2024)
Get full text
Journal Article
Loading…
Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review
Verma, Priyanka, Bharot, Nitesh, Breslin, John G., Sharma, Mukta, Chaurasia, Nisha, Vidyarthi, Ankit
Published in Transactions on emerging telecommunications technologies (01.04.2024)
Published in Transactions on emerging telecommunications technologies (01.04.2024)
Get full text
Journal Article
Loading…
zkChain: A privacy‐preserving model based on zk‐SNARKs and hash chain for efficient transfer of assets
Huang, Jiahui, Huang, Teng, Wei, Huanchun, Zhang, Jiehua, Yan, Hongyang, Wong, Duncan S., Hu, Haibo
Published in Transactions on emerging telecommunications technologies (01.04.2024)
Published in Transactions on emerging telecommunications technologies (01.04.2024)
Get full text
Journal Article