Zobrazeno 1 - 10
of 543
pro vyhledávání: '"Galatro, A."'
Predicting the behavior of real-time traffic (e.g., VoIP) in mobility scenarios could help the operators to better plan their network infrastructures and to optimize the allocation of resources. Accordingly, in this work the authors propose a forecas
Externí odkaz:
http://arxiv.org/abs/2307.06645
Autor:
Daniela Galatro, Maria Jacome, Melanie Jeffrey, Vincenzo Costanzo-Alvarez, Jason Bazylak, Cristina H. Amon
Publikováno v:
Societal Impacts, Vol 3, Iss , Pp 100035- (2024)
Different soil and water pollution sources around an undisclosed First Nation (The FN) in Northern Ontario (Canada) are linked by community health documents and oral histories to a cluster of blood cancer. The site's environmental hydrogeochemical re
Externí odkaz:
https://doaj.org/article/97d9d53d9a8d43f8b09b02bca124643b
Publikováno v:
Frontiers in Education, Vol 9 (2024)
Research demonstrates a predominantly negative public perception of the oil and gas (O&G) industry, regardless of initiatives created to minimize the environmental impact. This might be attributed to a lack of open communication and debate spaces whe
Externí odkaz:
https://doaj.org/article/0d1f1cce87aa4779b1c310eb1880b474
Publikováno v:
In Computer Networks April 2024 243
Service provisioning mechanisms implemented across 5G infrastructures take broadly into use the network service chain concept. Typically, it is coupled with Network Function Virtualization (NFV) paradigm, and consists in defining a pre-determined pat
Externí odkaz:
http://arxiv.org/abs/2105.09004
Most softwarized telco services are conveniently framed as Service Function Chains (SFCs). Indeed, being structured as a combination of interconnected nodes, service chains may suffer from the single point of failure problem, meaning that an individu
Externí odkaz:
http://arxiv.org/abs/2104.10135
Publikováno v:
Engineering Applications of Artificial Intelligence Volume 101, May 2021, 104216
Machine Learning (ML) techniques are becoming an invaluable support for network intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats. Typically, ML algorithms are exploited to classify/recognize data traffic on
Externí odkaz:
http://arxiv.org/abs/2104.04958
Publikováno v:
Forces in Mechanics, Vol 13, Iss , Pp 100233- (2023)
While several theoretical and experimental studies for cracks in piping exist, most pertain to pipelines, equipment, or fittings under pressure conditions or under stress corrosion conditions at welding. Element finite Method models have occasionally
Externí odkaz:
https://doaj.org/article/0a89af559ac24bf88e02da621ef9a761
Publikováno v:
In Forces in Mechanics December 2023 13
The use of Machine Learning (ML) techniques in Intrusion Detection Systems (IDS) has taken a prominent role in the network security management field, due to the substantial number of sophisticated attacks that often pass undetected through classic ID
Externí odkaz:
http://arxiv.org/abs/2009.09011