The publication will not be an Open Access repository (Effective January 2017).
A maximum of thirty-nine (39) papers will be included in every journal issue (effective April 2013).
Multiple submission of the same paper on different journal submission will all be discarded (effective January 2017).
Paper title, author and corresponding author(s) names should be the same to the submitted paper and on the submission system (effective January 2017).
Each paper should only have one (1) corresponding author and cannot be changed (effective April 2013).
If plagiarism problem was found, all authors including the corresponded authors cannot submit paper(s) to our journal for three years.
The paper will be removed even though it was already published, and this will be noticed on the home page (effective April 2013).
If double submission was found, all authors including the corresponded authors cannot submit paper(s) to our journal for three years.
The paper will be removed even though it was published, and this will be noticed on the home page (effective April 2013).
Only paper(s) containing simulation, implementation, case study or other evidence of research advancement will be published.
Ideal paper can be published after the editorial board grants permission after reviewing the paper (effective April 2013).
Papers from one country cannot exceed 60% in every journal issue; it will be based by the first authors' nationality (effective July 2014).
Only one (1) paper from same author can be included in each issue regardless of role and order (effective July 2014).
SERSC DOES NOT ALLOW ANY AGENTS FROM CHINA to act on our behalf in collecting papers for our journals. SERSC have standard procedures in publication of submitted papers.
The objective of the IJIoTA is to publish high-quality research specifically towards the Internet of Things (IoT). To explore the range of related topics and generate research discusses in relation to IoT Applications. IJIoTA aims to facilitate and support research related to Internet of Things and its applications.
To bridge the gap of users who do not have access to major databases where
one should pay for every downloaded article; this online publication platform
is open to all readers as part of our commitment to global scientific society.
The topics covered by IJIoTA include the following:-
Applications of the Internet of Things
Automated IoT vulnerability identification
Cloud and Services Computing
Communications Network Technology
Control over Networks
Cyber-threats towards the IoT
Dynamics of distributed IoT networks of embedded sensors and actuators
Emerging Standards for an Internet of Things
Internet and Online Services
Internet of Everything (IoE)
Internet of Things (IoT)
Internet of Things Communication Systems
Internet of Things communication systems and network infrastructures
Internet of Things Network Infrastructures
IoT Application Programming Interface (API)
IP Multimedia Subsystem (IMS)
Issues relating to the connection of everyday objects to the Internet
Linking ‘Things’ to Location and Users
Location and Tracking of Objects
Mobile ad Hoc Network (MANET) and Sensor Networks
New Business Models Built around the Internet
Online Communities and Social Networks
P2P Networking and System
Radio Frequency Identification
RFID and Tagging Technologies
Securing Information Technology
Security and Privacy and Issues relating to linking ‘things’ to location and users
Service Oriented IoT Architecture
Standard Development Organizations (SDO)
Text and Graphics Recognition
The creative and artistic potentials provided by the internet of things
The Geography of Things: Location and tracking of objects
Web of Things (WoT)
Ali Shahrabi, Glasgow Caledonian University, United Kingdom
Arun Kumar Sangaiah, VIT University, India
Ashraf Darwish, Helwan University, Egypt
Barbara Re, University of Camerino, Italy
Bhekisipho Twala, University of Johannesburg, South Africa
Chin-Ling Chen, Chaoyang University of Technology, Chinese Taipei
Eduard Babulak, Fort Hays State University, USA
Eleanna Kafeza, Athens University of Economics and Business, Greece
Faruq Al-Omari, Jordanian Universities Network (JUNet), Jordan
Georgios Theodoropoulos, Durham University, United Kingdom
Hani Bani-Salameh, The Hashemite University, Jordan
Hong Zhu, Oxford Brookes University, United Kingdom
Iraklis Varlamis, Harokopio University of Athens, Greece
Jing-Ming Guo, National Taiwan University of Science and Technology, Chinese Taipei
Kun Ma, University of Jinan, China
Liying Zheng, Harbin Engineering University, China
Mahmoud Reza Delavar, University of Tehran, Iran
Manolis Vavalis, University of Thessaly, Greece
Marwan Omar, Saint Leo University, United States
Mingdong Tang, Hunan University of Science and Technology, China
Mohamed Eltayeb, Colorado Technical University, United States
Mohammed Hussain, Zayed University, U.A.E
Mu-Chun Su, National Central University, Taiwan
Mustafa Sanli, Aselsan Inc., Turkey
Natarajan Meghanathan, Jackson State University, USA
Ning Kong, China Internet Network Information Center, China
Pelin Angin, Purdue University, USA
Qiang He, Swinburne University of Technology, Australia
Rajkumar Rajasekaran, Vellore Institute of Technology, India
Ram Ramanathan, University of Bedfordshir, United Kingdom
Ricardo Jardim-Goncalves, New University of Lisbon, Portugal
Robert Hegarty, Manchester Metropolitan University, United Kingdom
Roberto Caldelli, University of Florence, Italy
Roy Oberhauser, Aalen University, Germany
Ruisheng Shi, Beijing University of Posts & Telecommunications, China
Sergio di Martino, University of Napoli, Italy
Shuo-Yan Chou, National Taiwan University of Science and Technology, Chinese Taipei
Shwadhin Sharma, California State University, Monterey Bay, USA