Results 251 to 260 of about 444,086 (291)
Some of the next articles are maybe not open access.

Analysis of macroscopic traffic flow model considering throttle dynamics

European Physical Journal B : Condensed Matter Physics, 2023
W. Ai, Ming Ming Wang, Dawei Liu
semanticscholar   +1 more source

Outlier Detection for IoT Frameworks Using Isolation Forest

Proceedings of the 1st International Conference on Research and Development in Information, Communication, and Computing Technologies
: "Outlier Detection for IoT Frameworks Using Isolation Forest" focuses on the importance of identifying abnormal data in IoT systems where a large amount of sensor data is transmitted through wireless networks.
Lakshmi Chaitanya   +7 more
semanticscholar   +1 more source

Business Management and Planning Using Queuing Model with Heterogeneous Customers for Electrical Applications

2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT)
In the present scenario of business after COVID-19, many business industries are facing many problems, like a very low number of customers, low demand in the market, etc.
B. Awasthi   +3 more
semanticscholar   +1 more source

A hybrid approach for Capacitated Vehicle Routing Problem with Time Windows based on Conflict-Driven Clause Learning and Reinforcement Learning

2024 5th International Conference on Innovative Trends in Information Technology (ICITIIT)
In the present scenario, the major applications of Vehicle Routing Problem (VRP) is food delivery. Many algorithms are available to solve the variants of problems related to VRP in minimizing the service time.
A. Christy   +3 more
semanticscholar   +1 more source

Tactical Scheduling for Precision Air Traffic Operations: Past Research and Current Problems

Journal of Aerospace Information Systems, 2014
D. Isaacson, A. Sadovsky, Damek Davis
semanticscholar   +1 more source

A Review of the Role of Network Segmentation in Improving Cybersecurity and Preventing Data Breaches

International Journal of Advanced Research in Science, Communication and Technology
One critical aspect of Cybersecurity strategies is that of network segmentation, which demarcates a network into segments and controls the traffic flow, thus limiting cyber threats.
Adarsh S Naik   +3 more
semanticscholar   +1 more source

Generic solutions for consistency problems in multi-scale traffic flow models - Analysis and preliminary results

International Conference on Intelligent Transportation Systems, 2013
Mahtab Joueiai   +2 more
semanticscholar   +1 more source

Hewlett Packard: Delivering Profitable Growth for HPDirect.com Using Operations Research

Interfaces, 2013
Rohit Tandon   +9 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy