Skip to Content
You are currently on the new version of our website. Access the old version .

Journal of Sensor and Actuator Networks, Volume 13, Issue 1

2024 February - 18 articles

Cover Story: Buffering mechanisms are omnipresent in packet networks of all types. They significantly transform the traffic passing through network nodes. Describing such a transformation is not trivial for two reasons. Firstly, the traffic may exhibit complex statistical properties, including highly variable rates, strong autocorrelation, and batch structure. Secondly, the buffering mechanism may be complicated and incorporate active queue management of some sort. Fortunately, modern Markovian point processes enable precise modeling of traffic while preserving the analytical tractability of the whole model, at least in some cases. In the following case study, we observe how complex traffic is transformed when passing through a buffering mechanism with active queue management of a particular type. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (18)

  • Feature Paper
  • Article
  • Open Access
1 Citations
3,340 Views
24 Pages

Utilizing unmanned aerial vehicles (UAVs) to facilitate wireless communication has emerged as a viable and promising strategy to enhance current and prospective wireless systems. This approach offers many advantages by establishing line-of-sight conn...

  • Article
  • Open Access
3 Citations
2,560 Views
22 Pages

The Internet of Things (IoT) and wireless sensor networks (WSNs) utilize their connectivity to enable solutions supporting a spectrum of industries in different and volatile environments. To effectively enhance the security and quality of the service...

  • Review
  • Open Access
19 Citations
7,406 Views
38 Pages

Reliability of LoRaWAN Communications in Mining Environments: A Survey on Challenges and Design Requirements

  • Sonile K. Musonda,
  • Musa Ndiaye,
  • Hastings M. Libati and
  • Adnan M. Abu-Mahfouz

While a robust and reliable communication network for monitoring the mining environment in a timely manner to take care of people, the planet Earth and profits is key, the mining environment is very challenging in terms of achieving reliable wireless...

  • Article
  • Open Access
6 Citations
3,360 Views
27 Pages

IFGAN—A Novel Image Fusion Model to Fuse 3D Point Cloud Sensory Data

  • Henry Alexander Ignatious,
  • Hesham El-Sayed and
  • Salah Bouktif

To enhance the level of autonomy in driving, it is crucial to ensure optimal execution of critical maneuvers in all situations. However, numerous accidents involving autonomous vehicles (AVs) developed by major automobile manufacturers in recent year...

  • Article
  • Open Access
14 Citations
4,004 Views
24 Pages

In the rapidly evolving landscape of next-generation 6G systems, the integration of AI functions to orchestrate network resources and meet stringent user requirements is a key focus. Distributed Learning (DL), a promising set of techniques that shape...

  • Article
  • Open Access
20 Citations
6,412 Views
20 Pages

A Secure Blockchain-Enabled Remote Healthcare Monitoring System for Home Isolation

  • Jongsuk Kongsen,
  • Doungsuda Chantaradsuwan,
  • Peeravit Koad,
  • May Thu and
  • Chanankorn Jandaeng

This article presents a secure framework for remote healthcare monitoring in the context of home isolation, thereby addressing the concerns related to untrustworthy client connections to a hospital information system (HIS) within a secure network. Ou...

  • Article
  • Open Access
4 Citations
3,491 Views
18 Pages

Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control

  • Salim Sabah Bulbul,
  • Zaid Ameen Abduljabbar,
  • Duaa Fadhel Najem,
  • Vincent Omollo Nyangaresi,
  • Junchao Ma and
  • Abdulla J. Y. Aldarwish

Untrusted servers are servers or storage entities lacking complete trust from the data owner or users. This characterization implies that the server hosting encrypted data may not enjoy full trust from data owners or users, stemming from apprehension...

  • Article
  • Open Access
8 Citations
2,951 Views
21 Pages

Fog–cloud-based hierarchical task-scheduling methods are embracing significant challenges to support e-Health applications due to the large number of users, high task diversity, and harsher service-level requirements. Addressing the challenges...

  • Article
  • Open Access
6 Citations
2,719 Views
24 Pages

On Maximizing the Probability of Achieving Deadlines in Communication Networks

  • Benjamin Becker,
  • Christian Oberli,
  • Tobias Meuser and
  • Ralf Steinmetz

We consider the problem of meeting deadline constraints in wireless communication networks. Fulfilling deadlines depends heavily on the routing algorithm used. We study this dependence generically for a broad class of routing algorithms. For analyzin...

  • Article
  • Open Access
1 Citations
3,811 Views
17 Pages

Varactor-Based Tunable Sensor for Dielectric Measurements of Solid and Liquid Materials

  • Waseem Shahzad,
  • Weidong Hu,
  • Qasim Ali,
  • Ali Raza Barket and
  • Gulab Shah

In this article, a tunable RF sensor is presented for the measurement of dielectric materials (liquids and solids) based on a metamaterial resonator. The proposed novel configuration sensor has a microstrip line-loaded metamaterial resonator with tun...

  • Article
  • Open Access
5 Citations
6,830 Views
29 Pages

This paper presents an innovative incentive model that utilizes graph and game theories to address the issue of node incentives in decentralized blockchain networks such as EVM blockchains. The lack of incentives for nodes within EVM networks gives r...

  • Article
  • Open Access
12 Citations
5,520 Views
18 Pages

Experiences Using Ethereum and Quorum Blockchain Smart Contracts in Dairy Production

  • Filisia Melissari,
  • Andreas Papadakis,
  • Dimitris Chatzitheodorou,
  • Duc Tran,
  • Joachim Schouteten,
  • Georgia Athanasiou and
  • Theodore Zahariadis

feta cheese is a Greek protected designation of origin (PDO) product that is produced in three main phases: milk collection, cheese preparation and maturation, and product packaging. Each phase must be aligned with quantitative rules, stemming from t...

  • Article
  • Open Access
14 Citations
3,743 Views
16 Pages

A wide range of applications, including sports and healthcare, use human activity recognition (HAR). The Internet of Things (IoT), using cloud systems, offers enormous resources but produces high delays and huge amounts of traffic. This study propose...

  • Article
  • Open Access
2,383 Views
18 Pages

We analyse the output stream from a packet buffer governed by the policy that incoming packets are dropped with a probability related to the buffer occupancy. The results include formulas for the number of packets departing the buffer in a specific t...

  • Article
  • Open Access
10 Citations
4,582 Views
24 Pages

LoRaWANs play a critical role in various applications such as smart farming, industrial IoT, and smart cities. The strategic placement of gateways significantly influences network performance optimization. This study presents a comprehensive analysis...

  • Article
  • Open Access
10 Citations
4,382 Views
20 Pages

Accurate localization holds paramount importance across many applications within the context of smart cities, particularly in vehicular communication systems, the Internet of Things, and Integrated Sensing and Communication (ISAC) technologies. Nonet...

  • Article
  • Open Access
9 Citations
3,903 Views
19 Pages

The approach of federated learning (FL) addresses significant challenges, including access rights, privacy, security, and the availability of diverse data. However, edge devices produce and collect data in a non-independent and identically distribute...

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Sens. Actuator Netw. - ISSN 2224-2708