Publication Frequency: Quarterly
Explore the latest research and advancements in digital transformation technologies in our current issue. Stay updated with cutting-edge articles on AI, blockchain, cybersecurity, and more.
S.No. | Article Title and Author(s) Name | Download |
---|---|---|
1 | Student Success Prediction in Higher Education Through Machine Learning Authors : Rasumalla Akhila, Anugu Pavani | Download Article |
2 | Cross-Project Software Fault Prediction Addressing Class Imbalance and Generalization Authors : Taduka Sowmya, Dr. B. Anvesh Kumar | Download Article |
3 | Forward-Secure Attribute-Based Searchable Encryption Scheme for IoT Cloud Systems Authors : Sama Kouser, Mr. S. Sateesh Reddy | Download Article |
4 | Machine Learning Ensembles for Accurate Detection of Credit Card Transaction Fraud Authors : Modhumpally Likhitha, Dr. K. Sridhar Reddy | Download Article |
5 | Real-Time Detection of Wastewater Pollution Using Natural Language Generation and Cost-Effective Sensors Authors : VSR Krishna, K. Hemanth Singh, S. Sai Nikhitha, K. Kowsalya, Ch. Manikant Sai | Download Article |
6 | WaterNet: A Cutting-Edge Network for Monitoring Water Quality to Ensure Safe Drinking and Irrigation Practices Authors : K. Raghuvardhan, K. Yuvaranjani, M. Charitha Sri, M. Shyam Nikhil, K. Jitendra | Download Article |
7 | Human Resource Management Practices and Their Impact on Employee Turnover in the Hotel Industry Authors : Mr. V. Suresh, Chunchu Bhavana, Macharla Spandana, Nagulavancha Sravani Sri, Shaik Muntaj | Download Article |
8 | Human Resource Management's Contribution to NGO Development Authors : Mr. G. Narendra Babu, Dakoju Satyavani, Gaddam Muthyalarao, Kasagani Sandhya, Mareedu Durgabhavani | Download Article |
9 | Hybrid CNN-RF and CNN-XGBoost Framework for Real-Time Forest Fire Detection Authors : N. Sudha Rani, V. Gayathri, G. Vara Prasad, P. Hema Sri, D. Narendar | Download Article |
10 | AI-Driven Inappropriate Content Detection and Classification in YouTube Videos Using Deep Learning Authors : B. Srinivasa Rao, K. Navya, D. Laxmi Naga Sreya, B. Swathi, S. Prem Kumar | Download Article |
11 | Intelligent Motorcycle Safety System Authors : Mrs. V. Rani, G. Shivani, T. Sai Vignesh, K. Pujitha, P. Sai Kowshik | Download Article |
12 | Cyber-Physical Systems Risk Assessment via Knowledge-Based Cybersecurity Automation Authors : Pallerla Vivek, Gantyala Aruna | Download Article |
13 | Behavior-Based Segmentation of Online Shoppers Using LRFS Model Authors : Porandla Ramya, Rachoori Sagar | Download Article |
14 | Email Navigation Analysis for Detecting and Tracing Criminal Activities Authors : Nelli Ravalika, Anugu Pavani | Download Article |
15 | DCNN-Based Framework for Detecting Object-Level Forgeries in High-Resolution Video Authors : Chinthala Sindhuja, Dr. E. Srikanth Reddy | Download Article |
16 | Information-Seeking Driven Classification of Online Users Using ML Approaches Authors : Hajra Nafees, Dr. M. Srinivas | Download Article |
17 | IoT Enabled Smart Shoes for Blind People Authors : Mr. M. Sundararao, M. Sai Eswar, Ch. Bagya Lakshmi, Ch. Rashmitha, M. Srihari | Download Article |
18 | Enhancing In-Hospital Mortality Prediction With Personalized Federated Learning Across Multi-Center ICUs Authors : Jaya Krishna, K. Akankshitha, J. Sasi Kiran, R. Thanuja, D. Pujin Shankar | Download Article |
19 | AI-Enhanced Threat Identification for Cybersecurity in Financial Institutions Using Machine Learning Models Authors : V. Lalitha, B. Sahithi, B. H. S. Nagi Reddy, J. Suresh, A. Dhanush | Download Article |
20 | A Novel Approach to Student Profile Identification in Online Judge Systems Using Explainable AI Authors : S. Suneel Kumar, B. Gayathri, U. Bhavana Sadvika, K. Hema Likhitha, A. Srikanth | Download Article |
21 | The Role of Promotional Activities in Communicating Marketing Strategies Authors : Dr. D. N. V. Krishna Reddy, Marvathu Sai Likhith, Nanankala Dheeraj, Peruka Srinath, Thaticherla Saikiran | Download Article |
22 | Employee Performance Is Enhanced by Effective Training Authors : Mrs. T. Nagalakshmi, Merugu Naveena, Paramkusham Sri Vrushank, Shaik Nazma, Seemakurthi Sai Kumar | Download Article |
23 | Fusion-Based CNN Model for Malicious Website Detection Using Multi-Modal Data Authors : Kamtam Durga Jyothirmai, Dr. T. Ravi Kumar | Download Article |
24 | Efficient Detection of IoT Botnet Attacks Using a Hybrid ML Model Authors : Khuteja Nazlee, Mrs. Y. Susheela | Download Article |
25 | Fusion of Textual and Visual Cues for Cyberbullying Detection in Social Networks Authors : Mamunuri Saichnadana, Dr. N. Chandramouli | Download Article |
26 | Enhanced Human Activity Recognition for Security Surveillance Using Deep Neural Networks Authors : Padala Deekshana, Saritha Palle | Download Article |
27 | K-Nearest Neighbour Search Using Random Projection Forests Authors : Adepu Sai Nikhitha, Dr. P. Venkateshwarlu | Download Article |
28 | Sentiment Analysis in Naturalistic Audio Using Automation Authors : Agurla Poojitha, Dr. E. Srikanth Reddy | Download Article |
29 | Smart Timetable Display for Students’ Subject Allocation in Classroom Using IoT Authors : Mr. V. B. Gopala Krishna, B. A. Anitha Pavani, J. Gnyana Sandhya, V. Srinivasa Rao, G. Gopi Chandu | Download Article |
30 | Autonomous Fire Extinguishing Robot Using Arduino Authors : Mr. M. Vara Prasad, K. Jyothsna, R. Sravani, P. Chandra Sekhar, G. Leela Sai Mukesh | Download Article |
31 | Two-Stage Approach to Job Title Classification in Online Job Advertisements for Enhanced Accuracy Authors : T. Veeranna, S. D. Rumana Tahreen, M. Sumyka, M. Venu Saketh, M. Sai Kiran | Download Article |
32 | Applying Deep Neural Networks for Multiclass Diagnosis of Retinal Diseases With Eye Deep-Net Authors : Sk. Yakoob, M. Murali Krishna, K. Deepthi, S. Prasanthi, Sk. Aman | Download Article |
33 | Early Cardiac Arrest Detection for Neonates in the ICU Using Statistical and Machine Learning Models Authors : J. Rajakala, J. Jahnavi, G. Bhavana Sri, K. Ravi Kumar, M. V. Sai Durga Nithin | Download Article |
34 | A Hybrid Deep Learning Approach for Glaucoma Detection Authors : Mrs. V. Divya Raj, P. Keerthy, L. Amrutha, T. Nishitha, V. Meghana | Download Article |
35 | Cloud Security Reinforcement Detecting and Mitigating Privilege Escalation With Machine Learning Authors : Chinthala Sowmya, Dr. Mohammad Sirajuddin | Download Article |
36 | Deep Diabetic An Identification System Of Diabetic Eye Diseases Using Deep Neural Networks Authors : Soma Sindhuja, Dr. Ravikumar Thallapalli | Download Article |
37 | Supervised Spam Text Detection for Social Web of Things Authors : Muchakurti Soumya, K. Nagendra Prasad | Download Article |
38 | Identifying Web Attack Vulnerabilities Focus on MITM and Session Hijacking Authors : Muthyapu Ravali, Sateesh Reddy Singireddy | Download Article |
39 | Modeling, Design, And Simulation Of Pmsg-Based Wind Energy Conversion Systems Authors : Madupalli Dharani, Mr. S. Praveen, Dr. K. Chandramouli | Download Article |
40 | ML-Based Correlation and Mitigation of Cyberattacks in Power Distribution Systems Authors : Paidipelly Sahasra, Solleti Tejashwini | Download Article |
41 | Self-Balancing Electric One-Wheeler Authors : Mrs. M. Prathima, V. Anusha, T. Gowthami, M. Ruchitha, A. Rama Krishna | Download Article |
42 | Multi-Port Charger For Light Evs With Dual Function For Domestic Appliance Powering Authors : Mamidi Sridhar, Dr. K. Chandramouli | Download Article |
Emerging Trends in Digital TransformationÂ
Published by: D3 PublishersÂ
#3-6-7, 2nd Floor, Near Metro Station, Opp: Dmart,
LB Nagar, Hyderabad, Telangana – 500074, India
Phone: +91 9030161092
Email: [email protected], [email protected]
![]() |
Copyright© 2025 – Emerging Trends in Digital Transformation.
This work is licensed under a
Creative Commons Attribution-NonCommercial 4.0 International License.
|
Welcome to ETDT Journal – Emerging Trends in Digital Transformation. By joining as a reviewer, you agree to the following terms:
1. Reviewer Commitment
It is mandatory for every reviewer to either publish or give reference to publish at least one article per issue. As ETDT is a quarterly journal, reviewers must ensure a minimum of 4 articles are published each year.
2. Content Usage
All content on this site is protected by copyright. You may not reproduce or reuse any content without prior written permission, except for academic citation with proper credit.
3. User Submissions
By submitting articles or materials, you grant ETDT Journal the right to publish and distribute your content. You are responsible for ensuring the originality and legality of all submissions.
4. Website Usage
5. Disclaimer
ETDT Journal does not guarantee uninterrupted access. Any third-party links or information are not under our control or responsibility.
6. Contact
For queries or concerns, please write to: [email protected]