2022
DOI: 10.53941/ijndi0101011
|View full text |Cite
|
Sign up to set email alerts
|

Individual-Based Modelling of Animal Brucellosis Spread with the Use of Complex Networks

Abstract: Article Individual-Based Modelling of Animal Brucellosis Spread with the Use of Complex Networks E. R. Pinto 1, E. G. Nepomuceno 2,*, and A. S. L. O. Campanharo 1 1 Department of Biostatistics, Institute of Biosciences São Paulo State University, Botucatu, São Paulo 18618-970, Brazil 2 Department of Electronic Engineering and Centre for Ocean Energy Research, Maynooth University, Maynooth, Ireland * Correspondence: erivelton.nepomuceno@mu.ie     Received: 12 October 2022 Accepted: 23 November 2022 Published… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 25 publications
(9 citation statements)
references
References 32 publications
(25 reference statements)
0
8
0
Order By: Relevance
“…important packets are vulnerable, that is, the attack probability of the important packet is larger than the less important ones. The attack decision is represented by a stochastic variable 𝛿 k = 1 defined in (6). From the defense perspective, an acknowledgment frame (ACK) is employed to generate an acknowledge signal 𝛾 k , which is a variable that indicates whether the packet y k is attacked.…”
Section: Remote State Estimationmentioning
confidence: 99%
See 2 more Smart Citations
“…important packets are vulnerable, that is, the attack probability of the important packet is larger than the less important ones. The attack decision is represented by a stochastic variable 𝛿 k = 1 defined in (6). From the defense perspective, an acknowledgment frame (ACK) is employed to generate an acknowledge signal 𝛾 k , which is a variable that indicates whether the packet y k is attacked.…”
Section: Remote State Estimationmentioning
confidence: 99%
“…Leveraging the network for data transmission, as opposed to traditional point-to-point connection methods, the local data processing and storage have been significantly simplified, facilitating rapid decision-making within the system. [4][5][6] Regrettably, the openness of the network has led to a proliferation of security problems in the system control or state estimation. [7][8][9] One of the most profound concerns is that the CPS is vulnerable to malicious attacks, which will result in system performance degradation or even instability.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, artificial neural networks have been successfully applied to RSs owing to their strong feature extraction abilities [7,22,35,39,42,47,49]. For example, a convolutional sequence embedding (Caser) RS has been proposed in [42] for product recommendation, where a convolutional neural network (CNN) is employed to capture the sequential features by analyzing the embedding matrix.…”
Section: Introductionmentioning
confidence: 99%
“…With the developments of the network era, the complex networks (CNs) have been widely used in various fields, such as power grids, 1 disease spread, 2 biological networks, 3 neural networks 4 and social networks 5 . It is worthwhile to mention that the CNs are composed of numerous nodes and edges with massive scales 6‐9 .…”
Section: Introductionmentioning
confidence: 99%