Transactions on Emerging Telecommunications Technologies

Cover image for Vol. 27 Issue 2

Edited By: Mischa Dohler

Impact Factor: 1.354

ISI Journal Citation Reports © Ranking: 2013: 31/78 (Telecommunications)

Online ISSN: 2161-3915

Recently Published Issues

See all

Transactions on Emerging Telecommunications Technologies

Transactions on Emerging Telecommunications Technologies (ETT), formerly known as European Transactions on Telecommunications (ETT), has the following aims:

- To attract cutting-edge publications from leading researchers and research groups around the world

- To become a highly cited source of timely research findings in emerging fields of telecommunications - To limit revision and publication cycles to a few months and thus significantly increase attractiveness to publish

- To become the leading journal for publishing the latest developments in telecommunications

You can find out more about the new scope of the Journal by reading the new Aims and Scope


Recently Published Articles

  1. Single-state Q-learning for self-organised radio resource management in dual-hop 5G high capacity density networks

    Tao Jiang, Qiyang Zhao, David Grace, Alister G. Burr and Tim Clarke

    Article first published online: 4 FEB 2016 | DOI: 10.1002/ett.3019

    Thumbnail image of graphical abstract

    In this paper, a dual-hop wireless backhaul and small cell access network has been exploited with effective spectrum sharing to provide 1 Gb/s/km2 ultra-high capacity density for 5G ultra-dense network deployments. We develop a single-state Q-learning-based radio resource management algorithm for dynamic spectrum access creating a self-organized network. The results show that not only does the proposed algorithm completely remove the requirement for frequency planning but it also improves the convergence, Quality of Service and system capacity substantially by achieving higher link capacity on both access and backhaul networks.

  2. Identifying Android malware with system call co-occurrence matrices

    Xi Xiao, Xianni Xiao, Yong Jiang, Xuejiao Liu and Runguo Ye

    Article first published online: 3 FEB 2016 | DOI: 10.1002/ett.3016

    Thumbnail image of graphical abstract

    (1) In this paper, we track the system calls of applications under different events and employ the frequency vector and the co-occurrence matrix, which are two different feature models, to extract features from the system call sequence. (2) We apply Adaptive Regularization of Weight Vectors and other machine learning algorithms to identify Android malware based on the aforementioned two models, respectively. (3) Experiment results show that the co-occurrence matrix built on the system call sequences extracts more useful information than the plain system call frequency vector.

  3. Scalability study of backhaul capacity sensitive network selection scheme in LTE-WiFi HetNet

    Alvin Ting, David Chieng, Kae Hsiang Kwong, Ivan Andonovic and K. D. Wong

    Article first published online: 27 JAN 2016 | DOI: 10.1002/ett.3013

    Thumbnail image of graphical abstract

    A new network selection strategy that considers small cell backhaul capacity is proposed to ensure that users enjoy the best experience in terms of connection throughput and fairness. Results show that the proposed DyBaCS scheme provides the best fairness while preserving the average user throughput. DyBaCS is also highly scalable as compared with other scheme such as physical data rate (PDR) and WiFi First (WF) in scenarios with varying number of users, WiFi nodes and WiFi backhaul capacity.

  4. Duality of channel encoding and decoding - Part I: rate-1 binary convolutional codes

    Yonghui Li, Qimin You, Soung C. Liew and Branka Vucetic

    Article first published online: 20 JAN 2016 | DOI: 10.1002/ett.3018

    Thumbnail image of graphical abstract

    We revisit the Bahl-Cocke-Jelinek-Raviv soft-input soft-output maximum a posteriori probability decoding process of rate-1 binary convolutional codes. From this, we establish some interesting explicit relationships between their encoding and decoding. We observe that the Bahl-Cocke-Jelinek-Raviv maximum a posteriori probability decoders can be simply represented by their dual soft-input soft-output channel encoders using shift registers in the complex number field. With logarithm of soft symbol estimates of coded symbols as the input, the dual encoder output produces the logarithm of the soft symbol estimates of information symbols.

  5. MAC layer performance of the IEEE 802.15.7 visible light communication standard

    Parvaneh Shams, Melike Erol-Kantarci and Murat Uysal

    Article first published online: 19 JAN 2016 | DOI: 10.1002/ett.3015

    Thumbnail image of graphical abstract

    Visible light communications (VLC) uses the illumination infrastructure to provide high-speed internet access to bandwidth-hungry devices. The physical and medium access control (MAC) layers of VLC have been standardized in IEEE 802.15.7. Yet, theoretical performance bounds of the MAC layer have not been explored in detail so far. In this paper, we derive Markov-based performance bounds for the MAC layer of IEEE 802.15.7. We provide a thorough study of performance metrics including throughput, delay, power consumption, and collision probability.

SEARCH

SEARCH BY CITATION