Search results for "Flow network"

showing 10 items of 17 documents

A multidisciplinary analytical framework to delineate spawning areas and quantify larval dispersal in coastal fish

2019

International audience; Assessing larval dispersal is essential to understand the structure and dynamics of marine populations. However, knowledge about early-life dispersal is sparse, and so is our understanding of the spawning process, perhaps the most obscure component of biphasic life cycles. Indeed, the poorly known species-specific spawning modality and early-life traits, along with the high spatio-temporal variability of the oceanic circulation experienced during larval drift, hamper our ability to properly appraise the realized connectivity of coastal fishes. Here, we propose an analytical framework which combines Lagrangian modeling, network theory, otolith analyses and biogeograph…

0106 biological sciencesConservation of Natural ResourcesOceans and SeasPopulation DynamicsCoastal fishEcosystem ManagementConservationAquatic ScienceOceanography010603 evolutionary biology01 natural sciencesFish natal originsmedicineMediterranean SeaAnimalsDiplodus vulgarisMarine ecosystem14. Life underwaterEcosystemOtolithMarine Protected AreaLagrangian Flow Network[SDU.OCEAN]Sciences of the Universe [physics]/Ocean Atmosphere[SDV.EE]Life Sciences [q-bio]/Ecology environmentFish natal originbiologyEcology010604 marine biology & hydrobiologyFishesMarine connectivityPelagic zoneGeneral MedicineDiplodusbiology.organism_classificationPollutionCoastal fishesCoastal fishemedicine.anatomical_structureLarvaBiological dispersalMarine protected areaModels-hydrodynamicsModels-hydrodynamic
researchProduct

The minimum mean cycle-canceling algorithm for linear programs

2022

Abstract This paper presents the properties of the minimum mean cycle-canceling algorithm for solving linear programming models. Originally designed for solving network flow problems for which it runs in strongly polynomial time, most of its properties are preserved. This is at the price of adapting the fundamental decomposition theorem of a network flow solution together with various definitions: that of a cycle and the way to calculate its cost, the residual problem, and the improvement factor at the end of a phase. We also use the primal and dual necessary and sufficient optimality conditions stated on the residual problem for establishing the pricing step giving its name to the algorith…

021103 operations researchInformation Systems and ManagementGeneral Computer ScienceLinear programmingDegenerate energy levels0211 other engineering and technologiesPhase (waves)0102 computer and information sciences02 engineering and technologyManagement Science and Operations ResearchResidualFlow network01 natural sciencesIndustrial and Manufacturing EngineeringDual (category theory)010201 computation theory & mathematicsModeling and SimulationCoefficient matrixRowAlgorithmMathematicsEuropean Journal of Operational Research
researchProduct

Combined column-and-row-generation for the optimal communication spanning tree problem

2018

Abstract This paper considers the exact solution of the optimal communication spanning tree problem (OCSTP), which can be described as follows: Given an undirected graph with transportation costs on every edge and communication requirements for all pairs of vertices, the OCSTP seeks for a spanning tree that minimizes the sum of the communication costs between all pairs of vertices, where the communication cost of a pair of vertices is defined as their communication requirement multiplied by the transportation cost of the unique tree path that connects the two vertices. Two types of compact formulations for OCSTP were presented in the literature. The first one is a four-index model based on …

021103 operations researchSpanning treeGeneral Computer ScienceHeuristicComputer scienceIntersection (set theory)0211 other engineering and technologies0102 computer and information sciences02 engineering and technologyManagement Science and Operations ResearchFlow network01 natural sciencesTree (graph theory)GraphVertex (geometry)Combinatorics010201 computation theory & mathematicsModeling and SimulationPath (graph theory)Graph (abstract data type)MathematicsofComputing_DISCRETEMATHEMATICSComputers & Operations Research
researchProduct

Heuristics for the capacitated modular hub location problem

2017

Abstract In this paper we study the hub location problem, where the goal is to identify an optimal subset of facilities (hubs) to minimize the transportation cost while satisfying certain capacity constraints. In particular, we target the single assignment version, in which each node in the transportation network is assigned to only one hub to route its traffic. We consider here a realistic variant introduced previously, in which the capacity of edges between hubs is increased in a modular way. This reflects the practical situation in air traffic where the number of flights between two locations implies a capacity in terms of number of passengers. Then, the capacity can be increased in a mo…

050210 logistics & transportationMathematical optimization021103 operations researchGeneral Computer Sciencebusiness.industryComputer scienceHeuristicHeuristic (computer science)Node (networking)05 social sciences0211 other engineering and technologies02 engineering and technologyManagement Science and Operations ResearchModular designFlow networkTabu searchModeling and Simulation0502 economics and businessBenchmark (computing)Local search (optimization)HeuristicsbusinessComputers & Operations Research
researchProduct

A Novel Method for Detecting APT Attacks by Using OODA Loop and Black Swan Theory

2018

Advanced Persistent Threat(APT) attacks are a major concern for the modern societal digital infrastructures due to their highly sophisticated nature. The purpose of these attacks varies from long period espionage in high level environment to causing maximal destruction for targeted cyber environment. Attackers are skilful and well funded by governments in many cases. Due to sophisticated methods it is highly important to study proper countermeasures to detect these attacks as early as possible. Current detection methods under-performs causing situations where an attack can continue months or even years in a targeted environment. We propose a novel method for analysing APT attacks through OO…

Advanced persistent threatNoticeComputer science05 social sciences020206 networking & telecommunicationsOODA loop02 engineering and technologyBlack Swan theoryComputer securitycomputer.software_genreFlow networkBlack swan theorynetwork anomaly detectionLong periodAdvanced Persistent Thread (APT)0502 economics and businessOODA loop0202 electrical engineering electronic engineering information engineeringcomputer050203 business & management
researchProduct

A Novel Deep Learning Stack for APT Detection

2019

We present a novel Deep Learning (DL) stack for detecting Advanced Persistent threat (APT) attacks. This model is based on a theoretical approach where an APT is observed as a multi-vector multi-stage attack with a continuous strategic campaign. To capture these attacks, the entire network flow and particularly raw data must be used as an input for the detection process. By combining different types of tailored DL-methods, it is possible to capture certain types of anomalies and behaviour. Our method essentially breaks down a bigger problem into smaller tasks, tries to solve these sequentially and finally returns a conclusive result. This concept paper outlines, for example, the problems an…

Advanced persistent threatProcess (engineering)Computer science020209 energyDistributed computing02 engineering and technologylcsh:Technologylcsh:ChemistryStack (abstract data type)020204 information systemsAdvanced Persistent Thread (APT)0202 electrical engineering electronic engineering information engineeringGeneral Materials Sciencetietoturvalcsh:QH301-705.5Instrumentationta113Fluid Flow and Transfer Processeslcsh:Tbusiness.industryProcess Chemistry and TechnologyDeep learningGeneral EngineeringFlow networklcsh:QC1-999Computer Science Applicationsnetwork anomaly detectionkoneoppiminenlcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040Deep Learning (DL)Artificial intelligencelcsh:Engineering (General). Civil engineering (General)Raw databusinessverkkohyökkäyksetlcsh:Physics
researchProduct

DORA algorithm for network flow models with improved stability and convergence properties

2001

A new methodology for the solution of shallow water equations is applied for the computation of the unsteady-state flow in an urban drainage network. The inertial terms are neglected in the momentum equations and the solution is decoupled into one kinematic and one diffusive component. After a short presentation of the DORA (Double ORder Approximation) methodology in the case of a single open channel, the new methodology is applied to the case of a sewer network. The transition from partial to full section and vice versa is treated without the help of the Preissmann approximation. The algorithm also allows the computation of the diffusive component in the case of vertical topographic discon…

Computer scienceComputationMechanical EngineeringLinear systemSettore ICAR/02 - Costruzioni Idrauliche E Marittime E IdrologiaFlow networkOpen-channel flowFlow (mathematics)Convergence (routing)Boundary value problemAlgorithmShallow water equationsWater Science and TechnologyCivil and Structural Engineering
researchProduct

Evaluation of Ensemble Machine Learning Methods in Mobile Threat Detection

2017

The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to avoid detection by the traditional antivirus. The emerging need is to detect these threats by any flow-based network solution. Therefore, we propose and evaluate a network based model which uses ensemble Machine Learning (ML) methods in order to identify the mobile threats, by analyzing the network flows of the malware communication. The ensemble ML methods not only protect over-fitting of the model but also cope with the issues related to the changing be…

Computer scienceintrusion detection0211 other engineering and technologiesDecision tree02 engineering and technologycomputer.software_genreComputer securitymobiililaitteet0202 electrical engineering electronic engineering information engineeringsupervised machine learningSoarAndroid (operating system)tietoturvata113021110 strategic defence & security studiesta213business.industrymobile threatsensemble methods020206 networking & telecommunicationsFlow networkEnsemble learninganomaly detectionmachine learningkoneoppiminenMalwareThe InternetbusinesscomputerMobile device
researchProduct

Environmentally friendly analytical chemistry through automation: comparative study of strategies for carbaryl determination with p-aminophenol

1999

Abstract A flow system, based on multicommutation and binary sampling, has been developed for improving the automated spectrophotometric determination of carbaryl with p -aminophenol (PAP) in order to reduce the waste volume and to preserve the maximum analytical performance. The procedure, which was implemented employing a flow network obtained by nesting five, three-way solenoid valves controlled by means of a 386 microcomputer equipped with an electronic interface running software written in quick basic 4.5, provides a limit of detection of 26 μg l −1 , comparable to that obtained using a conventional flow injection (FIA) manifold and lower than that found by sequential injection analysi…

Detection limitSequential injection analysisChromatographyChemistrybusiness.industryAnalytical chemistryFlow networkBiochemistryAutomationEnvironmentally friendlyAnalytical Chemistrychemistry.chemical_compoundVolume (thermodynamics)MicrocomputerCarbarylEnvironmental ChemistrybusinessSpectroscopyAnalytica Chimica Acta
researchProduct

Control of Production-Distribution Systems under Discrete Disturbances and Control Actions

2011

This paper deals with the robust control and optimization of production-distribution systems. The model used in our problem formulation is a general network flow model that describes production, logistics, and transportation applications. The novelty in our formulation is in the discrete nature of the control and disturbance inputs. We highlight three main contributions: First, we derive a necessary and sufficient condition for the existence of robustly control invariant hyperboxes. Second, we show that a stricter version of the same condition is sufficient for global convergence to an invariant set. Third, for the scalar case, we show that these results parallel existing results in the set…

Distribution systemMathematical optimizationSettore ING-INF/04 - AutomaticaControl theoryNoveltyHypercubealphapet control production-distribution systemsInvariant (physics)Robust controlSettore MAT/09 - Ricerca OperativaFlow networkMathematics
researchProduct