You are currently viewing a new version of our website. To view the old version click .

Journal of Sensor and Actuator Networks, Volume 13, Issue 1

February 2024 - 18 articles

Cover Story: Buffering mechanisms are omnipresent in packet networks of all types. They significantly transform the traffic passing through network nodes. Describing such a transformation is not trivial for two reasons. Firstly, the traffic may exhibit complex statistical properties, including highly variable rates, strong autocorrelation, and batch structure. Secondly, the buffering mechanism may be complicated and incorporate active queue management of some sort. Fortunately, modern Markovian point processes enable precise modeling of traffic while preserving the analytical tractability of the whole model, at least in some cases. In the following case study, we observe how complex traffic is transformed when passing through a buffering mechanism with active queue management of a particular type. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (18)

  • Feature Paper
  • Article
  • Open Access
1 Citations
2,877 Views
24 Pages

Utilizing unmanned aerial vehicles (UAVs) to facilitate wireless communication has emerged as a viable and promising strategy to enhance current and prospective wireless systems. This approach offers many advantages by establishing line-of-sight conn...

  • Article
  • Open Access
3 Citations
2,330 Views
22 Pages

The Internet of Things (IoT) and wireless sensor networks (WSNs) utilize their connectivity to enable solutions supporting a spectrum of industries in different and volatile environments. To effectively enhance the security and quality of the service...

  • Review
  • Open Access
14 Citations
6,377 Views
38 Pages

Reliability of LoRaWAN Communications in Mining Environments: A Survey on Challenges and Design Requirements

  • Sonile K. Musonda,
  • Musa Ndiaye,
  • Hastings M. Libati and
  • Adnan M. Abu-Mahfouz

While a robust and reliable communication network for monitoring the mining environment in a timely manner to take care of people, the planet Earth and profits is key, the mining environment is very challenging in terms of achieving reliable wireless...

  • Article
  • Open Access
6 Citations
2,978 Views
27 Pages

IFGAN—A Novel Image Fusion Model to Fuse 3D Point Cloud Sensory Data

  • Henry Alexander Ignatious,
  • Hesham El-Sayed and
  • Salah Bouktif

To enhance the level of autonomy in driving, it is crucial to ensure optimal execution of critical maneuvers in all situations. However, numerous accidents involving autonomous vehicles (AVs) developed by major automobile manufacturers in recent year...

  • Article
  • Open Access
12 Citations
3,517 Views
24 Pages

In the rapidly evolving landscape of next-generation 6G systems, the integration of AI functions to orchestrate network resources and meet stringent user requirements is a key focus. Distributed Learning (DL), a promising set of techniques that shape...

  • Article
  • Open Access
18 Citations
5,522 Views
20 Pages

A Secure Blockchain-Enabled Remote Healthcare Monitoring System for Home Isolation

  • Jongsuk Kongsen,
  • Doungsuda Chantaradsuwan,
  • Peeravit Koad,
  • May Thu and
  • Chanankorn Jandaeng

This article presents a secure framework for remote healthcare monitoring in the context of home isolation, thereby addressing the concerns related to untrustworthy client connections to a hospital information system (HIS) within a secure network. Ou...

  • Article
  • Open Access
2 Citations
3,066 Views
18 Pages

Fast Multi-User Searchable Encryption with Forward and Backward Private Access Control

  • Salim Sabah Bulbul,
  • Zaid Ameen Abduljabbar,
  • Duaa Fadhel Najem,
  • Vincent Omollo Nyangaresi,
  • Junchao Ma and
  • Abdulla J. Y. Aldarwish

Untrusted servers are servers or storage entities lacking complete trust from the data owner or users. This characterization implies that the server hosting encrypted data may not enjoy full trust from data owners or users, stemming from apprehension...

  • Article
  • Open Access
7 Citations
2,673 Views
21 Pages

Fog–cloud-based hierarchical task-scheduling methods are embracing significant challenges to support e-Health applications due to the large number of users, high task diversity, and harsher service-level requirements. Addressing the challenges...

  • Article
  • Open Access
6 Citations
2,414 Views
24 Pages

On Maximizing the Probability of Achieving Deadlines in Communication Networks

  • Benjamin Becker,
  • Christian Oberli,
  • Tobias Meuser and
  • Ralf Steinmetz

We consider the problem of meeting deadline constraints in wireless communication networks. Fulfilling deadlines depends heavily on the routing algorithm used. We study this dependence generically for a broad class of routing algorithms. For analyzin...

of 2

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
J. Sens. Actuator Netw. - ISSN 2224-2708