{"title":"Blockchain Based Delay-Tolerant Resource Optimization in Fog and Cloud Layers Utilizing NNGOA and LS2BiOLSTM","authors":"Guman Singh Chauhan, Kannan Srinivasan, Rahul Jadon, Rajababu Budda, Venkata Surya Teja Gollapalli, Joseph Bamidele Awotunde","doi":"10.1002/ett.70178","DOIUrl":"https://doi.org/10.1002/ett.70178","url":null,"abstract":"<div>\u0000 \u0000 <p>Resource Optimization (RO) in fog and cloud layers enhances performance, minimizes costs, and ensures seamless integration of distributed systems. However, prevailing works failed to perform resource optimization in both fog and cloud layers due to their complex and disparate architectures. Therefore, the proposed work performs resource optimization efficiently in both fog and cloud layers by predicting the network traffic congestion using Neuron Northern Goshawk Optimization Algorithm (NNGOA) and Log Sigmoid Softplus Bidirectional Orthogonal Long Short-Term Memory (LS<sup>2</sup>BiOLSTM). At first, the Cloud Users are registered and logged in for task assignments. Meanwhile, the Smart Contract (SC) based Service Level Management (SLM) is created for tasks. After that, the signature is created for SLA and is verified during task assignment. For predicting the network traffic congestion in tasks, LS<sup>2</sup>BiOLSTM is utilized. Then, the predicted congestion tasks are clustered and mapped into a fog layer. Simultaneously, from the Cloud Server (CS), the data center is prioritized using SoftSign Bell-Fuzzy (SSB-Fuzzy). Finally, the resources are optimized efficiently with a high accuracy of 98.1259% using NNGOA, which outperforms the existing methodologies.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 6","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144140469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT-Enabled Blockchain Framework for Internet of Vehicles Safety Monitoring in Smart Cities","authors":"Amrendra Singh Yadav, Vijayant Pawar, Roshni Yadav","doi":"10.1002/ett.70169","DOIUrl":"https://doi.org/10.1002/ett.70169","url":null,"abstract":"<div>\u0000 \u0000 <p>Road accidents pose a significant concern, leading to numerous fatalities and societal disruptions. The Internet of Vehicles (IoVs), when integrated with communication technology, offers a promising solution to mitigate these accidents. However, current IoV systems face challenges such as data integrity, user privacy, centralized storage, and secure authentication. Blockchain technology emerges as a viable solution, providing tamper-proof data storage and a trustless authentication independent of central authorities. However, in blockchain-based IoV systems, the inefficiency of traditional consensus mechanisms suffers from high computational costs, network delays, and limited scalability. To address these challenges, we introduce HybridChain, an IoT-enabled blockchain framework that uses the Reputation-Based Practical Byzantine Fault Tolerance (RB-PBFT) consensus mechanism, which enhances transaction throughput, reduces consensus delay, and mitigates block congestion by incorporating a reputation-based trust model. RB-PBFT ensures that only trusted entities participate in block validation. Furthermore, HybridChain integrates a sidechain-based storage mechanism to manage the large volume of data, ensuring that only essential metadata is recorded on the main blockchain, thereby enhancing scalability and reducing network congestion. The experiment results show that the amount of data transmitted is 4.3 times more in PoW than RB-PBFT with varying vehicles, while in the case of varying block size, it is 3.1 times more in PoW than RB-PBFT.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 6","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144140471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizing Blockchain Scalability for Secure Patient Health Records With Tri-Layered Sharding Architecture (TLSA)","authors":"K. Maithili, S. Amutha","doi":"10.1002/ett.70168","DOIUrl":"https://doi.org/10.1002/ett.70168","url":null,"abstract":"<div>\u0000 \u0000 <p>Blockchain technology provides a decentralized, tamper-resistant framework for managing sensitive healthcare data, ensuring transparency, data integrity, and patient privacy. However, its adoption in real-time medical environments is hindered by significant scalability challenges, particularly in processing high volumes of transactions with low latency. Existing solutions such as Layer 2 enhancements, sidechains, and basic sharding offer partial improvements but often introduce trade-offs in security, load balancing, or system complexity. To address these limitations, we propose the Tri-Layered Sharding Architecture (TLSA). It is a novel, hierarchical model that organizes the network into three sharding layers: Transaction Layer, Data Layer, and Location Layer. This design enables parallel transaction processing, optimized data storage, and efficient node communication, resulting in improved system throughput and responsiveness. Simulation results show that TLSA achieves 4500 Transactions Per Second (TPS) with 95% security efficiency and an average latency of 12 ms. TLSA ensures scalability without compromising security and provides an efficient framework for large-scale, real-time deployment in healthcare and other data-intensive sectors.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 6","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144135550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Content-Aware Routing Algorithms in WSN for Energy-Efficient Content Delivery Through Clustering With Hybridized Optimization Aided Shortest Path Selection","authors":"Impa Bennuru Huliyappa Gowda, Shanthi Pichandi Anandaraj","doi":"10.1002/ett.70171","DOIUrl":"https://doi.org/10.1002/ett.70171","url":null,"abstract":"<div>\u0000 \u0000 <p>Wireless sensor networks (WSNs) are primarily used for transferring data and in multimedia applications in the last few years. Improving and refining the routing protocol is required to satisfy user demand in multimedia content delivery with better performance. WSN is composed of small sensing devices that are used for efficient communication. Due to the lack of resources, the handling of WSNs is regularly problematic. The most important objective of WSNs is to improve energy efficiency. The sensors consume more energy for a variety of tasks, including communication, routing, clustering, localization, on-board computations, maintenance, and so on. Nevertheless, there are three primary categories of energy consumption at the node level: radio link relationships, microprocessor evaluation, and sensing via sensing modules. The life span and resource availability of the WSN are greatly reduced by frequent communication and over-cost processing in the WSN. Hence, a content-aware routing algorithm in WSN is implemented in this work to make energy-efficient content delivery through clustering. The host-based communication challenges are solved by using an optimal path-selection-based clustering approach. Initially, clustering is employed to handle energy efficiency and lifetime in WSN. Further, the shortest path selection is done via the hybridized optimization approach, where the Hybridization of Kookaburra with Gold Rush Optimizer (HK-GRO) attains the optimal solution. The energy-efficient content-based routing is performed based on objective constraints like hop counts, link utilization, average cache size, traffic demand, accumulated link quality, energy consumption, and distance between sources to destination for improving routing performance. The efficiency of the proposed clustering-based content-aware energy-efficient routing is validated with the conventional models using some performance measures.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 6","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144118041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reconfigurable Intelligent Surfaces (RIS) and Their Role in Next-Generation Wireless Networks: An Overview","authors":"Chukwuemeka Nwufo, Oluyomi Simpson, Yichuang Sun","doi":"10.1002/ett.70164","DOIUrl":"https://doi.org/10.1002/ett.70164","url":null,"abstract":"<p>Extensive research is now peering into the next generation of wireless technology. The significant talking points are how to effectively manage scarce wireless resources with the spiraling amount of wireless data traffic and the exponential growth of the number of nodes occupying the wireless communication ecosystem. Giant performance strides are offered by promising state-of-the-art technologies, such as Massive MIMO and mm-Wave technology, in tackling this resource scarcity problem; however, their application has proven prohibitive. Given its energy-efficient and low-cost characteristics, RIS has emerged as a promising technique for the beyond 5G networks. Furthermore, when deployed in a wireless communication scenario, the passive nature also means it can reliably extend network coverage and enhance spectral efficiency and security in the physical layer. This paper presents an in-depth overview of the background of RIS, its applications, and use cases, especially concerning wireless communications. This paper also touches on the RIS application to wireless communication networks and its combination with other emergent wireless technologies such as NOMA, SWIPT, UAVs and autonomous vehicles. Finally, a comparative case study was presented in which comparisons were drawn out for RIS-aided communication and relay-aided communication, with direct communication as a benchmark.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 6","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.70164","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144100577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Han Wang, Sunantha Kannan, Sukhpal Singh Gill, Steve Uhlig
{"title":"Ainet0: AI Forecasting Based Carbon Neutral Cloud Resource Management for Net Zero Targets","authors":"Han Wang, Sunantha Kannan, Sukhpal Singh Gill, Steve Uhlig","doi":"10.1002/ett.70166","DOIUrl":"https://doi.org/10.1002/ett.70166","url":null,"abstract":"<div>\u0000 \u0000 <p>Cloud computing is increasingly integrating artificial intelligence (AI) techniques to optimize resource management and address the complex and fluctuating demands of modern cloud environments. In particular, accurate CPU usage prediction-achieved through appropriate time-series forecasting, is crucial for minimizing both over-provisioning and under-provisioning of cloud resources. High predictive accuracy not only mitigates operational inefficiencies but also aligns with net-zero emission goals by reducing unnecessary energy consumption. To address these challenges, we propose a new framework <b>AINet0</b>, which uses AI forecasting models such as neural networks and time-series models for a dynamic resource management approach. The AINet0 integrates and examines Amazon's DeepAR+ and Convolutional Neural Network-Quantile Regression (CNN-QR) within the Amazon Web Services environment, aiming to enhance energy efficiency and sustainability to enable carbon-neutral cloud services. We evaluated the AINet0 framework using a real testbed, CloudAIBus, and compared its performance against established baselines. The experimental results demonstrate that the AINet0 enhances forecasting accuracy, achieving lower metrics such as Mean Absolute Percentage Error (MAPE), allowing for more precise resource allocation. Furthermore, performance evaluation conducted on the Grid Workload Archive-T-12 dataset shows that the proposed models outperform traditional methods, enabling more sustainable and cost-effective operations that further support net-zero emissions objectives.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 6","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144108939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid PSO-GA Optimization Method for Relay Node Placement and Connection Point Detection in IoT Applications","authors":"Hassan Daryanavard, Javad Dogani","doi":"10.1002/ett.70144","DOIUrl":"https://doi.org/10.1002/ett.70144","url":null,"abstract":"<div>\u0000 \u0000 <p>With its enormous growth, the Internet of Things (IoT) expands its applicability by developing the living environment by introducing the smart home paradigm. Numerous wireless technologies are being investigated to support the rising interconnectedness of digital devices. Stability, lower cost, and reliable connections have made WiFi networks a dominant reliable connection mechanism in IoT in which one or more access points are installed to provide internet connectivity. Since the distance between IoT sensor nodes and the AP may exceed the communication range of nodes, relay nodes are placed in the network to reduce the connection distance. The problem of relay node placement in IoT to minimize the number of relay nodes is an NP-hard problem. Once the relay nodes have been placed, the connection point detection (CPD) problem plays a significant role in determining the quality of the network. CPD identifies which relay or access point each sensor node is connected to within its communication range. This study employs particle swarm optimization (PSO) for the relay node placement problem. In each PSO algorithm iteration, the genetic algorithm (GA) is used to solve the CPD problem to evaluate each particle. Our study is the first to take into account CPD in addition to the problem of relay node placement. It aims to minimize the number of relay nodes first and reduce the distance between sensor nodes to their associated relay nodes. Several experimental scenarios have been implemented to simulate the smart environment in IoT. The results indicate that the proposed method reduces the number of relay nodes by up to three and the average connection distance by up to 36% in comparison to other baseline approaches and a previous study.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 6","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144100576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Intelligent Approach for Cloud Infrastructure With Improved Multi-Objective Graywolf Optimization and Resource Allocation for Dynamic Virtual Machine Placement","authors":"S. Shankar, M. Anbarasan","doi":"10.1002/ett.70172","DOIUrl":"https://doi.org/10.1002/ett.70172","url":null,"abstract":"<div>\u0000 \u0000 <p>Cloud infrastructure plays a pivotal role in modern computing, yet its optimization and resource allocation often lead to significant delays and power inefficiencies. This research presents an Intelligent Approach for Cloud Infrastructure utilizing Improved multi-objective gray Wolf Optimization and resource allocation for Dynamic Virtual Machine Placement (ICIMRAD). By mimicking the hierarchical structure and hunting strategies of Gray wolves, the Improved Multi-objective Gray Wolf Optimization (IMGWO) algorithm, combined with Genetic Algorithms, effectively enhances the accuracy of virtual machine placement and resource allocation. The Fuzzy Group Genetic Algorithm (FGGA) also addresses complex scheduling challenges, facilitating efficient decision-making across multiple objectives. The dynamic virtual machine system model operates within a Xen environment to monitor power consumption without affecting guest operating systems. Through extensive simulations, the proposed ICIMRAD approach significantly improves metrics such as power consumption, achieving reductions to 0.58 kWh for 50 VMs, and enhances overall system performance compared to traditional optimization methods (e.g., SHOANN, CRASVM, MOOERA). The underlying philosophy emphasizes a powerful synergy between evolutionary strategies and fuzzy logic to drive sustainable and efficient cloud resource management.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 6","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144100770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Antenna Selection in MIMO–NOMA Systems: A New Approach for Physical Layer Security Enhancement","authors":"Ehsan Alemzadeh, Amirmasoud Rabiei","doi":"10.1002/ett.70161","DOIUrl":"https://doi.org/10.1002/ett.70161","url":null,"abstract":"<div>\u0000 \u0000 <p>Non-Orthogonal Multiple Access (NOMA) is known as a promising technology for next-generation wireless communication networks. In this paper, three low-complexity antenna selection schemes are proposed that aim to enhance the physical layer security (PLS) of a multiple-input multiple-output (MIMO) NOMA system. The system is composed of a single transmitter, multiple legitimate users, and one eavesdropper, all equipped with multiple antennas. The first scheme maximizes the secrecy sum-rate (SSR) of the system when the eavesdropper's channel state information (CSI) is known, whereas the second scheme maximizes SSR in the absence of CSI. In the third scheme, the emphasis shifts towards fairness, aiming to maximize the minimum secrecy rate across all users. Numerical results demonstrate that the performance of the first two proposed schemes is very close to that of the optimal case, albeit with much lower computational complexity. It is also observed that the third scheme enhances fairness by balancing users' secrecy rates, though with a moderate decrease in the overall secrecy sum-rate.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 6","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144100794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manzoor Ahmed, Fang Xu, Yuanlin Lyu, Aized Amin Soofi, Yongxiao Li, Feroz Khan, Wali Ullah Khan, Muhammad Sheraz, Teong Chee Chuah, Min Deng
{"title":"RIS-Driven Resource Allocation Strategies for Diverse Network Environments: A Comprehensive Review","authors":"Manzoor Ahmed, Fang Xu, Yuanlin Lyu, Aized Amin Soofi, Yongxiao Li, Feroz Khan, Wali Ullah Khan, Muhammad Sheraz, Teong Chee Chuah, Min Deng","doi":"10.1002/ett.70160","DOIUrl":"https://doi.org/10.1002/ett.70160","url":null,"abstract":"<div>\u0000 \u0000 <p>This comprehensive survey examines how reconfigurable intelligent surfaces (RIS) revolutionize resource allocation in various network frameworks. It begins by establishing a theoretical foundation with an overview of RIS technologies, including passive RIS, active RIS, and simultaneously transmitting and reflecting RIS (STAR-RIS). The core of the survey focuses on RIS's role in optimizing resource allocation within single-input multiple-output (SIMO), multiple-input single-output (MISO), and multiple-input multiple-output (MIMO) systems. It further explores RIS integration in complex network environments, such as heterogeneous wireless networks (HetNets) and non-orthogonal multiple access (NOMA) frameworks. Additionally, the survey investigates RIS applications in advanced communication domains like terahertz (THz) networks, vehicular communication (VC), and unmanned aerial vehicle (UAV) communications, highlighting the synergy between RIS and artificial intelligence (AI) for enhanced network efficiency. Summary tables provide comparative insights into various schemes. The survey concludes with lessons learned, future research directions, and challenges, emphasizing critical open issues.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 6","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144100793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}