2022
DOI: 10.1155/2022/7138367
|View full text |Cite|
|
Sign up to set email alerts
|

Application of Artificial Intelligence Algorithm in Relay Protection of Distribution Network

Abstract: A distribution network in supply chain management increases product reachability and handling density across different warehouses and customers. Relays in the distribution network prevent congestion, supply stagnancy, and delayed deliveries. Protecting the relay functions and streamlining them are tedious due to the varying vehicle and goods densities. This article introduces a populous relay management scheme (PRMS) for multi-access in delivery networks to address the problem above. The proposed scheme relies… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 28 publications
(33 reference statements)
0
3
0
Order By: Relevance
“…A network monitoring system should be flexible enough to detect errors at the network layer, data link layer, network packet forwarding, host-to-host communication, sessions, syntax, and applications. Yang et al [7] discussed that the local networks are high-speed and cover only one or more buildings.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A network monitoring system should be flexible enough to detect errors at the network layer, data link layer, network packet forwarding, host-to-host communication, sessions, syntax, and applications. Yang et al [7] discussed that the local networks are high-speed and cover only one or more buildings.…”
Section: Related Workmentioning
confidence: 99%
“…The general trend in network and system management is changing the emphasis from monitoring individual resources or their groups to the concept of dynamic management to increase the satisfaction of the demands of the end users of information technologies [6]. Such an approach requires identifying both the availability of methods for analyzing user behavior, their priorities, and the problems that arise in everyday work [7]. For users, applications, and networks: The results obtained in this phase will be implemented as a starting point.…”
Section: Introductionmentioning
confidence: 99%
“…Tis article has been retracted by Hindawi, as publisher, following an investigation undertaken by the publisher [1]. Tis investigation has uncovered evidence of systematic manipulation of the publication and peer-review process.…”
mentioning
confidence: 99%