About
|
Contact Us
|
Register
|
Login
Proceedings
Series
Journals
Search
EAI
ISSN:
2410-0218
Submit Article
Submission Instructions
Ethics and Malpractice Statement
Back to Journal Page
2024
Issue 2
Issue 1
2024
Issue 4
Issue 3
Issue 2
Issue 1
2023
Issue 4
Issue 3
Issue 1
2022
Issue 4
Issue 32
Issue 31
Issue 30
2021
Issue 29
Issue 28
Issue 27
Issue 26
2020
Issue 25
Issue 24
Issue 23
Issue 22
2019
Issue 21
Issue 20
Issue 19
Issue 18
2018
Issue 17
Issue 16
Issue 15
Issue 14
2017
Issue 13
Issue 12
Issue 11
Issue 10
2016
Issue 9
Issue 8
Issue 7
Issue 6
2015
Issue 5
Issue 4
Issue 3
Issue 2
2014
Issue 1
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
Issue 4, 2015
Editor(s)-in-Chief:
Lei Shu
Guest Editor(s):
Christian Erfurth
and
Hacene Fouchal
Articles
Information
Welcome message from the Editors
Appears in:
inis
15
(
4
)
:
e1
Authors:
Gerald Eichler, Christian Erfurth, Hacene Fouchal
Abstract:
more »
Linking Data According to Their Degree of Representativeness (DoR)
Appears in:
inis
15
(
4
)
:
e2
Authors:
Frédéric Blanchard, Amine Aït-Younes, Michel Herbin
Abstract:
This contribution addresses the problem of extracting some representative data from complex datasets and connecting them in a directed graph. First we define a degree of representativeness (DoR) inspi
...
red of the Borda voting procedure. Secondly we present a method to connect pairwise data using ne…This contribution addresses the problem of extracting some representative data from complex datasets and connecting them in a directed graph. First we define a degree of representativeness (DoR) inspired of the Borda voting procedure. Secondly we present a method to connect pairwise data using neighborhoods and the DoR as an objective function. We then present case studies as illustrative purposes: unsupervised grouping of binary images, analysis of co-authorships in a research team and structuration of a medical patient-oriented database. more »
more >>
A2Ba: Adaptive Background Modelling for Visual Aerial Surveillance Conditions
Appears in:
inis
15
(
4
)
:
e3
Authors:
Francisco Sanchez-Fernandez, Philippe Brunet, Sidi-Mohammed Senouci
Abstract:
Background modelling algorithms are widely used to define a part of an image that most time remains stationary in a video. In surveillance tasks, this model helps to recognize those outlier objects in
...
an area under monitoring. Set up a background model on mobile platforms (UAVs, intelligent cars,…Background modelling algorithms are widely used to define a part of an image that most time remains stationary in a video. In surveillance tasks, this model helps to recognize those outlier objects in an area under monitoring. Set up a background model on mobile platforms (UAVs, intelligent cars, etc.) is a challenging task due camera motion when images are acquired. In this paper, we propose A2Ba, a robust method to support instabilities caused by aerial images fusing different information about image motion. We used frame difference as first approximation, then age of pixels is estimated. This latter gives us an invariability level of a pixel over time. Gradient direction of ages and an adaptive weight are used to reduce impact from camera motion on background modelling. We tested A2Ba simulating several conditions that impair aerial image acquisition such as intentional and unintentional camera motion. Experimental results show improved performance compared to baseline algorithms GMM and KDE. more »
more >>
Performance evaluation of composite Web services
Appears in:
inis
15
(
4
)
:
e4
Authors:
Lynda Mokdad, Jalel Ben Othman, Abdelkrim Abdelli
Abstract:
Composite Web service architectures are demanding much guarantee on the Quality of Service (QoS) in order to meet user requirements. Performance evaluation of these architectures has become therefore
...
a very challenging issue, as the task is very complex due to synchronization inside the orchestra…Composite Web service architectures are demanding much guarantee on the Quality of Service (QoS) in order to meet user requirements. Performance evaluation of these architectures has become therefore a very challenging issue, as the task is very complex due to synchronization inside the orchestration of services. We propose in this paper to use stochastic automata networks which a is powerful formalism as it provides semantics to specify synchronization within a very smart formalism. Contrary to previous approaches, the modeling and the performance evaluation of a variable number of remote service invocation become possible. The reported simulation results advocate the use of our approach in the performance evaluation of composite Web service architectures. more »
more >>
Coupling of the synchronization stations of an Extended Kanban system
Appears in:
inis
15
(
4
)
:
e5
Author:
Leandros A. Maglaras
Abstract:
In this paper, an approximate method for estimating the performance of the synchronization stations of an Extended Kanban production system is developed. The correct treatment of an Extended Kanban sy
...
stem requires the decomposition of the system into a set of subsystems and the coupling of the sy…In this paper, an approximate method for estimating the performance of the synchronization stations of an Extended Kanban production system is developed. The correct treatment of an Extended Kanban system requires the decomposition of the system into a set of subsystems and the coupling of the synchronization stations of each of these. Unlike other Kanban type systems, the analysis in isolation of each synchronization station gives inaccurate results due to the simultaneous arrival of requests at all stations. The method of coupling of the synchronization stations of each production stage which is proposed, gives a good approximation of the performance of the production system, and makes the process quite accurate. This method provides a good basis for the comprehensive analysis and solution of a system of Extended Kanban. more »
more >>
Mobile Application Search: A QoS-Aware and Tag-Based Approach
Appears in:
inis
15
(
4
)
:
e6
Authors:
Shang-Pin Ma, Shin-Jie Lee, Wen-Tin Lee, Jing-Hong Lin, Jui-Hsaing Lin
Abstract:
The availability of enormous numbers of mobile applications (apps) is driving demand for the means to search for, recommend, and manage apps. Existing search engines provide basic search functionaliti
...
es that enable users to find apps by issuing query keywords; however, the ranking of search resul…The availability of enormous numbers of mobile applications (apps) is driving demand for the means to search for, recommend, and manage apps. Existing search engines provide basic search functionalities that enable users to find apps by issuing query keywords; however, the ranking of search results does not always satisfy the expectations of users. This study proposes a novel approach to address this issue, called Tag-based and QoS-aware Mobile Application Search and Management (TQMASM). The proposed system provides two functionalities: (1) QoS-aware app search and tag-based app recommendation; and (2) tag-based app management. QoS-aware app search is an objective means of sorting search results by considering QoS (Quality of Service) factors, popularity, and reputation. Tag-based recommendation is used to find apps according to tags annotated by all users. Tag-based management utilizes an hierarchical tree and tag annotation to facilitate the management and usage of apps. A prototype realization of TQMASM was developed to evaluate the feasibility of the proposed approach. Experiment results demonstrate the efficacy of the proposed system in providing a satisfactory ranking of retrieved apps. more »
more >>
Scope
Along with the fast development of computer technologies, e.g., ubiquitous computing, cloud computing and cyber-physical system, all kinds of networks (e.g., control network, communication network, se
...
nsor network, body area network, social network, opportunistic network, cloud-based network, etc.) …Along with the fast development of computer technologies, e.g., ubiquitous computing, cloud computing and cyber-physical system, all kinds of networks (e.g., control network, communication network, sensor network, body area network, social network, opportunistic network, cloud-based network, etc.) appeared and were applied in large-scale factories, including a lot of traditional and new industries, e.g., textile industry, coal industry, mining industry, steel industry, machinery industry, petrochemical industry, and biomedical industry, etc. Assisted by various industrial networks, automation in industry can reduce cost greatly because it takes advantage of control systems and information technologies to optimize productivity in the production of goods and delivery of services. However, the industrial environment is dynamic and harsh usually, including extreme temperature, humidity, electromagnetic interference and vibration, which proposed specific requirements to intelligent industrial systems under certain circumstances. All these highlight the criticality of the design, analysis and implementation of intelligent industrial systems more »
more >>
Topics
Applications of wireless sensor networks, body area networks in large-scale industrial applications, such as fault theories of wireless networks, including routing, network control and management, rel
...
iable transmission and architectures, etc. Applications of social networking, big data, ubiqui… Applications of wireless sensor networks, body area networks in large-scale industrial applications, such as fault theories of wireless networks, including routing, network control and management, reliable transmission and architectures, etc. Applications of social networking, big data, ubiquitous computing, mobile computing, and cloud computing in various industries and services (e.g., intelligent systems enhanced by social networking, cloud-based industrial networks, cloud-assisted intelligent systems, etc.) Analysis of industrial control and communication networks, including network lifetime, security, network scalability, reliability, stability, etc. Design and choice of industrial, intelligent, application-specific network protocols and algorithms (e.g., EtherNet/IP, Ethernet Powerlink, EtherCAT, Modbus-TCP, Profinet, SERCOS III, etc.) at any communication layer Opportunistic networks in the industry, such as underwater sensor networks in sewage treatment systems, including establishing a temporary data transmission structure using available devices (e.g., underwater robot, surface data station, surface sink and under water sink), optimizing horizontal multi-hop data links (e.g., 3D data transmission), etc. Applications of intelligent systems in various industries, including collaborative systems, quality control, optimization, decision support, planning, high-level control concepts (e.g., multi-agent and holonic systems, service-oriented architectures), low-level control concepts (e.g., IEC 61131-3 and IEC 61499-based control), advanced system engineering concepts (e.g., model-driven development, component-based design), supply chains, value chains, virtual organizations, and virtual societies, emergency preparedness, crisis management, business channels, electronic marketplaces, enterprise resources planning, etc. Design and analysis of real-time embedded industrial systems, including real-time computing, real-time operating systems, real-time communications, networked embedded systems technology, etc. Novel control techniques, with respect to process control, equipment control, supervisory control, adaptive control, motion control, etc. Automated manufacturing systems, regarding formal modeling and analysis of manufacturing systems, scheduling of manufacturing systems, queuing systems and petri nets in manufacturing systems, etc. Computational intelligence in automation, including neural, fuzzy, evolutionary approaches in automation, ant colonies optimization and swarm intelligence in automation, machine learning, expert systems, etc. Hardware and software design and development for intelligent systems, such as intelligent and humanized production monitoring and control, etc. Big data analysis and processing in various industries and services, including constructing data analysis models, providing data analysis and processing tools and designing various optimization algorithms based on data analysis. Crowd-sourced behavior analysis in various industry and services, such as measuring and calculating the diffusion direction and speed of gas in the petrochemical industry based on crowd-sourced data from a large number of and various types of sensors, as well as product and service evaluation. Simulation and testbed of current industrial networks and intelligent systems, including network performance analysis, automated manufacturing, intelligent monitoring, disaster prevention, etc. Vision of future smart factories, service, marketing, and their integration, incorporating current existing technologies. Multimedia applications, content management, process management and knowledge management for various industries, services, and engineering education: including multimedia processing, multimedia retrieval, multimedia indexing, image sensing, image processing, image coding, image recognition, etc. Pattern recognition methods for various industries and services: including statistical theory, clustering, similarity measures, unsupervised learning, supervised learning, etc. Survey, review and essay of current industrial networks researches and intelligent systems development. more »
more >>
Indexing
Scopus DOAJ DBLP CrossRef [OCLC Discovery Services](https://www.worldcat.org/search?q=eai+endorsed+tran… Scopus DOAJ DBLP CrossRef OCLC Discovery Services EuroPub Publons Dimensions Publicly Availabl
...
e Content Database (ProQuest) Advanced Technologies & Aerospace Database (ProQuest) SciTech Premium Collection (ProQuest) Google Scholar more »
more >>
Editorial Board
Ala Al-Fuqaha (Western Michigan University, USA) Al-Sakib Khan Pathan (Southeast University, Bangladesh) Ammar Rayes (Cisco Systems, USA) Antonino Masaracchia (IIT-CNR, Italy) Athanasios Maglaras (Dr,
...
Prof . ofT.E.I. of Larissa) Berk Canberk (Northeastern University, USA) Ca V. Phan (… Ala Al-Fuqaha (Western Michigan University, USA) Al-Sakib Khan Pathan (Southeast University, Bangladesh) Ammar Rayes (Cisco Systems, USA) Antonino Masaracchia (IIT-CNR, Italy) Athanasios Maglaras (Dr, Prof . ofT.E.I. of Larissa) Berk Canberk (Northeastern University, USA) Ca V. Phan (Ho Chi Minh City University of Technology and Education, Vietnam) Chau Yuen (Singapore University of Technology and Design, Singapore) Chengfei Liu (Swinburne University of Technology, Australia) Chinmoy Kundu (University of Texas at Dallas, USA) Christer Carlsson (Åbo Akademi University, Finland) Chunsheng Zhu (University of British Columbia) Constandinos Mavromoustakis (University of Nicosia, Cyprus) Der-Jiunn Deng (National Changhua University of Education, Taiwan) Dickson Chiu (The University of Hong Kong) Eleanna Kafeza (Athens University of Economics and Business, Greece) Fu-ren Lin (National Tsing Hua University, Taiwan) Gerhard Hancke (University of London, UK) Guangjie Han (Hohai University, China) Guojun Wang (Central South University, China) Hacene Fouchal (University of Reims Champagne-Ardenne, France) Haklae Kim (Chung-Ang University, South Korea) Halil Yetgin (Bitlis Eren University, Turkey) Hideyasu Sasaki (Ritsumeikan University, Kyoto, Japan) Ho-fung Leung (Chinese University of Hong Kong, Hong Kong) Honggang Wang (University of Massachusetts Dartmouth, USA) Hua Hu (Hangzhou Dianzi University, China) Ibrahim Kushchu (Mobile Government Consortium International, UK) Irene Kafeza (Irene Law Office, Greece) Isabelle Comyn-Wattiau (ESSEC Business School Paris, France) Jaime Lloret- Mauri (Universitat Politècnica de València, Spain) Javier M. Aguiar (Universidad de Valladolid, Valladolid, Spain) Jesus Alonso-Zarate (Telecommunications Technology Center of Catalonia, Spain) Jian Yang (Macquarie University, Australia) Jiankun Hu (University of New South Wales, Australia) Jianmin Jiang (Shenzhen University) Jianwei Niu (Beihang University, China) Jinlei Jiang (Tsinghua University, China) Jinsong Wu (Bell Laboratory, China) Joel Rodrigues (Inst. Telecomunicações, Univ. of Beira Interior, Portugal) Juan Trujillo (University of Alicante, Spain) Jucheng Yang (Tianjing University of Technology, China) Junqing Zhang (Queen's University Belfast) KUN WANG (Nanjing University of Posts and Telecommunications) Kuo-Ming Chao (Leader – Distributed Systems and Modelling Research Group, UK) Leandros A. Maglaras (De Montfort University, UK) Lei Wang (Dalian University of Technology, China) Liang Zhou (Nanjing University of Posts and Telecommunications, China) Long D. Nguyen (Dong Nai University, Vietnam) Maggie M. Wang (The University of Hong Kong, Hong Kong) Nghia Duong-Trung (German Research Center for Artificial Intelligence, Germany) Ngo Hoang Tu (Seoul National University of Science and Technology, South Korea) Nguyen Van Nam (Viettel, Vietnam) Nicholas C Romano (Oklahoma State University, USA) Noel Crespi (Institut Mines-Telecom, Telecom SudParis, France) Panlong Yang (PLA University of Science and Technology, China) Pasi Tyrväinen (University of Jyväskylä, Finland) Patrick C.K. Hung (University of Ontario Institute of Technology, Canada) Periklis Chatzimisios (Alexander TEI of Thessaloniki, Greece) Pierluigi Siano (Università degli Studi di Salerno, Italy) Pirkko Walden (Abo Akademi University, Finland) Phuong Bui (Duy Tan University, Vietnam) Raymond Y.K Lau (City University of Hong Kong, Hong Kong) Richard Yu (Carleton University, Canada) Rong Yu (Guangdong University of Technology, China) Rose Hu (Utah State University, USA) Sammy Chan (City University of HongKong, HK) Shing-Chi Cheung (Hong Kong University of Science and Technology, Hong Kong) Stephen J. H. Yang (National Central University, Taiwan) Syed Hassan Ahmed (University of Central Florida, USA) Thanh-Phuong Nguyen (University of Toulon, France) Tran Trung Duy (PTIT, VietNam) Trang Hoang (Ho Chi Minh City University of Technology - Vietnam National University Ho Chi Minh City, Vietnam) Tuan-Minh Pham (Phenikaa University, Vietnam) Umar Zakir Abdul Hamid (Sensible 4 Oy, Helsinki) Victor Leung (The University of British Columbia) Vo Nguyen Son Dr. (Duy Tan University, Vietnam) Wai-Wa Fung (Information Security and Forensics Society, Hong Kong) Walid Gaaloul (Institut National des Télécommunications, France) Weiwei Jiang, (Beijing University of Posts and Telecommunications (BUPT), China) Wendy W. Y. Hui (University of Nottingham at Ningbo, China) William Cheung (Hong Kong Baptist University, Hong Kong) Xianfu Chen (VTT Technical Research Centre of Finland, Finland) Xiang Gui (Massey University, New Zealand) Xiaoling Wu (Chinese Academy of Sciences, China) Xu Wang (Heriot Watt University, UK) Yan Bai (University of Washington Tacoma, USA) Yan Zhang (Simula Research Laboratory and University of Oslo, Norway) Yi Zhuang (Zhejian Gongshang University, China) Yong Li (Tsinghua University, China) Yong Tang (South China Normal University, China) Yuanfang Chen (Institute Mines-Telecom, University Pierre and Marie Curie ) Yuexing Peng (Beijing University of Posts and Telecommunications, China) Yuqing Sun (Shangdong University, China) Zakaria Maamar (Zayed University, UAE) Zhangbing Zhou (China University of Geosciences, China) Zhichao Sheng (Shanghai University, China) ZhiMing Cai (Macau University of Science and Technology, Macau) Mithun Mukherjee (Nanjing University of Information Science and Technology, China) more »
more >>
Journal Blurb
Visit the new journal website to submit and consult our contents: https://publications.eai.eu/index.php/inis/indexVisit the new journal website to submit and consult our contents: https://publications
...
.eai.eu/index.php/inis/index more »
more >>
Publisher
ICST
ISSN
2410-0218
Volume
2
Published
2015-06-04