About
|
Contact Us
|
Register
|
Login
Proceedings
Series
Journals
Search
EAI
ISSN:
2410-0218
Submit Article
Submission Instructions
Ethics and Malpractice Statement
Back to Journal Page
2025
Issue 3
Issue 2
Issue 1
2024
Issue 4
Issue 3
Issue 2
Issue 1
2023
Issue 4
Issue 3
Issue 2
Issue 1
2022
Issue 4
Issue 32
Issue 31
Issue 30
2021
Issue 29
Issue 28
Issue 27
Issue 26
2020
Issue 25
Issue 24
Issue 23
Issue 22
2019
Issue 21
Issue 20
Issue 19
Issue 18
2018
Issue 17
Issue 16
Issue 15
Issue 14
2017
Issue 13
Issue 12
Issue 11
Issue 10
2016
Issue 9
Issue 8
Issue 7
Issue 6
2015
Issue 5
Issue 4
Issue 3
Issue 2
2014
Issue 1
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
Issue 2, 2025
Editor(s)-in-Chief:
Trung Q. Duong
,
Le Nguyen Bao
and
Nguyen-Son Vo
Articles
Information
Coverage Probability of EH-enabled LoRa networks - A Deep Learning Approach
Appears in:
inis
25
(
2
)
:
Authors:
Thi-Tuyet-Hai Nguyen, Tran Cong-Hung, Nguyen Hong-Son, Tan Hanh, Tran Trung Duy, Lam-Thanh Tu
Abstract:
The performance of energy harvesting (EH)-enabled long-range (LoRa) networks is analyzed in this work. Specifically, we employ deep learning (DL) to estimate the coverage probability (Pcov) of the con
...
sidered networks. Our study incorporates a general fading distribution, specifically the Nakagami-m…The performance of energy harvesting (EH)-enabled long-range (LoRa) networks is analyzed in this work. Specifically, we employ deep learning (DL) to estimate the coverage probability (Pcov) of the considered networks. Our study incorporates a general fading distribution, specifically the Nakagami-m distribution, and utilizes tools from stochastic geometry (SG) to model the spatial distributions of all nodes and end-devices (EDs) with EH capability. The DL approach is employed to overcome the limitations of model-based methods that can only evaluate the Pcov under simplified network conditions. Therefore, we propose a deep neural network (DNN) that estimates the Pcov with high accuracy compared to the ground truth values. Additionally, we demonstrate that DL significantly outperforms the Monte Carlo simulation approach in terms of resource consumption, including time and memory. more »
more >>
Single-level Discrete Two Dimensional Wavelet Transform Based Multiscale Deep Learning Framework for Two-Wheeler Helmet Detection
Appears in:
inis
25
(
2
)
:
Authors:
Amrutha Annadurai, Manas Ranjan Prusty, Trilok Nath Pandey, Subhra Rani Patra
Abstract:
INTRODUCTION: A robust method is proposed in this paper to detect helmet usage in two-wheeler riders to enhance road safety. OBJECTIVES: This involves a custom made dataset that contains 1000 images c
...
aptured under diverse real-world scenarios, including variations in helmet size, colour, and light…INTRODUCTION: A robust method is proposed in this paper to detect helmet usage in two-wheeler riders to enhance road safety. OBJECTIVES: This involves a custom made dataset that contains 1000 images captured under diverse real-world scenarios, including variations in helmet size, colour, and lighting conditions. This dataset has two classes namely with helmet and without helmet. METHODS: The proposed helmet classification approach utilizes the Multi-Scale Deep Convolutional Neural Network (CNN) framework cascaded with Long Short-Term Memory (LSTM) network. Initially the Multi-Scale Deep CNN extracts modes by applying Single-level Discrete 2D Wavelet Transform (dwt2) to decompose the original images. In particular, four different modes are used for segmenting a single image namely approximation, horizontal detail, vertical detail and diagonal detail. After feeding the segmented images into a Multi-Scale Deep CNN model, it is cascaded with an LSTM network. RESULTS: The proposed model achieved accuracies of 99.20% and 95.99% using both 5-Fold Cross-Validation (CV) and Hold-out CV methods, respectively. CONCLUSION: This result was better than the CNN-LSTM, dwt2-LSTM and a tailor made CNN model. more »
more >>
A novel approach for graph-based real-time anomaly detection from dynamic network data listened by Wireshark
Appears in:
inis
25
(
2
)
:
Authors:
Muhammed Onur Kaya, Mehmet Ozdem, Resul Das
Abstract:
This paper presents a novel approach for real-time anomaly detection and visualization of dynamic network data using Wireshark, globally's most widely utilized network analysis tool. As the complexity
...
and volume of network data continue to grow, effective anomaly detection has become essential for …This paper presents a novel approach for real-time anomaly detection and visualization of dynamic network data using Wireshark, globally's most widely utilized network analysis tool. As the complexity and volume of network data continue to grow, effective anomaly detection has become essential for maintaining network performance and enhancing security. Our method leverages Wireshark’s robust data collection and analysis capabilities to identify anomalies swiftly and accurately. In addition to detection, we introduce innovative visualization techniques that facilitate the intuitive representation of detected anomalies, allowing network administrators to comprehend network conditions and make informed decisions quickly. The results of our study demonstrate significant improvements in both the efficacy of anomaly detection and the practical applicability of visualization tools in real-time scenarios. This research contributes valuable insights into network security and management, highlighting the importance of integrating advanced analytical methods with effective visualization strategies to enhance the overall management of dynamic networks. more »
more >>
Enhancing AI-Inspired Analog Circuit Design: Optimizing Component Sizes with the Firefly Algorithm and Binary Firefly Algorithm
Appears in:
inis
25
(
2
)
:
Author:
Trang Hoang
Abstract:
This paper explores the use of the Firefly Algorithm (FA) and its binary variant (BFA) in optimizing analog circuit component sizing, specifically as a case study for a two-stage operational amplifier
...
(op-amp) designed with a 65nm CMOS process. Recognizing the limitations of traditional optimizatio…This paper explores the use of the Firefly Algorithm (FA) and its binary variant (BFA) in optimizing analog circuit component sizing, specifically as a case study for a two-stage operational amplifier (op-amp) designed with a 65nm CMOS process. Recognizing the limitations of traditional optimization approaches in handling complex analog design requirements, this study implements both FA and BFA to enhance convergence speed and accuracy within multi-dimensional search spaces. The Python-Spectre framework in this paper facilitates automatic, iterative simulation and data collection, driving the optimization process. Through extensive benchmarking, the BFA outperformed traditional FA, balancing exploration and exploitation while achieving superior design outcomes across key parameters such as voltage gain, phase margin, and unity-gain bandwidth. Comparative analysis with existing optimization methods, including Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), underscores the efficiency and accuracy of BFA in optimizing circuit metrics, particularly in power-constrained environments. This study demonstrates the potential of swarm intelligence in advancing automatic analog design and establishes a foundation for future enhancements in analog circuit automation. more »
more >>
Integrated Cloud-Twin Synchronization for Supply Chain 5.0
Appears in:
inis
25
(
2
)
:
Authors:
Divya Sasi Latha, Tartat Mokkhamakkul
Abstract:
The digital twin is thus emerging means of improving real-world performance from virtual spaces, especially relatedto Supply Chain 5.0 in Industry 5.0. This framework employs the integration of cloud
...
computing and digital twin technologies to secure data storage, trusted tracking, and high reliabil…The digital twin is thus emerging means of improving real-world performance from virtual spaces, especially relatedto Supply Chain 5.0 in Industry 5.0. This framework employs the integration of cloud computing and digital twin technologies to secure data storage, trusted tracking, and high reliability, is architectural for the integration of supply-chain sustainable enterprises. In this work, we introduce a high level architecture of cloud-based digital twin model for supply chain 5.0 , which was created to align the system of supply chain through real-time observation as well as real-timesupply chain 5.0 decision-making and control. This study introduces a cloud-based twin optimization model for Supply Chain 5.0, validated through genetic algorithm (GA) simulations. The model determines optimal weights to balance objectives, achieving an optimal objective function value that reflects trade-offs among operational efficiency, cost, and sustainability. A convergence plot illustrates the model’s iterative solution improvements, demonstrating its dynamic adaptability. Lastly, the proposed model defines and test a supply chain performance analysis through dynamic simulations. more »
more >>
Scope
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems is open access, a peer-reviewed scholarly journal focused on ubiquitous computing, cloud computing, and cyber-physical system,
...
all kinds of networks in large-scale factories, including a lot of traditional and new industries. …EAI Endorsed Transactions on Industrial Networks and Intelligent Systems is open access, a peer-reviewed scholarly journal focused on ubiquitous computing, cloud computing, and cyber-physical system, all kinds of networks in large-scale factories, including a lot of traditional and new industries. The journal publishes research articles, review articles, commentaries, editorials, technical articles, and short communications with a quarterly frequency (four issues per year). Authors are not charged for article submission and processing. This journal is co-organized, and managed by Duy Tan University, Vietnam. INDEXING: Scopus (CiteScore: 3.1), Compendex, DOAJ, ProQuest, EBSCO, DBLP more »
more >>
Topics
Applications of wireless sensor networks, body area networks in large-scale industrial applications, such as fault theories of wireless networks, including routing, network control and management, rel
...
iable transmission and architectures, etc. Applications of social networking, big data, ubiqui… Applications of wireless sensor networks, body area networks in large-scale industrial applications, such as fault theories of wireless networks, including routing, network control and management, reliable transmission and architectures, etc. Applications of social networking, big data, ubiquitous computing, mobile computing, and cloud computing in various industries and services (e.g., intelligent systems enhanced by social networking, cloud-based industrial networks, cloud-assisted intelligent systems, etc.) Analysis of industrial control and communication networks, including network lifetime, security, network scalability, reliability, stability, etc. Design and choice of industrial, intelligent, application-specific network protocols and algorithms (e.g., EtherNet/IP, Ethernet Powerlink, EtherCAT, Modbus-TCP, Profinet, SERCOS III, etc.) at any communication layer Opportunistic networks in the industry, such as underwater sensor networks in sewage treatment systems, including establishing a temporary data transmission structure using available devices (e.g., underwater robot, surface data station, surface sink and under water sink), optimizing horizontal multi-hop data links (e.g., 3D data transmission), etc. Applications of intelligent systems in various industries, including collaborative systems, quality control, optimization, decision support, planning, high-level control concepts (e.g., multi-agent and holonic systems, service-oriented architectures), low-level control concepts (e.g., IEC 61131-3 and IEC 61499-based control), advanced system engineering concepts (e.g., model-driven development, component-based design), supply chains, value chains, virtual organizations, and virtual societies, emergency preparedness, crisis management, business channels, electronic marketplaces, enterprise resources planning, etc. Design and analysis of real-time embedded industrial systems, including real-time computing, real-time operating systems, real-time communications, networked embedded systems technology, etc. Novel control techniques, with respect to process control, equipment control, supervisory control, adaptive control, motion control, etc. Automated manufacturing systems, regarding formal modeling and analysis of manufacturing systems, scheduling of manufacturing systems, queuing systems and petri nets in manufacturing systems, etc. Computational intelligence in automation, including neural, fuzzy, evolutionary approaches in automation, ant colonies optimization and swarm intelligence in automation, machine learning, expert systems, etc. Hardware and software design and development for intelligent systems, such as intelligent and humanized production monitoring and control, etc. Big data analysis and processing in various industries and services, including constructing data analysis models, providing data analysis and processing tools and designing various optimization algorithms based on data analysis. Crowd-sourced behavior analysis in various industry and services, such as measuring and calculating the diffusion direction and speed of gas in the petrochemical industry based on crowd-sourced data from a large number of and various types of sensors, as well as product and service evaluation. Simulation and testbed of current industrial networks and intelligent systems, including network performance analysis, automated manufacturing, intelligent monitoring, disaster prevention, etc. Vision of future smart factories, service, marketing, and their integration, incorporating current existing technologies. Multimedia applications, content management, process management and knowledge management for various industries, services, and engineering education: including multimedia processing, multimedia retrieval, multimedia indexing, image sensing, image processing, image coding, image recognition, etc. Pattern recognition methods for various industries and services: including statistical theory, clustering, similarity measures, unsupervised learning, supervised learning, etc. Survey, review and essay of current industrial networks researches and intelligent systems development. more »
more >>
Indexing
Scopus DOAJ DBLP CrossRef [OCLC Discovery Services](https://www.worldcat.org/search?q=eai+endorsed+tran… Scopus DOAJ DBLP CrossRef OCLC Discovery Services EuroPub Publons Dimensions Publicly Availabl
...
e Content Database (ProQuest) Advanced Technologies & Aerospace Database (ProQuest) SciTech Premium Collection (ProQuest) Google Scholar more »
more >>
Editorial Board
Ala Al-Fuqaha (Western Michigan University, USA) Al-Sakib Khan Pathan (Southeast University, Bangladesh) Ammar Rayes (Cisco Systems, USA) Antonino Masaracchia (IIT-CNR, Italy) Athanasios Maglaras (Dr,
...
Prof . ofT.E.I. of Larissa) Berk Canberk (Northeastern University, USA) Ca V. Phan (… Ala Al-Fuqaha (Western Michigan University, USA) Al-Sakib Khan Pathan (Southeast University, Bangladesh) Ammar Rayes (Cisco Systems, USA) Antonino Masaracchia (IIT-CNR, Italy) Athanasios Maglaras (Dr, Prof . ofT.E.I. of Larissa) Berk Canberk (Northeastern University, USA) Ca V. Phan (Ho Chi Minh City University of Technology and Education, Vietnam) Chau Yuen (Singapore University of Technology and Design, Singapore) Chengfei Liu (Swinburne University of Technology, Australia) Chinmoy Kundu (University of Texas at Dallas, USA) Christer Carlsson (Åbo Akademi University, Finland) Chunsheng Zhu (University of British Columbia) Constandinos Mavromoustakis (University of Nicosia, Cyprus) Der-Jiunn Deng (National Changhua University of Education, Taiwan) Dickson Chiu (The University of Hong Kong) Eleanna Kafeza (Athens University of Economics and Business, Greece) Fu-ren Lin (National Tsing Hua University, Taiwan) Gerhard Hancke (University of London, UK) Guangjie Han (Hohai University, China) Guojun Wang (Central South University, China) Hacene Fouchal (University of Reims Champagne-Ardenne, France) Haklae Kim (Chung-Ang University, South Korea) Halil Yetgin (Bitlis Eren University, Turkey) Hideyasu Sasaki (Ritsumeikan University, Kyoto, Japan) Ho-fung Leung (Chinese University of Hong Kong, Hong Kong) Honggang Wang (University of Massachusetts Dartmouth, USA) Hua Hu (Hangzhou Dianzi University, China) Ibrahim Kushchu (Mobile Government Consortium International, UK) Irene Kafeza (Irene Law Office, Greece) Isabelle Comyn-Wattiau (ESSEC Business School Paris, France) Jaime Lloret- Mauri (Universitat Politècnica de València, Spain) Javier M. Aguiar (Universidad de Valladolid, Valladolid, Spain) Jesus Alonso-Zarate (Telecommunications Technology Center of Catalonia, Spain) Jian Yang (Macquarie University, Australia) Jiankun Hu (University of New South Wales, Australia) Jianmin Jiang (Shenzhen University) Jianwei Niu (Beihang University, China) Jinlei Jiang (Tsinghua University, China) Jinsong Wu (Bell Laboratory, China) Joel Rodrigues (Inst. Telecomunicações, Univ. of Beira Interior, Portugal) Juan Trujillo (University of Alicante, Spain) Jucheng Yang (Tianjing University of Technology, China) Junqing Zhang (Queen's University Belfast) KUN WANG (Nanjing University of Posts and Telecommunications) Kuo-Ming Chao (Leader – Distributed Systems and Modelling Research Group, UK) Leandros A. Maglaras (De Montfort University, UK) Lei Wang (Dalian University of Technology, China) Liang Zhou (Nanjing University of Posts and Telecommunications, China) Long D. Nguyen (Dong Nai University, Vietnam) Maggie M. Wang (The University of Hong Kong, Hong Kong) Nghia Duong-Trung (German Research Center for Artificial Intelligence, Germany) Ngo Hoang Tu (Seoul National University of Science and Technology, South Korea) Nguyen Van Nam (Viettel, Vietnam) Nicholas C Romano (Oklahoma State University, USA) Noel Crespi (Institut Mines-Telecom, Telecom SudParis, France) Panlong Yang (PLA University of Science and Technology, China) Pasi Tyrväinen (University of Jyväskylä, Finland) Patrick C.K. Hung (University of Ontario Institute of Technology, Canada) Periklis Chatzimisios (Alexander TEI of Thessaloniki, Greece) Pierluigi Siano (Università degli Studi di Salerno, Italy) Pirkko Walden (Abo Akademi University, Finland) Phuong Bui (Duy Tan University, Vietnam) Raymond Y.K Lau (City University of Hong Kong, Hong Kong) Richard Yu (Carleton University, Canada) Rong Yu (Guangdong University of Technology, China) Rose Hu (Utah State University, USA) Sammy Chan (City University of HongKong, HK) Shing-Chi Cheung (Hong Kong University of Science and Technology, Hong Kong) Stephen J. H. Yang (National Central University, Taiwan) Syed Hassan Ahmed (University of Central Florida, USA) Thanh-Phuong Nguyen (University of Toulon, France) Tran Trung Duy (PTIT, VietNam) Trang Hoang (Ho Chi Minh City University of Technology - Vietnam National University Ho Chi Minh City, Vietnam) Tuan-Minh Pham (Phenikaa University, Vietnam) Umar Zakir Abdul Hamid (Sensible 4 Oy, Helsinki) Victor Leung (The University of British Columbia) Vo Nguyen Son Dr. (Duy Tan University, Vietnam) Wai-Wa Fung (Information Security and Forensics Society, Hong Kong) Walid Gaaloul (Institut National des Télécommunications, France) Weiwei Jiang, (Beijing University of Posts and Telecommunications (BUPT), China) Wendy W. Y. Hui (University of Nottingham at Ningbo, China) William Cheung (Hong Kong Baptist University, Hong Kong) Xianfu Chen (VTT Technical Research Centre of Finland, Finland) Xiang Gui (Massey University, New Zealand) Xiaoling Wu (Chinese Academy of Sciences, China) Xu Wang (Heriot Watt University, UK) Yan Bai (University of Washington Tacoma, USA) Yan Zhang (Simula Research Laboratory and University of Oslo, Norway) Yi Zhuang (Zhejian Gongshang University, China) Yong Li (Tsinghua University, China) Yong Tang (South China Normal University, China) Yuanfang Chen (Institute Mines-Telecom, University Pierre and Marie Curie ) Yuexing Peng (Beijing University of Posts and Telecommunications, China) Yuqing Sun (Shangdong University, China) Zakaria Maamar (Zayed University, UAE) Zhangbing Zhou (China University of Geosciences, China) Zhichao Sheng (Shanghai University, China) ZhiMing Cai (Macau University of Science and Technology, Macau) Mithun Mukherjee (Nanjing University of Information Science and Technology, China) more »
more >>
Journal Blurb
Visit the new journal website to submit and consult our contents: https://publications.eai.eu/index.php/inis/indexVisit the new journal website to submit and consult our contents: https://publications
...
.eai.eu/index.php/inis/index more »
more >>
Publisher
EAI
ISSN
2410-0218
Volume
12
Published
2025-01-01