Skip to Content

Journal of Sensor and Actuator Networks, Volume 10, Issue 1

2021 March - 22 articles

Cover Story: Olive trees often suffer from various diseases which are predictable and curable if they are caught in early stages, making early identification of infestation very crucial. This identification is usually done through manual labor, a task which is impractical and difficult, as early stages cannot be easily perceived with the naked eye. In the MyOlivGroveCoach project, we sought to build a system which uses multispectral unmanned aerial vehicle imagery to help to monitor olive groves through the autonomous and automatic processing of the multispectral images using both computer vision and machine learning techniques. The goal of the system is to monitor and assess the health of olive groves, to facilitate the prediction of Verticillium wilt spread, and to implement a decision support system that guides the farmer/agronomist in a timely manner. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (22)

  • Feature Paper
  • Article
  • Open Access
13 Citations
5,529 Views
15 Pages

This experimental study focuses on the comparison between two different sensors for vibration signals: a magnetoresistive sensor and an accelerometer as a calibrated reference. The vibrations are collected from a variable speed inductor motor setup,...

  • Feature Paper
  • Article
  • Open Access
1 Citations
4,372 Views
16 Pages

Optimising Performance for NB-IoT UE Devices through Data Driven Models

  • Omar Nassef,
  • Toktam Mahmoodi,
  • Foivos Michelinakis,
  • Kashif Mahmood and
  • Ahmed Elmokashfi

This paper presents a data driven framework for performance optimisation of Narrow-Band IoT user equipment. The proposed framework is an edge micro-service that suggests one-time configurations to user equipment communicating with a base station. Sug...

  • Article
  • Open Access
11 Citations
3,479 Views
21 Pages

A Model-Based Approach for Adaptable Middleware Evolution in WSN Platforms

  • Walter Tiberti,
  • Dajana Cassioli,
  • Antinisca Di Marco,
  • Luigi Pomante and
  • Marco Santic

Advances in technology call for a parallel evolution in the software. New techniques are needed to support this dynamism, to track and guide its evolution process. This applies especially in the field of embedded systems, and certainly in Wireless Se...

  • Feature Paper
  • Article
  • Open Access
5 Citations
5,437 Views
10 Pages

Cyberattacks exploiting Universal Serial Bus (USB) interfaces may have a high impact on individual and corporate systems. The BadUSB is an attack where a USB device’s firmware is spoofed and, once mounted, allows attackers to execute a set of malicio...

  • Article
  • Open Access
1 Citations
3,572 Views
17 Pages

Cyber-Physical Systems (CPSs) are a mature research technology topic that deals with Artificial Intelligence (AI) and Embedded Systems (ES). They interact with the physical world via sensors/actuators to solve problems in several applications (roboti...

  • Feature Paper
  • Article
  • Open Access
13 Citations
4,291 Views
12 Pages

Resource Management and Model Personalization for Federated Learning over Wireless Edge Networks

  • Ravikumar Balakrishnan,
  • Mustafa Akdeniz,
  • Sagar Dhakal,
  • Arjun Anand,
  • Ariela Zeira and
  • Nageen Himayat

Client and Internet of Things devices are increasingly equipped with the ability to sense, process, and communicate data with high efficiency. This is resulting in a major shift in machine learning (ML) computation at the network edge. Distributed le...

  • Article
  • Open Access
13 Citations
3,985 Views
25 Pages

Factor Optimization for the Design of Indoor Positioning Systems Using a Probability-Based Algorithm

  • Bráulio Henrique O. U. V. Pinto,
  • Horácio A. B. F. de Oliveira and
  • Eduardo J. P. Souto

Indoor Positioning Systems (IPSs) are designed to provide solutions for location-based services. Wireless local area network (WLAN)-based positioning systems are the most widespread around the globe and are commonly found to have a ready-to-use infra...

  • Feature Paper
  • Article
  • Open Access
23 Citations
6,045 Views
21 Pages

Analysis, Modeling and Multi-Spectral Sensing for the Predictive Management of Verticillium Wilt in Olive Groves

  • Kostas Blekos,
  • Anastasios Tsakas,
  • Christos Xouris,
  • Ioannis Evdokidis,
  • Dimitris Alexandropoulos,
  • Christos Alexakos,
  • Sofoklis Katakis,
  • Andreas Makedonas,
  • Christos Theoharatos and
  • Aris Lalos

The intensification and expansion in the cultivation of olives have contributed to the significant spread of Verticillium wilt, which is the most important fungal problem affecting olive trees. Recent studies confirm that practices such as the use of...

  • Review
  • Open Access
4 Citations
5,076 Views
23 Pages

CNA Tactics and Techniques: A Structure Proposal

  • Antonio Villalón-Huerta,
  • Ismael Ripoll-Ripoll and
  • Hector Marco-Gisbert

Destructive and control operations are today a major threat for cyber physical systems. These operations, known as Computer Network Attack (CNA), and usually linked to state-sponsored actors, are much less analyzed than Computer Network Exploitation...

  • Feature Paper
  • Article
  • Open Access
24 Citations
5,364 Views
15 Pages

Virtualizing AI at the Distributed Edge towards Intelligent IoT Applications

  • Claudia Campolo,
  • Giacomo Genovese,
  • Antonio Iera and
  • Antonella Molinaro

Several Internet of Things (IoT) applications are booming which rely on advanced artificial intelligence (AI) and, in particular, machine learning (ML) algorithms to assist the users and make decisions on their behalf in a large variety of contexts,...

  • Article
  • Open Access
23 Citations
4,859 Views
14 Pages

In this paper, we discuss the critical characteristics of user experience in sixth generation (6G) cellular networks. We first describe cellular networks’ evolution through 5G and then discuss the enabling technologies and projected services in 6G ne...

  • Article
  • Open Access
5 Citations
3,188 Views
10 Pages

Product counterfeiting is a continuous problem in industry. Recently, an anti-counterfeiting protocol to address this issue via radio-frequency identification (RFID) technology was proposed by researchers. Yet, the use case of reselling the same prod...

  • Feature Paper
  • Article
  • Open Access
62 Citations
6,848 Views
22 Pages

The received signal strength indicator (RSSI) of RF signals is a cost-effective solution for distance estimation, which makes it a practical choice for localization schemes in wireless sensor networks (WSN). However, RF propagation channels in most W...

  • Article
  • Open Access
146 Citations
22,138 Views
18 Pages

Intelligent Machine Vision Model for Defective Product Inspection Based on Machine Learning

  • Tajeddine Benbarrad,
  • Marouane Salhaoui,
  • Soukaina Bakhat Kenitar and
  • Mounir Arioua

Quality control is one of the industrial tasks most susceptible to be improved by implementing technological innovations. As an innovative technology, machine vision enables reliable and fast 24/7 inspections and helps producers to improve the effici...

  • Article
  • Open Access
4 Citations
3,901 Views
15 Pages

MANET Performance Optimization Using Network-Based Criteria and Unmanned Aerial Vehicles

  • Ekaterina V. Gromova,
  • Sergei Kireev,
  • Alina Lazareva,
  • Anna Kirpichnikova and
  • Dmitry Gromov

In this contribution we consider the problem of optimal drone positioning for improving the operation of a mobile ad hoc network. We build upon our previous results devoted to the application of game-theoretic methods for computing optimal strategies...

  • Article
  • Open Access
9 Citations
6,479 Views
20 Pages

The outbreak of novel coronavirus (COVID-19) resulted in the clinical decision that reduced direct contact is optimal, especially for senior citizens residing in nursing homes. A smart pillow adapted for the Remote Healthcare System is presented in t...

  • Article
  • Open Access
15 Citations
3,918 Views
14 Pages

A Green Routing Protocol with Wireless Power Transfer for Internet of Things

  • Francesco Chiti,
  • Romano Fantacci and
  • Laura Pierucci

The usually constrained resources and lossy links scenarios of Internet of Things (IoT) applications require specific protocol suite, as the IPv6 Routing Protocol for Low-Power and Lossy Networks (RPL). Due to its flexibility, RPL can support efficie...

  • Article
  • Open Access
3 Citations
3,573 Views
26 Pages

Learning-Based Coordination Model for On-the-Fly Self-Composing Services Using Semantic Matching

  • Houssem Ben Mahfoudh,
  • Ashley Caselli and
  • Giovanna Di Marzo Serugendo

Forecasts announce that the number of connected objects will exceed 20 billion by 2025. Objects, such as sensors, drones or autonomous cars participate in pervasive applications of various domains ranging from smart cities, quality of life, transport...

  • Editorial
  • Open Access
2,376 Views
3 Pages

Acknowledgment to Reviewers of Journal of Sensor and Actuator Networks in 2020

  • Journal of Sensor and Actuator Networks Editorial Office

Peer review is the driving force of journal development, and reviewers are gatekeepers who ensure that Journal of Sensor and Actuator Networks maintains its standards for the high quality of its published papers [...]

  • Feature Paper
  • Review
  • Open Access
46 Citations
7,973 Views
17 Pages

A Review of Techniques for Implementing Elliptic Curve Point Multiplication on Hardware

  • Arielle Verri Lucca,
  • Guilherme Augusto Mariano Sborz,
  • Valderi Reis Quietinho Leithardt,
  • Marko Beko,
  • Cesar Albenes Zeferino and
  • Wemerson Delcio Parreira

Cryptography is considered indispensable among security measures applied to data concerning insecure means of transmission. Among various existent algorithms on asymmetric cryptography, we may cite Elliptic Curve Cryptography (ECC), which has been wi...

  • Feature Paper
  • Article
  • Open Access
22 Citations
5,937 Views
15 Pages

A Bluetooth-Based Architecture for Contact Tracing in Healthcare Facilities

  • Piergiuseppe Di Marco,
  • Pangun Park,
  • Marco Pratesi and
  • Fortunato Santucci

With the latest standard releases, Bluetooth technology is becoming more and more relevant for building and industrial automation. At the same time, Bluetooth is now becoming fundamental for contact tracing applications, to support monitoring and con...

  • Article
  • Open Access
14 Citations
7,363 Views
20 Pages

Blockchain and IoMT against Physical Abuse: Bullying in Schools as a Case Study

  • Nikolaos Ersotelos,
  • Mirko Bottarelli,
  • Haider Al-Khateeb,
  • Gregory Epiphaniou,
  • Zhraa Alhaboby,
  • Prashant Pillai and
  • Amar Aggoun

By law, schools are required to protect the well-being of students against problems such as on-campus bullying and physical abuse. In the UK, a report by the Office for Education (OfE) showed 17% of young people had been bullied during 2017–201...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Sens. Actuator Netw. - ISSN 2224-2708