Sign Up to like & get
recommendations!
0
Published in 2025 at "Applied Intelligence"
DOI: 10.1007/s10489-025-06422-4
Abstract: Globally, cyberattacks are growing and mutating each month. Intelligent Intrusion Network Detection Systems are developed to analyze and detect anomalous traffic to face these threats. A way to address this is by using network flows,…
read more here.
Keywords:
detection;
algorithms network;
intrusion detection;
network flow ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Journal of Cleaner Production"
DOI: 10.1016/j.jclepro.2018.10.165
Abstract: Abstract An overview of relevant literature shows how supply chain and network flow models represent useful tools in the area of clean energy generation and processing related waste. This paper deals with a specific network…
read more here.
Keywords:
network flow;
waste;
waste producers;
contribution ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "IEEE/CAA Journal of Automatica Sinica"
DOI: 10.1109/jas.2019.1911705
Abstract: In this paper, we use the cycle basis from graph theory to reduce the size of the decision variable space of optimal network flow problems by eliminating the aggregated flow conservation constraint. We use a…
read more here.
Keywords:
cycle;
network flow;
formulation;
flow problems ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Power Systems"
DOI: 10.1109/tpwrs.2021.3100560
Abstract: Reducing uplift payments has been a challenging problem for most wholesale markets in the U.S. The main difficulty comes from the discrete decision-making and non-linear objective function in the unit commitment (UC) problem. Recently, the…
read more here.
Keywords:
flow based;
network flow;
convex hull;
hull pricing ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "PLoS ONE"
DOI: 10.1371/journal.pone.0225371
Abstract: Background Melanoma survivors often do not engage in adequate sun protection, leading to sunburn and increasing their risk of future melanomas. Melanoma survivors do not accurately recall the extent of sun exposure they have received,…
read more here.
Keywords:
sun exposure;
time;
self;
sun ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2025 at "Applied Sciences"
DOI: 10.3390/app152111574
Abstract: In the context of cybersecurity digital twin environments, the ability to simulate realistic network traffic is critical for validating and training intrusion detection systems. However, generating synthetic data that accurately reflects the complex, time-dependent nature…
read more here.
Keywords:
cybersecurity digital;
flow data;
network flow;
network ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2024 at "Mathematics"
DOI: 10.3390/math12243923
Abstract: Herd effect is a widespread phenomenon in real-world situations. This study explores how the herd effect can be used to manage network flow effectively. We examined its impact on travelers’ route choices and propose a…
read more here.
Keywords:
network flow;
herd effect;
effect;
level optimization ... See more keywords