All Stories

  1. A military genius inspires a better search algorithm
  2. Orthogonal Genetic Algorithm for Efficient Delivery Route Planning in TSP-D
  3. Deep learning for intrusion detection in IoT networks
  4. Enhanced Human Activity Recognition Using Controllable GANs for Synthetic Data Generation
  5. Integrating Deep and Handcrafted Features for Enhanced Remote Sensing Image Classification
  6. A Metaheuristic Perspective on Extracting Numeric Association Rules: Current Works, Applications, and Recommendations
  7. Mutated Aquila Optimizer for assisting brain tumor segmentation
  8. DoS Attack Simulation for Intrusion Detection
  9. Convolutional neural network for intrusion detection using blockchain technology
  10. Intrusion detection based on ensemble learning for big data classification
  11. Intrusion detection in cyber-physical system using rsa blockchain technology
  12. African vultures optimization algorithm based Choquet fuzzy integral for global optimization and engineering design problems
  13. Towards Deep Learning and Blockchain-based Intrusion Detection System
  14. A multi-objective Chaos Game Optimization algorithm based on decomposition and random learning mechanisms for numerical optimization
  15. Efficient e-mail spam filtering approach combining Logistic Regression model and Orthogonal Atomic Orbital Search algorithm
  16. Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey
  17. Distributed deep learning approach for intrusion detection system in industrial control systems based on big data technique and transfer learning
  18. Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques
  19. A deep learning-based intrusion detection approach for mobile Ad-hoc network
  20. On the use of text augmentation for stance and fake news detection
  21. Impact of EIP-1559 on Transactions in the Ethereum Blockchain and Its Rollups
  22. Augmentation-Based Ensemble Learning for Stance and Fake News Detection
  23. Distributed Architecture of an Intrusion Detection System in Industrial Control Systems
  24. Binary Giza Pyramids Construction For Feature Selection
  25. Binary Political Optimizer for Feature Selection Using Gene Expression Data
  26. Chaotic lightning search algorithm
  27. A Unified approach for Selecting Probes and Probing Stations for Fault Detection and Localization in Computer Networks
  28. Fault Localization Algorithm in Computer Networks Based on the Boolean Particle Swarm Optimization
  29. Distributed Architecture of an Intrusion Detection System Based on Cloud Computing and Big Data Techniques
  30. Short term planning for cyclic scheduling: A new approach
  31. Anomaly-based Behavioral Detection in Mobile Ad-Hoc Networks
  32. New online kernel method with the Tabu search algorithm for process monitoring
  33. Heuristic algorithms for scheduling intrees on m machines with non-availability constraints
  34. Routing the Pi-Containers in the Physical Internet using the PI-BGP Protocol
  35. An Improved Tabu Search Meta-heuristic Approach for Solving Scheduling Problem with Non-availability Constraints
  36. Performance Evaluation of IEEE 802.15.6 Channel Access Procedure in WBAN
  37. A two-stage hybrid flow shop problem with dedicated machine and release date
  38. Fast Spatial Spectral Schroedinger Eigenmaps algorithm for hyperspectral feature extraction
  39. Heuristics for the Hybrid Flow Shop Scheduling Problem with Parallel Machines at the First Stage and Two Dedicated Machines at the Second Stage
  40. Modified Graph-Based Algorithm for Efficient Hyperspectral Feature Extraction
  41. Towards a Risk-Aware Business Process Modelling Tool Using the ADOxx Platform
  42. An Effective IDS Against Routing Attacks on Mobile Ad-Hoc Networks
  43. Privacy Preservation and Drone Authentication Using ID-Based Signcryption
  44. Fast and Accurate Fingerprint Matching Using Expanded Delaunay Triangulation
  45. Modified Schroedinger Eigenmap Projections Algorithm for Hyperspectral Imagery Classification
  46. A Hybrid Genetic Algorithm for the Inventory Routing Problem
  47. Neuro-fuzzy and genetic-fuzzy based approaches in intrusion detection: Comparative study
  48. Using MongoDB Databases for Training and Combining Intrusion Detection Datasets
  49. A survey of attacks in mobile ad hoc networks
  50. A survey on attacks in Internet of Things based networks
  51. Assessing and modelling transport delays risk in supply chains
  52. A Genetic-Fuzzy Classification Approach to Improve High-Dimensional Intrusion Detection System
  53. Assessing and modelling transport delays risk in supply chains
  54. Heuristic for Scheduling Intrees on m Machines with Non-availability Constraints
  55. Dynamic Delay Risk Assessing in Supply Chains
  56. Intrusion detection based on genetic fuzzy classification system
  57. A mixed integer linear programming approach to schedule the operating room
  58. Dynamic delay risk assessing using cost-based FMEA for transportation systems
  59. Makespan minimization for two parallel machines with unavailability constraints
  60. Mathematical programming formulations for hybrid flow shop scheduling with parallel machines at the first stage and two dedicated machines at the second stage
  61. Combining intrusion detection datasets using MapReduce
  62. On-line fault diagnosis of FMS based on flows analysis
  63. Intrusion detection based on Neuro-Fuzzy classification
  64. A new approach for loop machine layout problem integrating proximity constraints
  65. Monitoring dynamic risk evolutions in operational flows of a supply chain
  66. Solving airport gate assignment problem using Genetic Algorithms approach
  67. Scheduling UECT trees with Communication Delays on Two Processors with Unavailabilities
  68. On the performance of the base-stock inventory system under a compound Erlang demand distribution
  69. A min-max ANT colony algorithm for machine loop layout problem
  70. A Multi-Agent System to Solve a New Formulation of Machine Layout Problem
  71. A hybrid genetic algorithm for solving machine layout problem with consideration of industrial constraints
  72. Double chaining approach for indirect monitoring of FMS under cyclic scheduling
  73. Mathematical model for cyclic scheduling with work-in-process minimization
  74. Transient inter-production scheduling based on Petri nets and constraint programming
  75. DESIGN AND IMPLEMENTATION OF A GLOBAL SCHEDULING STRATEGY FOR DATA DISTRIBUTION OVER CAN-BASED NETWORKS
  76. A Mathematical Model for Cyclic Scheduling with Assembly Tasks and Work-In-Process Minimization
  77. A mathematical model for cyclic scheduling with assembly tasks and Work-In-Process minimization
  78. Container handling using multi-agent architecture
  79. Intrusion detection based on “Hybrid” propagation in Bayesian Networks
  80. Cyclic scheduling for F.M.S.: Modelling and evolutionary solving approach
  81. A Framework for an Adaptive Intrusion Detection System using Bayesian Network
  82. A distributed transient inter-production scheduling for flexible manufacturing systems
  83. Quality of service of internet service provider networks: State of the art and new trends
  84. Formal Approach of FMS Cyclic Scheduling
  85. Multi-Agent Scheduling Transient Inter-Production States for Many Cyclic Productions
  86. Cyclic Productions planning
  87. Cyclic Productions planning
  88. Scheduling analysis of FMS: An unfolding timed Petri nets approach
  89. Introduction
  90. A MATHEMATICAL MODEL FOR CYCLIC SCHEDULING WITH WORK-IN-PROGRESS MINIMIZATION
  91. FORMALISING AN AGENT-BASED CONTAINER STACKING MODEL VIA PETRI NETS
  92. Indirect monitoring of the failures of a flexible manufacturing system under cyclic scheduling
  93. Integration of FMS performance evaluation models using patterns for an information system design
  94. Modeling and scheduling of ratio-driven FMS using unfolding time Petri nets
  95. Patrons de conception UML appliqués aux modèles d'ordonnancement des systèmes automatisés de production
  96. Intra-cell machine layout associated with flexible production and transport systems
  97. Two FMS scheduling methods based on Petri nets: A global and a local approach
  98. Discussion on: ‘Solving Transient Scheduling Problems with Constraint Programming’ by O. Korbaa, P. Yim, and J.-C. Gentina
  99. Solving Transient Scheduling Problems with Constraint Programming
  100. Solving transient scheduling problem for cyclic production using timed Petri nets and constraint programming
  101. Cyclic Production Scheduling
  102. Container Handling Using Multi-agent Architecture
  103. Container assignment to stock in a fluvial port
  104. Reachability search in timed Petri nets using constraint programming
  105. Modeling and analysis of cycle schedule using Petri nets unfolding
  106. DIDFAST.BN: Distributed Intrusion Detection And Forecasting Multiagent System using Bayesian Network
  107. An UML based approach for interfacing expert models
  108. Machine layout problem in FMS design
  109. Heuristic for the resolution of the general FMS cyclic scheduling problem
  110. Transient state study for cyclic schedules: bounds and optimization
  111. Formal approach of fms cyclic scheduling