Journal: IJSNet

Volume 41, Issue 4

205 -- 228Mahfuzulhoq Chowdhury. Servant: a user service requirements, timeslot sacrifice, and triple benefit-aware resource and worker provisioning scheme for digital twin and MEC enhanced 6G networks
229 -- 243Vishwanath G. Garagad, Nalini C. Iyer. IoT trust aggregation using hybrid outlier detection and consensus
244 -- 256Xiang Bi, Jianing Shi, Benhong Zhang, Zengwei Lyu, Lingjie Huang. An RSU-crossed dependent task offloading scheme for vehicular edge computing based on deep reinforcement learning
257 -- 267Chao Wang. Energy-efficient output feedback control mechanism based on an event-driven discrete time-invariant system in wireless sensor networks

Volume 41, Issue 3

137 -- 151Fernando Lima Vicente, Adilson Eduardo Guelfi, Anderson Aparecido Alves da Silva, Marcelo Teixeira de Azevedo, Bruno Elton da Luz, Eduardo Takeo Ueda, Sergio Takeo Kofuji. Analysis and handling of biased data provided by wireless sensor networks with lack of energy
152 -- 163Zohar Naor. Reducing the deployment cost of RFID readers in retail spaces
164 -- 175Ansa Shermin S, Yugansh Amit Dave, Chennareddy Krishna Pranay Reddy, Sarang C. Dhongdi. Topology formation of multi-AUV network with MAC and routing protocols
176 -- 188Zengwei Lyu, Pengfei Li, Zhenchun Wei, Juan Xu 0002, Lei Shi 0011. A novel mobile charging planning method based on swarm reinforcement learning in wireless sensor networks
189 -- 203Jianlou Lou, Xiangyu Li, Guang Huo, Feng Liang, Zhaoyang Qu, Tianrui Lou, Ndagijimana Kwihangano Soleil. Medical personal protective equipment detection based on attention mechanism and multi-scale fusion

Volume 41, Issue 2

67 -- 77Ngoc-Son Duong, Thanh-Phuc Nguyen, Quoc-Tuan Nguyen, Thai-Mai Dinh-Thi. Improving indoor positioning system using weighted linear least square and neural network
78 -- 96Qiaoli Kong, Qi Bai, Tianfa Wang, Changsong Li, Yanfei Chen, Jingwei Han. Analysis of GNSS data quality based on Anubis and RTKLIB and single-point positioning accuracy in different environments for Android smartphones
97 -- 113Gamini Joshi, Vidushi Sharma. Hidden game theory-based trust strategic approach for trustworthy communication in the internet of things
114 -- 125Hafizur Rahman, Kishore Medhi, Md. Iftekhar Hussain. DynO-IoT: a dynamic ontology for provisioning semantic interoperability in internet of things
126 -- 135Jun Wang, Dongxu Luo, Funan Peng, Weiru Chen, Jun Liu, Hualiang Zhang. Wireless sensor deployment optimisation based on cost, coverage, connectivity, and load balancing

Volume 41, Issue 1

1 -- 22Updesh Verma, Pratibha Tyagi, Manpreet Kaur. Artificial intelligence in human activity recognition: a review
23 -- 41Mahfuzulhoq Chowdhury. Superactive: a priority, latency, and SLA-aware resource management scheme for software defined space-air-ground integrated networks
42 -- 59N. D. Patel, B. M. Mehtre, Rajeev Wankar. A Snort-based secure edge router for smart home
60 -- 66Shuai Shi, Ning Xiao. Security demonstration for the quantum noise-based physical layer using variable keys