Digital technologies as enablers of supply chain sustainability in an emerging economy
M Akbari, JL Hopkins - Operations Management Research, 2022 - Springer
Vietnam is a country with significant potential for growth as a global centre for
manufacturing, as supply chains look to reduce their over-reliance on China in the aftermath …
manufacturing, as supply chains look to reduce their over-reliance on China in the aftermath …
Blockchain for securing aerial communications: Potentials, solutions, and research directions
Most natural disasters are consequences of hurricanes, floods, volcano eruptions, and
earthquakes, and can severely disturb traditional communications networks and interrupt …
earthquakes, and can severely disturb traditional communications networks and interrupt …
Industrial laser welding defect detection and image defect recognition based on deep learning model developed
H Deng, Y Cheng, Y Feng, J **ang - Symmetry, 2021 - mdpi.com
Aiming at the problem of the poor robustness of existing methods to deal with diverse
industrial weld image data, we collected a series of asymmetric laser weld images in the …
industrial weld image data, we collected a series of asymmetric laser weld images in the …
A universal methodology for reliable predicting the non-steroidal anti-inflammatory drug solubility in supercritical carbon dioxide
Understanding the drug solubility behavior is likely the first essential requirement for
designing the supercritical technology for pharmaceutical processing. Therefore, this study …
designing the supercritical technology for pharmaceutical processing. Therefore, this study …
[HTML][HTML] Matrix Profile data mining for BGP anomaly detection
Abstract The Border Gateway Protocol (BGP), acting as the communication protocol that
binds the Internet, remains vulnerable despite Internet security advancements. This is not …
binds the Internet, remains vulnerable despite Internet security advancements. This is not …
ISP self-operated BGP anomaly detection based on weakly supervised learning
The Border Gateway Protocol (BGP) is arguably the most important and irreplaceable
protocol in the network. However, the lack of routing authentication and validation makes it …
protocol in the network. However, the lack of routing authentication and validation makes it …
Multi-label classification for AIS data anomaly detection using wavelet transform
Thanks to the Automatic Identification System (AIS), ships and other maritime equipment are
able to communicate with each other, for example, by sending information about their …
able to communicate with each other, for example, by sending information about their …
Internet routing anomaly detection using LSTM based autoencoder
The internet is formed by thousands of interconnected Autonomous Systems (ASes). The
Border Gateway Protocol (BGP) exchanges routing information between autonomous …
Border Gateway Protocol (BGP) exchanges routing information between autonomous …
Learning to Identify Conflicts in RPKI
H Schulmann, S Zhao - arxiv preprint arxiv:2502.03378, 2025 - arxiv.org
The long history of misconfigurations and errors in RPKI indicates that they cannot be easily
avoided and will most probably persist also in the future. These errors create conflicts …
avoided and will most probably persist also in the future. These errors create conflicts …
Optimal detection of border gateway protocol anomalies with extensive feature set
For effective and secure access of Internet, the Border Gateway Protocol (BGP) has to be
capable to identify and stop odd concurrences in realistic time. Despite the fact that more …
capable to identify and stop odd concurrences in realistic time. Despite the fact that more …