911,990 Hits in 7.6 sec

Neural Networks for Driver Behavior Analysis

Fabio Martinelli, Fiammetta Marulli, Francesco Mercaldo, Antonella Santone
2021 Electronics  
With the purpose to provide an architecture to increase safety and security in automotive context, in this paper we propose a fully connected neural network architecture considering position-based features  ...  The proliferation of info-entertainment systems in nowadays vehicles has provided a really cheap and easy-to-deploy platform with the ability to gather information about the vehicle under analysis.  ...  A hidden-Markov-model-(HMM)-based similarity measure is proposed in [29] in order to model driver human behavior.  ... 
doi:10.3390/electronics10030342 fatcat:w7q7yoqry5gkbbk32t7eilwwqu

Graph analysis of network flow connectivity behaviors

2019 Turkish Journal of Electrical Engineering and Computer Sciences  
In this paper, we propose network flow connectivity graphs (NFCGs) to capture network flow behavior for modeling social behaviors from network entities.  ...  After that, a network flow connectivity behavior analysis framework is present based on NFCGs.  ...  UDP Port 53 for DNS and TCP 80 Port for HTTP) to analyze known network applications. Table 1 shows measured features for 8 known application NFCGs with a 120 s window.  ... 
doi:10.3906/elk-1808-148 fatcat:jjiy2dzo7jgf3ecqalm4iv7gnq

IoT Behavioral Monitoring via Network Traffic Analysis [article]

Arunan Sivanathan
2020 arXiv   pre-print
For our first contribution, we collect traffic traces and characterize the network behavior of IoT devices via attributes from traffic patterns.  ...  retraining of the model.  ...  operators automatically identify IoT assets via network-level traffic analysis, and monitor their behavior in real-time.  ... 
arXiv:2001.10632v1 fatcat:ylly7ksir5bpfhr3wplqsg6eta

An Analysis of Amazon Echo's Network Behavior [article]

Jan Janak, Teresa Tseng, Aliza Isaacs, Henning Schulzrinne
2021 arXiv   pre-print
Despite the very large installed base, surprisingly little is known about the device's network behavior.  ...  Overall, we find the Echo to be a well-designed device from the network communication perspective.  ...  Later models make the MITM approach considerably more difficult. This limitation does not change the analysis of network communication which is the primary contribution of this paper.  ... 
arXiv:2105.13500v2 fatcat:3lvuoibtnfcstchyzqnsc6htoy

Social Network Analysis with Digital Behavioral Data

Haiko Lietz, Andreas Schmitz, Johann Schaible
2021 easy social sciences No. 66 (2021): Content Meets Structure - Social Network Perspectives Starting Point and Frequency: Year: 1989  
., a post on social media) as units of observation and brings established techniques like Social Network Analysis to the center stage.  ...  We argue that, using this approach, obtaining individual attributes and attitudes as well as uncovering the micro-macro dynamics of behavior by mining patterns are potentially fruitful applications.  ...  Next, we will discuss two types of applications In principle, those with access and skills can based on relational analysis.  ... 
doi:10.15464/easy.2021.005 fatcat:yc3bpnxx5jhndpfht6mo7mdeeu

Structural analysis of behavioral networks from the Internet

M R Meiss, F Menczer, A Vespignani
2008 Journal of Physics A: Mathematical and Theoretical  
Understanding the structure and dynamics of the behavioral networks that connect users with each other and with services across the Internet is key to modeling the network and designing future applications  ...  For example, we find that the structure of the behavioral network associated with Web activity is characterized by such extreme heterogeneity as to challenge any simple attempt to model Web server traffic  ...  of anonymized network flow data.  ... 
doi:10.1088/1751-8113/41/22/224022 fatcat:65ft2ayatjfo3nbmof6pdbehom

Gibbs measures of Potts model on Cayley trees: a survey and applications [article]

2021 arXiv   pre-print
In this paper we give a systematic review of the theory of Gibbs measures of Potts model on Cayley trees (developed since 2013) and discuss many applications of the Potts model to real world situations  ...  : mainly biology, physics, and some examples of alloy behavior, cell sorting, financial engineering, flocking birds, flowing foams, image segmentation, medicine, sociology etc.  ...  In [129] the use and application of the Potts model to Ostwald ripening is presented.  ... 
arXiv:2103.07391v1 fatcat:6pyw7oufg5chjbtzzypjdmyqau

A Bayesian Network Analysis of Ethical Behavior

Ahmet Ekici, Sule Onsel Ekici
2015 Journal of Macromarketing  
Using one of the major domains of macromarketing -ethics -this paper aims to introduce the Bayesian network (BN) method and demonstrate its added value for macro-level decision makers.  ...  We believe that the adoption of this methodology by macromarketing researchers is likely to contribute to the discipline by advancing the understanding of how certain systemic/network relationships and  ...  Acknowledgements The authors would like to thank to Special Issue Editor Ben Wooliscroft, Editor-in-Chief Terrence Witkowski, and the three anonymous reviewers for their valuable feedback.  ... 
doi:10.1177/0276146715607620 fatcat:yzvtguxfuvbonmmk4mwfmbdkdm

Measurement and analysis of IP network usage and behavior

R. Caceres, N. Duffield, A. Feldmann, J.D. Friedmann, A. Greenberg, R. Greer, T. Johnson, C.R. Kalmanek, B. Krishnamurthy, D. Lavelle, P.P. Mishra, J. Rexford (+3 others)
2000 IEEE Communications Magazine  
Traffic, usage, and performance measurements are crucial to the design, operation and control of Internet Protocol (IP) networks.  ...  This paper describes a prototype infrastructure for the measurement, storage and correlation of network data of different types and origins from AT&T's commercial IP network.  ...  Conclusions We have presented a measurement and analysis infrastructure for characterizing the usage and behavior of IP networks.  ... 
doi:10.1109/35.841839 fatcat:vajdycaknfbq5obpso2ex5v43e

MalSpot: Multi2 Malicious Network Behavior Patterns Analysis [chapter]

Hing-Hao Mao, Chung-Jung Wu, Evangelos E. Papalexakis, Christos Faloutsos, Kuo-Chen Lee, Tien-Cheu Kao
2014 Lecture Notes in Computer Science  
What are the patterns that typical network attackers exhibit? For a given malicious network behaviors, are its attacks spread uniformly over time?  ...  In this work, we develop MalSpot, multi-resolution and multi-linear (Multi 2 ) network analysis system in order to discover such malicious patterns, so that we can use them later for attack detection,  ...  IIS-1247489 and CNS-1314632 Research was sponsored by the Defense Threat Reduction Agency and was accomplished under contract No. HDTRA1-10-1-0120.  ... 
doi:10.1007/978-3-319-06608-0_1 fatcat:wav7bl7i2vfi5lhefvgamjww7q

Analysis of Prosumer Behavior in the Electrical Network

Dušan Medveď, Michal Kolcun, Marek Pavlík, Ľubomír Beňa, Marián Mešter
2021 Energies  
This article deals with the prosumer behavior, specifically on an on-grid electrical network that is connected to a larger synchronous electrical network, as well as an off-grid system.  ...  In the Simulink (Matlab) application, two models were constructed for this purpose. The modeling of the operation of the electrical network's on-grid system takes place in one of the models.  ...  The major goal of this paper, and the novelty contribution, is to analyze prosumer behavior in the electrical network, using previously published research.  ... 
doi:10.3390/en14248212 doaj:1be09d69fc6e4a82b6959d3415c49c06 fatcat:dn4qhbhw6vg6ljzay3t2hq25ne

Incorporating Trip-Chaining Behavior into Network Equilibrium Analysis

Takuya Maruyama, Noboru Harata
2005 Transportation Research Record  
We examine the model using simple network examples with special attention to the effect of trip chaining behavior on the level of second-best toll.  ...  The network equilibrium model is a useful tool for long-term transportation planning, and is one promising alternative to the traditional four-step travel forecasting model.  ...  ACKNOWLEDGEMENT This research is partially supported by the Japan Ministry of Education, Culture, Sports, Science and Technology, Grant-in-Aid for Young Scientists, No. 16760421.  ... 
doi:10.3141/1921-02 fatcat:hubgspmg7bgvbdfcimo4qal4vu

Equilibrium analysis through separation of user and network behavior

Y.C. Tay, Dinh Nguyen Tran, Eric Yi Liu, Wei Tsang Ooi, Robert Morris
2008 Computer Networks  
This decomposition is demonstrated with a surfing session model, and validated with a traffic trace and NS2 simulations.  ...  The technique's accessibility and breadth are illustrated through an analysis of several issues concerning the location, stability, robustness and dynamics of traffic equilibrium.  ...  Acknowledgements Jaeyeon Jung and Alex Yip did preliminary measurements that suggested evidence of user backoff; Yuan Li initiated the measurements and simulations reported here; Vidit Maheshwari illustrated  ... 
doi:10.1016/j.comnet.2008.09.008 fatcat:heistd6ktzdxld6bisf7jzof4y

Innovative Analysis of Runoff Temporal Behavior through Bayesian Networks

José-Luis Molina, Santiago Zazo, Pablo Rodríguez-Gonzálvez, Diego González-Aguilera
2016 Water  
Furthermore, time series analysis has been used for several applications such as filling in missing data, extending records, building mathematical models to generate synthetic hydrologic records, and detecting  ...  This is done through a hybrid method that comprises a combination of traditional techniques, (ARMA models), and new approaches based on Artificial Intelligent (Bayesian Networks).  ...  Sensitivity analysis can be performed using two types of measures: entropy and Shannon's measure of mutual information [50] .  ... 
doi:10.3390/w8110484 fatcat:2x4zcjuvenfx5akihuqa3ldg4y

Socioscope: Human Relationship and Behavior Analysis in Social Networks

Huiqi Zhang, R. Dantu, J. W. Cangussu
2011 IEEE transactions on systems, man and cybernetics. Part A. Systems and humans  
In this dissertation I propose a socioscope model for social network, relationship and human behavior analysis based on mobile phone call detail records.  ...  Because of the diversities and complexities of human social behavior, one technique cannot detect different features of human social behaviors.  ...  Fundamental Measurements in Social Network Analysis Centrality is one of the most important and frequently used measurements in social network analysis (Carrington, 2005) .  ... 
doi:10.1109/tsmca.2011.2113335 fatcat:ub2apkkftjgkdnvdhuq4rbpkey
« Previous Showing results 1 — 15 out of 911,990 results