About
|
Contact Us
|
Register
|
Login
Proceedings
Series
Journals
Search
EAI
ISSN:
2410-0218
Submit Article
Submission Instructions
Ethics and Malpractice Statement
Back to Journal Page
2024
Issue 2
Issue 1
2024
Issue 4
Issue 3
Issue 2
Issue 1
2023
Issue 4
Issue 3
Issue 1
2022
Issue 4
Issue 32
Issue 31
Issue 30
2021
Issue 29
Issue 28
Issue 27
Issue 26
2020
Issue 25
Issue 24
Issue 23
Issue 22
2019
Issue 21
Issue 20
Issue 19
Issue 18
2018
Issue 17
Issue 16
Issue 15
Issue 14
2017
Issue 13
Issue 12
Issue 11
Issue 10
2016
Issue 9
Issue 8
Issue 7
Issue 6
2015
Issue 5
Issue 4
Issue 3
Issue 2
2014
Issue 1
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems
Issue 18, 2019
Editor(s)-in-Chief:
Trung Q. Duong
and
Le Nguyen Bao
Articles
Information
Exact Outage Analysis of Cognitive Energy Harvesting Relaying Networks under Physical Layer Security
Appears in:
inis
19
(
18
)
:
e1
Authors:
Sang Quang Nguyen, Huy T. Nguyen, Dong Doan Van, Won-Joo Hwang
Abstract:
In this paper, we study the secure communication of cognitive energy harvesting relay networks when there exist multiple eaves droppers who can overhear the message of the second hop, and multiple pri
...
mary users are present. The data transmission from the secondary source to the secondary destinatio…In this paper, we study the secure communication of cognitive energy harvesting relay networks when there exist multiple eaves droppers who can overhear the message of the second hop, and multiple primary users are present. The data transmission from the secondary source to the secondary destination is assisted by the best decode-and-forward relay, which is selected by means of three relay selection schemes. We study the system security performance by deriving the exact analytical secrecy outage probability. These analytical expressions are then verified by comparison to the results of Monte Carlo simulations. Herein we evaluate and discuss the outage performance of the three schemes under variations in important system parameters: the number and locations of relay nodes, primary user nodes, and eavesdroppers; the transmit power threshold; the energy harvesting efficiency coefficient; the power splitting ratio; and the target secure rate. more »
more >>
Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming
Appears in:
inis
19
(
18
)
:
e2
Authors:
Dang The Hung, Tran Trung Duy, Do Quoc Trinh
Abstract:
In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to
...
the destination by using a cluster-based multi-hop transmission scheme with the assistance of clust…In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by using a cluster-based multi-hop transmission scheme with the assistance of cluster heads (CHs). With presence of an eavesdropper, a cooperative harvest-to-jam technique is employed to reduce the quality of the eavesdropping channels. Particularly, each cluster randomly selects a cluster node that generates artificial noises on the eavesdropper. For performance evaluation, we derive exact closed-form expressions of outage probability (OP) and intercept probability (IP) over Rayleigh fading channels. We then perform Monte Carlo simulations to verify the theoretical results, and compare the performance of the proposed scheme with that of the conventional LEACH scheme without using the jamming technique. more »
more >>
A Machine Vision Based Automatic Optical Inspection System for Detecting Defects of Rubber Keypads of Scanning Machine
Appears in:
inis
19
(
18
)
:
e3
Authors:
Huan Ngoc Le, Ngoc Vuong Bao Tu
Abstract:
In order to detect defective rubber keypads, factories have to devote massive manpower and financial resources. In this paper, a vision-based system for the detection of a number of rubber keypad defe
...
cts is designed and developed. To improve the lens distortion rectification, a novel, easy calibrat…In order to detect defective rubber keypads, factories have to devote massive manpower and financial resources. In this paper, a vision-based system for the detection of a number of rubber keypad defects is designed and developed. To improve the lens distortion rectification, a novel, easy calibration method using image local transformations defined by both sets of points that are detected in the distorted image and the undistorted ones without using any model for a wideangle and low- cost lens camera was proposed. The system detects the defects of 14 different types of rubber keypads quickly (~within about 1.8 seconds) and accurately even with a normal laptop and a low-price webcam. more »
more >>
Innovative Application of 5G and Blockchain Technology in Industry 4.0
Appears in:
inis
19
(
18
)
:
e4
Authors:
Ivan Jovović, Siniša Husnjak, Ivan Forenbacher, Sven Maček
Abstract:
The Industry 4.0 is experiencing significant challenges, including the need for an increased amount of data transmission with improved security, transparency and credibility. The 5th Generation Mobile
...
Network (5G) and Blockchain are innovative emerging technologies that can respond to these needs. …The Industry 4.0 is experiencing significant challenges, including the need for an increased amount of data transmission with improved security, transparency and credibility. The 5th Generation Mobile Network (5G) and Blockchain are innovative emerging technologies that can respond to these needs. 5G will enable extremely large channel capacities and reduce data latency, while Blockchain's innovative data-sharing mode of operation delivers an improved high level of security, transparency, and credibility of stored data. Therefore, this paper presents a general survey of the potential application of 5G network and Blockchain technology in Industry 4.0. The results may be used by first-movers firms for gaining technological leadership on the market. more »
more >>
Data network related to an object manufacturing inside of exerted Intelligent System
Appears in:
inis
19
(
18
)
:
e5
Authors:
Katarina Monkova, Peter Monka, Miorita Ungureanu, Nicolae Ungureanu, Oleksandr Gusak, Milan Edl
Abstract:
Most of today’s information systems are not fully integrated. Companies, suppliers, and customers are rarely closely linked. Functions within a chain from the enterprise to the shop floor level are no
...
t fully integrated. Even in the engineering itself lacks complete integration - from products to pl…Most of today’s information systems are not fully integrated. Companies, suppliers, and customers are rarely closely linked. Functions within a chain from the enterprise to the shop floor level are not fully integrated. Even in the engineering itself lacks complete integration - from products to plants to automation. With Industry 4.0, companies, departments, functions, and capabilities will become much more cohesive, as cross-company, universal data-integration networks evolve and enable truly automated value chains. The article deals with specification of data flow related to an object manufacturing inside of information system for Industry 4.0. There are described basic characteristics of both data flow in this paper. An older one, which was used in the past, but it can be found also in current practice, as well as new approach to data flow using STEP NC (a machine tool control language). A reliable information system is one of the necessities to be the data flow in a company continuous. Due to this reason, authors designed software application based on concept Industry 4.0 that should help to improve productivity and labour efficiency in the company. Basic principles of object coding system that are included inside newly developed information system, are elaborated in the next part of the article. more »
more >>
Scope
Along with the fast development of computer technologies, e.g., ubiquitous computing, cloud computing and cyber-physical system, all kinds of networks (e.g., control network, communication network, se
...
nsor network, body area network, social network, opportunistic network, cloud-based network, etc.) …Along with the fast development of computer technologies, e.g., ubiquitous computing, cloud computing and cyber-physical system, all kinds of networks (e.g., control network, communication network, sensor network, body area network, social network, opportunistic network, cloud-based network, etc.) appeared and were applied in large-scale factories, including a lot of traditional and new industries, e.g., textile industry, coal industry, mining industry, steel industry, machinery industry, petrochemical industry, and biomedical industry, etc. Assisted by various industrial networks, automation in industry can reduce cost greatly because it takes advantage of control systems and information technologies to optimize productivity in the production of goods and delivery of services. However, the industrial environment is dynamic and harsh usually, including extreme temperature, humidity, electromagnetic interference and vibration, which proposed specific requirements to intelligent industrial systems under certain circumstances. All these highlight the criticality of the design, analysis and implementation of intelligent industrial systems. more »
more >>
Topics
Applications of wireless sensor networks, body area networks in large-scale industrial applications, such as fault theories of wireless networks, including routing, network control and management, rel
...
iable transmission and architectures, etc. Applications of social networking, big data, ubiqui… Applications of wireless sensor networks, body area networks in large-scale industrial applications, such as fault theories of wireless networks, including routing, network control and management, reliable transmission and architectures, etc. Applications of social networking, big data, ubiquitous computing, mobile computing, and cloud computing in various industries and services (e.g., intelligent systems enhanced by social networking, cloud-based industrial networks, cloud-assisted intelligent systems, etc.) Analysis of industrial control and communication networks, including network lifetime, security, network scalability, reliability, stability, etc. Design and choice of industrial, intelligent, application-specific network protocols and algorithms (e.g., EtherNet/IP, Ethernet Powerlink, EtherCAT, Modbus-TCP, Profinet, SERCOS III, etc.) at any communication layer Opportunistic networks in the industry, such as underwater sensor networks in sewage treatment systems, including establishing a temporary data transmission structure using available devices (e.g., underwater robot, surface data station, surface sink and under water sink), optimizing horizontal multi-hop data links (e.g., 3D data transmission), etc. Applications of intelligent systems in various industries, including collaborative systems, quality control, optimization, decision support, planning, high-level control concepts (e.g., multi-agent and holonic systems, service-oriented architectures), low-level control concepts (e.g., IEC 61131-3 and IEC 61499-based control), advanced system engineering concepts (e.g., model-driven development, component-based design), supply chains, value chains, virtual organizations, and virtual societies, emergency preparedness, crisis management, business channels, electronic marketplaces, enterprise resources planning, etc. Design and analysis of real-time embedded industrial systems, including real-time computing, real-time operating systems, real-time communications, networked embedded systems technology, etc. Novel control techniques, with respect to process control, equipment control, supervisory control, adaptive control, motion control, etc. Automated manufacturing systems, regarding formal modeling and analysis of manufacturing systems, scheduling of manufacturing systems, queuing systems and petri nets in manufacturing systems, etc. Computational intelligence in automation, including neural, fuzzy, evolutionary approaches in automation, ant colonies optimization and swarm intelligence in automation, machine learning, expert systems, etc. Hardware and software design and development for intelligent systems, such as intelligent and humanized production monitoring and control, etc. Big data analysis and processing in various industries and services, including constructing data analysis models, providing data analysis and processing tools and designing various optimization algorithms based on data analysis. Crowd-sourced behavior analysis in various industry and services, such as measuring and calculating the diffusion direction and speed of gas in the petrochemical industry based on crowd-sourced data from a large number of and various types of sensors, as well as product and service evaluation. Simulation and testbed of current industrial networks and intelligent systems, including network performance analysis, automated manufacturing, intelligent monitoring, disaster prevention, etc. Vision of future smart factories, service, marketing, and their integration, incorporating current existing technologies. Multimedia applications, content management, process management and knowledge management for various industries, services, and engineering education: including multimedia processing, multimedia retrieval, multimedia indexing, image sensing, image processing, image coding, image recognition, etc. Pattern recognition methods for various industries and services: including statistical theory, clustering, similarity measures, unsupervised learning, supervised learning, etc. Survey, review and essay of current industrial networks researches and intelligent systems development. more »
more >>
Indexing
Scopus DOAJ DBLP CrossRef [OCLC Discovery Services](https://www.worldcat.org/search?q=eai+endorsed+tran… Scopus DOAJ DBLP CrossRef OCLC Discovery Services EuroPub Publons Dimensions Publicly Availabl
...
e Content Database (ProQuest) Advanced Technologies & Aerospace Database (ProQuest) SciTech Premium Collection (ProQuest) Google Scholar more »
more >>
Editorial Board
Ala Al-Fuqaha (Western Michigan University, USA) Al-Sakib Khan Pathan (Southeast University, Bangladesh) Ammar Rayes (Cisco Systems, USA) Antonino Masaracchia (IIT-CNR, Italy) Athanasios Maglaras (Dr,
...
Prof . ofT.E.I. of Larissa) Berk Canberk (Northeastern University, USA) Ca V. Phan (… Ala Al-Fuqaha (Western Michigan University, USA) Al-Sakib Khan Pathan (Southeast University, Bangladesh) Ammar Rayes (Cisco Systems, USA) Antonino Masaracchia (IIT-CNR, Italy) Athanasios Maglaras (Dr, Prof . ofT.E.I. of Larissa) Berk Canberk (Northeastern University, USA) Ca V. Phan (Ho Chi Minh City University of Technology and Education, Vietnam) Chau Yuen (Singapore University of Technology and Design, Singapore) Chengfei Liu (Swinburne University of Technology, Australia) Chinmoy Kundu (University of Texas at Dallas, USA) Christer Carlsson (Åbo Akademi University, Finland) Chunsheng Zhu (University of British Columbia) Constandinos Mavromoustakis (University of Nicosia, Cyprus) Der-Jiunn Deng (National Changhua University of Education, Taiwan) Dickson Chiu (The University of Hong Kong) Eleanna Kafeza (Athens University of Economics and Business, Greece) Fu-ren Lin (National Tsing Hua University, Taiwan) Gerhard Hancke (University of London, UK) Guangjie Han (Hohai University, China) Guojun Wang (Central South University, China) Hacene Fouchal (University of Reims Champagne-Ardenne, France) Haklae Kim (Chung-Ang University, South Korea) Halil Yetgin (Bitlis Eren University, Turkey) Hideyasu Sasaki (Ritsumeikan University, Kyoto, Japan) Ho-fung Leung (Chinese University of Hong Kong, Hong Kong) Honggang Wang (University of Massachusetts Dartmouth, USA) Hua Hu (Hangzhou Dianzi University, China) Ibrahim Kushchu (Mobile Government Consortium International, UK) Irene Kafeza (Irene Law Office, Greece) Isabelle Comyn-Wattiau (ESSEC Business School Paris, France) Jaime Lloret- Mauri (Universitat Politècnica de València, Spain) Javier M. Aguiar (Universidad de Valladolid, Valladolid, Spain) Jesus Alonso-Zarate (Telecommunications Technology Center of Catalonia, Spain) Jian Yang (Macquarie University, Australia) Jiankun Hu (University of New South Wales, Australia) Jianmin Jiang (Shenzhen University) Jianwei Niu (Beihang University, China) Jinlei Jiang (Tsinghua University, China) Jinsong Wu (Bell Laboratory, China) Joel Rodrigues (Inst. Telecomunicações, Univ. of Beira Interior, Portugal) Juan Trujillo (University of Alicante, Spain) Jucheng Yang (Tianjing University of Technology, China) Junqing Zhang (Queen's University Belfast) KUN WANG (Nanjing University of Posts and Telecommunications) Kuo-Ming Chao (Leader – Distributed Systems and Modelling Research Group, UK) Leandros A. Maglaras (De Montfort University, UK) Lei Wang (Dalian University of Technology, China) Liang Zhou (Nanjing University of Posts and Telecommunications, China) Long D. Nguyen (Dong Nai University, Vietnam) Maggie M. Wang (The University of Hong Kong, Hong Kong) Nghia Duong-Trung (German Research Center for Artificial Intelligence, Germany) Ngo Hoang Tu (Seoul National University of Science and Technology, South Korea) Nguyen Van Nam (Viettel, Vietnam) Nicholas C Romano (Oklahoma State University, USA) Noel Crespi (Institut Mines-Telecom, Telecom SudParis, France) Panlong Yang (PLA University of Science and Technology, China) Pasi Tyrväinen (University of Jyväskylä, Finland) Patrick C.K. Hung (University of Ontario Institute of Technology, Canada) Periklis Chatzimisios (Alexander TEI of Thessaloniki, Greece) Pierluigi Siano (Università degli Studi di Salerno, Italy) Pirkko Walden (Abo Akademi University, Finland) Phuong Bui (Duy Tan University, Vietnam) Raymond Y.K Lau (City University of Hong Kong, Hong Kong) Richard Yu (Carleton University, Canada) Rong Yu (Guangdong University of Technology, China) Rose Hu (Utah State University, USA) Sammy Chan (City University of HongKong, HK) Shing-Chi Cheung (Hong Kong University of Science and Technology, Hong Kong) Stephen J. H. Yang (National Central University, Taiwan) Syed Hassan Ahmed (University of Central Florida, USA) Thanh-Phuong Nguyen (University of Toulon, France) Tran Trung Duy (PTIT, VietNam) Trang Hoang (Ho Chi Minh City University of Technology - Vietnam National University Ho Chi Minh City, Vietnam) Tuan-Minh Pham (Phenikaa University, Vietnam) Umar Zakir Abdul Hamid (Sensible 4 Oy, Helsinki) Victor Leung (The University of British Columbia) Vo Nguyen Son Dr. (Duy Tan University, Vietnam) Wai-Wa Fung (Information Security and Forensics Society, Hong Kong) Walid Gaaloul (Institut National des Télécommunications, France) Weiwei Jiang, (Beijing University of Posts and Telecommunications (BUPT), China) Wendy W. Y. Hui (University of Nottingham at Ningbo, China) William Cheung (Hong Kong Baptist University, Hong Kong) Xianfu Chen (VTT Technical Research Centre of Finland, Finland) Xiang Gui (Massey University, New Zealand) Xiaoling Wu (Chinese Academy of Sciences, China) Xu Wang (Heriot Watt University, UK) Yan Bai (University of Washington Tacoma, USA) Yan Zhang (Simula Research Laboratory and University of Oslo, Norway) Yi Zhuang (Zhejian Gongshang University, China) Yong Li (Tsinghua University, China) Yong Tang (South China Normal University, China) Yuanfang Chen (Institute Mines-Telecom, University Pierre and Marie Curie ) Yuexing Peng (Beijing University of Posts and Telecommunications, China) Yuqing Sun (Shangdong University, China) Zakaria Maamar (Zayed University, UAE) Zhangbing Zhou (China University of Geosciences, China) Zhichao Sheng (Shanghai University, China) ZhiMing Cai (Macau University of Science and Technology, Macau) Mithun Mukherjee (Nanjing University of Information Science and Technology, China) more »
more >>
Journal Blurb
Visit the new journal website to submit and consult our contents: https://publications.eai.eu/index.php/inis/indexVisit the new journal website to submit and consult our contents: https://publications
...
.eai.eu/index.php/inis/index more »
more >>
Publisher
EAI
ISSN
2410-0218
Volume
6
Published
2019-03-28