|
|
|
Omar Abdulkhaleq Aldabash and Mehmet Fatih Akay
An IDS (Intrusion Detection System) is essential for network security experts, as it allows one to identify and respond to abnormal traffic present in a network. An IDS can be utilized for evaluating the various types of malicious attacks. Hence, detecti...
ver más
|
|
|
|
|
|
Thimo F. Schindler, Simon Schlicht and Klaus-Dieter Thoben
Within the integration and development of data-driven process models, the underlying process is digitally mapped in a model through sensory data acquisition and subsequent modelling. In this process, challenges of different types and degrees of severity ...
ver más
|
|
|
|
|
|
Hadi Papei and Yang Li
We propose a stochastic agglomerative algorithm to detect the local community of some given seed vertex/vertices in a network. Instead of giving a deterministic binary local community in the output, our method assigns every vertex a value that is the pro...
ver más
|
|
|
|
|
|
Paola Parretti, João Gama Monteiro, Francesca Gizzi, Roi Martínez-Escauriaza, Filipe Alves, Sahar Chebaane, Silvia Almeida, Miguel Pessanha Pais, Frederico Almada, Marc Fernandez, Natacha Nogueira, Carlos Andrade and João Canning-Clode
Mapping the distribution and evaluating the impacts of marine non-indigenous species (NIS) are two fundamental tasks for management purposes, yet they are often time consuming and expensive. This case study focuses on the NIS gilthead seabream Sparus aur...
ver más
|
|
|
|
|
|
Philipp Satlawa and Robert B. Fisher
Timely information about the need to thin forests is vital in forest management to maintain a healthy forest while maximizing income. Currently, very-high-spatial-resolution remote sensing data can provide crucial assistance to experts when evaluating th...
ver más
|
|
|