All Stories

  1. Orthogonal Genetic Algorithm for Efficient Delivery Route Planning in TSP-D
  2. Deep learning for intrusion detection in IoT networks
  3. Enhanced Human Activity Recognition Using Controllable GANs for Synthetic Data Generation
  4. Integrating Deep and Handcrafted Features for Enhanced Remote Sensing Image Classification
  5. A Metaheuristic Perspective on Extracting Numeric Association Rules: Current Works, Applications, and Recommendations
  6. Mutated Aquila Optimizer for assisting brain tumor segmentation
  7. DoS Attack Simulation for Intrusion Detection
  8. Convolutional neural network for intrusion detection using blockchain technology
  9. Intrusion detection based on ensemble learning for big data classification
  10. Intrusion detection in cyber-physical system using rsa blockchain technology
  11. African vultures optimization algorithm based Choquet fuzzy integral for global optimization and engineering design problems
  12. Towards Deep Learning and Blockchain-based Intrusion Detection System
  13. A multi-objective Chaos Game Optimization algorithm based on decomposition and random learning mechanisms for numerical optimization
  14. Efficient e-mail spam filtering approach combining Logistic Regression model and Orthogonal Atomic Orbital Search algorithm
  15. Advances in nature-inspired metaheuristic optimization for feature selection problem: A comprehensive survey
  16. Distributed deep learning approach for intrusion detection system in industrial control systems based on big data technique and transfer learning
  17. Real-time data fusion for intrusion detection in industrial control systems based on cloud computing and big data techniques
  18. A deep learning-based intrusion detection approach for mobile Ad-hoc network
  19. On the use of text augmentation for stance and fake news detection
  20. Impact of EIP-1559 on Transactions in the Ethereum Blockchain and Its Rollups
  21. Augmentation-Based Ensemble Learning for Stance and Fake News Detection
  22. Distributed Architecture of an Intrusion Detection System in Industrial Control Systems
  23. Binary Giza Pyramids Construction For Feature Selection
  24. Binary Political Optimizer for Feature Selection Using Gene Expression Data
  25. Chaotic lightning search algorithm
  26. A Unified approach for Selecting Probes and Probing Stations for Fault Detection and Localization in Computer Networks
  27. Fault Localization Algorithm in Computer Networks Based on the Boolean Particle Swarm Optimization
  28. Distributed Architecture of an Intrusion Detection System Based on Cloud Computing and Big Data Techniques
  29. Short term planning for cyclic scheduling: A new approach
  30. Anomaly-based Behavioral Detection in Mobile Ad-Hoc Networks
  31. New online kernel method with the Tabu search algorithm for process monitoring
  32. Heuristic algorithms for scheduling intrees on m machines with non-availability constraints
  33. Routing the Pi-Containers in the Physical Internet using the PI-BGP Protocol
  34. An Improved Tabu Search Meta-heuristic Approach for Solving Scheduling Problem with Non-availability Constraints
  35. Performance Evaluation of IEEE 802.15.6 Channel Access Procedure in WBAN
  36. A two-stage hybrid flow shop problem with dedicated machine and release date
  37. Fast Spatial Spectral Schroedinger Eigenmaps algorithm for hyperspectral feature extraction
  38. Heuristics for the Hybrid Flow Shop Scheduling Problem with Parallel Machines at the First Stage and Two Dedicated Machines at the Second Stage
  39. Modified Graph-Based Algorithm for Efficient Hyperspectral Feature Extraction
  40. Towards a Risk-Aware Business Process Modelling Tool Using the ADOxx Platform
  41. An Effective IDS Against Routing Attacks on Mobile Ad-Hoc Networks
  42. Privacy Preservation and Drone Authentication Using ID-Based Signcryption
  43. Fast and Accurate Fingerprint Matching Using Expanded Delaunay Triangulation
  44. Modified Schroedinger Eigenmap Projections Algorithm for Hyperspectral Imagery Classification
  45. A Hybrid Genetic Algorithm for the Inventory Routing Problem
  46. Neuro-fuzzy and genetic-fuzzy based approaches in intrusion detection: Comparative study
  47. Using MongoDB Databases for Training and Combining Intrusion Detection Datasets
  48. A survey of attacks in mobile ad hoc networks
  49. A survey on attacks in Internet of Things based networks
  50. Assessing and modelling transport delays risk in supply chains
  51. A Genetic-Fuzzy Classification Approach to Improve High-Dimensional Intrusion Detection System
  52. Assessing and modelling transport delays risk in supply chains
  53. Heuristic for Scheduling Intrees on m Machines with Non-availability Constraints
  54. Dynamic Delay Risk Assessing in Supply Chains
  55. Intrusion detection based on genetic fuzzy classification system
  56. A mixed integer linear programming approach to schedule the operating room
  57. Dynamic delay risk assessing using cost-based FMEA for transportation systems
  58. Makespan minimization for two parallel machines with unavailability constraints
  59. Mathematical programming formulations for hybrid flow shop scheduling with parallel machines at the first stage and two dedicated machines at the second stage
  60. Combining intrusion detection datasets using MapReduce
  61. On-line fault diagnosis of FMS based on flows analysis
  62. Intrusion detection based on Neuro-Fuzzy classification
  63. A new approach for loop machine layout problem integrating proximity constraints
  64. Monitoring dynamic risk evolutions in operational flows of a supply chain
  65. Solving airport gate assignment problem using Genetic Algorithms approach
  66. Scheduling UECT trees with Communication Delays on Two Processors with Unavailabilities
  67. On the performance of the base-stock inventory system under a compound Erlang demand distribution
  68. A min-max ANT colony algorithm for machine loop layout problem
  69. A Multi-Agent System to Solve a New Formulation of Machine Layout Problem
  70. A hybrid genetic algorithm for solving machine layout problem with consideration of industrial constraints
  71. Double chaining approach for indirect monitoring of FMS under cyclic scheduling
  72. Mathematical model for cyclic scheduling with work-in-process minimization
  73. Transient inter-production scheduling based on Petri nets and constraint programming
  74. DESIGN AND IMPLEMENTATION OF A GLOBAL SCHEDULING STRATEGY FOR DATA DISTRIBUTION OVER CAN-BASED NETWORKS
  75. A Mathematical Model for Cyclic Scheduling with Assembly Tasks and Work-In-Process Minimization
  76. A mathematical model for cyclic scheduling with assembly tasks and Work-In-Process minimization
  77. Container handling using multi-agent architecture
  78. Intrusion detection based on “Hybrid” propagation in Bayesian Networks
  79. Cyclic scheduling for F.M.S.: Modelling and evolutionary solving approach
  80. A Framework for an Adaptive Intrusion Detection System using Bayesian Network
  81. A distributed transient inter-production scheduling for flexible manufacturing systems
  82. Quality of service of internet service provider networks: State of the art and new trends
  83. Formal Approach of FMS Cyclic Scheduling
  84. Multi-Agent Scheduling Transient Inter-Production States for Many Cyclic Productions
  85. Cyclic Productions planning
  86. Cyclic Productions planning
  87. Scheduling analysis of FMS: An unfolding timed Petri nets approach
  88. Introduction
  89. A MATHEMATICAL MODEL FOR CYCLIC SCHEDULING WITH WORK-IN-PROGRESS MINIMIZATION
  90. FORMALISING AN AGENT-BASED CONTAINER STACKING MODEL VIA PETRI NETS
  91. Indirect monitoring of the failures of a flexible manufacturing system under cyclic scheduling
  92. Integration of FMS performance evaluation models using patterns for an information system design
  93. Modeling and scheduling of ratio-driven FMS using unfolding time Petri nets
  94. Patrons de conception UML appliqués aux modèles d'ordonnancement des systèmes automatisés de production
  95. Intra-cell machine layout associated with flexible production and transport systems
  96. Two FMS scheduling methods based on Petri nets: A global and a local approach
  97. Discussion on: ‘Solving Transient Scheduling Problems with Constraint Programming’ by O. Korbaa, P. Yim, and J.-C. Gentina
  98. Solving Transient Scheduling Problems with Constraint Programming
  99. Solving transient scheduling problem for cyclic production using timed Petri nets and constraint programming
  100. Cyclic Production Scheduling
  101. Container Handling Using Multi-agent Architecture
  102. Container assignment to stock in a fluvial port
  103. Reachability search in timed Petri nets using constraint programming
  104. Modeling and analysis of cycle schedule using Petri nets unfolding
  105. DIDFAST.BN: Distributed Intrusion Detection And Forecasting Multiagent System using Bayesian Network
  106. An UML based approach for interfacing expert models
  107. Machine layout problem in FMS design
  108. Heuristic for the resolution of the general FMS cyclic scheduling problem
  109. Transient state study for cyclic schedules: bounds and optimization
  110. Formal approach of fms cyclic scheduling