{"title":"Resource management optimisation for federated learning-enabled multi-access edge computing in internet of vehicles","authors":"Qilin Zhou, Lili Wang, Shoulin Wu","doi":"10.1504/ijsnet.2023.10055917","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.10055917","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"42 1","pages":"15-28"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86587077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Uncovering the roots of player dissatisfaction in MOBA mobile games: a text mining and complex network theory approach to negative online reviews","authors":"Yujie Zhan, Zunxiang Qiu, Xinchun Li, Jianping Shang, Quanlong Liu, Zishuo Zhao","doi":"10.1504/ijsnet.2023.10057106","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.10057106","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"1 1","pages":"196-204"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82848739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Superactive: a priority, latency, and SLA-aware resource management scheme for software defined space-air-ground integrated networks","authors":"Mahfuzulhoq Chowdhury","doi":"10.1504/ijsnet.2022.10050822","DOIUrl":"https://doi.org/10.1504/ijsnet.2022.10050822","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"28 1","pages":"23-41"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85177326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A WLAN indoor location method based on quadratic wavelet analysis","authors":"Xuemei Zhu, E. Blancaflor, Mideth B. Abisado","doi":"10.1504/ijsnet.2023.10055915","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.10055915","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"38 1","pages":"67-78"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77428698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hidden game theory-based trust strategic approach for trustworthy communication in the internet of things","authors":"Gamini Joshi, Vidushi Sharma","doi":"10.1504/ijsnet.2022.10052491","DOIUrl":"https://doi.org/10.1504/ijsnet.2022.10052491","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"35 1","pages":"97-113"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72692573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Artificial intelligence in human activity recognition: a review","authors":"Updesh Verma, Pratibha Tyagi, Manpreet Kaur","doi":"10.1504/ijsnet.2022.10050953","DOIUrl":"https://doi.org/10.1504/ijsnet.2022.10050953","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"7 1","pages":"1-22"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82125118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DynO-IoT: a dynamic ontology for provisioning semantic interoperability in internet of things","authors":"H. Rahman, Kishore Medhi, M. I. Hussain","doi":"10.1504/ijsnet.2023.10054588","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.10054588","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"18 1","pages":"114-125"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90924389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Message queuing telemetry transport - secure connection: a power-efficient secure communication","authors":"Shikhar Bhardwaj, S. Harit, Shilpa, D. Anand","doi":"10.1504/ijsnet.2023.10055780","DOIUrl":"https://doi.org/10.1504/ijsnet.2023.10055780","url":null,"abstract":"","PeriodicalId":13739,"journal":{"name":"Int. J. Sens. Networks","volume":"33 1","pages":"29-40"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83238448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}