Zobrazeno 1 - 10
of 542
pro vyhledávání: '"Galatro A"'
Predicting the behavior of real-time traffic (e.g., VoIP) in mobility scenarios could help the operators to better plan their network infrastructures and to optimize the allocation of resources. Accordingly, in this work the authors propose a forecas
Externí odkaz:
http://arxiv.org/abs/2307.06645
Publikováno v:
Frontiers in Education, Vol 9 (2024)
Research demonstrates a predominantly negative public perception of the oil and gas (O&G) industry, regardless of initiatives created to minimize the environmental impact. This might be attributed to a lack of open communication and debate spaces whe
Externí odkaz:
https://doaj.org/article/0d1f1cce87aa4779b1c310eb1880b474
Service provisioning mechanisms implemented across 5G infrastructures take broadly into use the network service chain concept. Typically, it is coupled with Network Function Virtualization (NFV) paradigm, and consists in defining a pre-determined pat
Externí odkaz:
http://arxiv.org/abs/2105.09004
Publikováno v:
In Computer Networks April 2024 243
Most softwarized telco services are conveniently framed as Service Function Chains (SFCs). Indeed, being structured as a combination of interconnected nodes, service chains may suffer from the single point of failure problem, meaning that an individu
Externí odkaz:
http://arxiv.org/abs/2104.10135
Publikováno v:
Engineering Applications of Artificial Intelligence Volume 101, May 2021, 104216
Machine Learning (ML) techniques are becoming an invaluable support for network intrusion detection, especially in revealing anomalous flows, which often hide cyber-threats. Typically, ML algorithms are exploited to classify/recognize data traffic on
Externí odkaz:
http://arxiv.org/abs/2104.04958
Publikováno v:
Forces in Mechanics, Vol 13, Iss , Pp 100233- (2023)
While several theoretical and experimental studies for cracks in piping exist, most pertain to pipelines, equipment, or fittings under pressure conditions or under stress corrosion conditions at welding. Element finite Method models have occasionally
Externí odkaz:
https://doaj.org/article/0a89af559ac24bf88e02da621ef9a761
Publikováno v:
In Forces in Mechanics December 2023 13
Autor:
P Espinoza-Vasquez, Alexander, Galatro, Daniela, Gonzalez, Yris, Angulo, Wilfredo, J Álava-Intriago, Juan, Manzano, Patricia, Rodríguez Hernández, Manuel
Publikováno v:
In Journal of Food Engineering November 2023 357
The use of Machine Learning (ML) techniques in Intrusion Detection Systems (IDS) has taken a prominent role in the network security management field, due to the substantial number of sophisticated attacks that often pass undetected through classic ID
Externí odkaz:
http://arxiv.org/abs/2009.09011