Behavior Analyzers


Notes:

  • Aggression detection
  • Behavior analyzer framework
  • Behavior analyzer component
  • Behavior analyzer module
  • Behavior analyzer system
  • Behavior engine
  • Behavior recognition
  • Behavior understanding system
  • Behaviour analyser
  • Conversation behavior analyzer
  • Human behavior analyzer
  • Moral behavior analyzer
  • Nonverbal behavior analyzer
  • Non-verbal behavior analyzer
  • Semantic fusion
  • Software behavior analyzer

Wikipedia:

See also:

BML (Behavior Markup Language) & Dialog Systems | Body Language & Dialog Systems 2017


Hb-dipm: human behavior analysis-based malware detection and intrusion prevention model in the future internet
JK Lee, SY Moon, JH Park – J Inf Process Syst, 2016 – pdfs.semanticscholar.org
… By linking with human behavior-based technologies, services are provided. The future Internet time synchronizer module synchronizes time with other modules to offer reliability to the log data. The analyzer consists of a behavior analyzer, static analyzer, and dynamic analyzer …

Context-Aware Automated Analysis and Annotation of Social Human–Agent Interactions
T Baur, G Mehlmann, I Damian, F Lingenfelser… – ACM Transactions on …, 2015 – dl.acm.org
… In this article, we present a system, Nonverbal behavior Analyzer (NovA), for au- tomating the annotation process using real … Detection of face regions using eye tracking glasses within our system for humanoid robots (with human-like faces), virtual characters, and humans …

A Human Behavior Analyzer Framework for consumer product search engines
TT Zin, P Tin, T Toriu, H Hama – Consumer Electronics (GCCE) …, 2014 – ieeexplore.ieee.org
In today consumer world, product search engines have been played key roles for consumer information seeking and decision making process. However, due to the volume, variety and velocity of information plus the nature of human beings, it becomes very hard to identify what …

Human-Machine Interface Evaluation of CNC Machine Control Panel through Multidimensional Experimental Data Synchronous Testing Analysis Method.
J Dou, L Zhang, Q Zhao, Q Pei… – International Journal of …, 2017 – search.ebscohost.com
… The physiological measurement instruments, eye tracker and behavior analyzer were adopted to obtain the user’s physiological data, psychological data and … It’s helpful for the designer to improve the ergonomics of human-machine interface design of CNC machine control …

Multiple human tracking system for unpredictable trajectories
B Cancela, M Ortega, MG Penedo – Machine vision and applications, 2014 – Springer
… Machine Vision and Applications. Download PDF. Machine Vision and Applications. February 2014 , Volume 25, Issue 2, pp 511–527 | Cite as. Multiple human tracking system for unpredictable trajectories … 5 offers conclusions and future work. 2 Human detection …

Towards social botnet behavior detecting in the end host
Y Ji, Y He, X Jiang, Q Li – Parallel and Distributed Systems …, 2014 – ieeexplore.ieee.org
… our detection system, including three components: host behavior monitor, host behavior analyzer, and detection … They differentiate a human, bot, or cyborg through combining the four components … of users’ interactions within a social network to discriminate humans and bots [12 …

The hybrid agent MARCO: a multimodal autonomous robotic chess opponent
C Becker-Asano, E Meneses, N Riesterer… – … conference on Human …, 2014 – dl.acm.org
… For tracking and analysis of the human players’ nonverbal behaviors during gameplay the “NovA – Nonverbal Behavior Analyzer” is integrated into our … The system can play chess autonomously against a human player, whose non-verbal behavior is recorded for later … humans …

ATHENA: a personalized platform to promote an active lifestyle and wellbeing based on physical, mental and social health primitives
M Fahim, M Idris, R Ali, C Nugent, B Kang, EN Huh… – Sensors, 2014 – mdpi.com
… We are conducting a project, ATHENA(activity-awareness for human-engaged wellness applications) to design and integrate the relationship between these basic health primitives to approximate the human lifestyle and real-time recommendations for wellbeing services …

Brief Introduction to the Special Issue on Behavior Understanding for Arts and Entertainment
AA Salah, H Hung, O Aran, H Gunes… – ACM Transactions on …, 2015 – dl.acm.org
… The authors present the nonverbal behavior analyzer (NovA), which focuses on bidirectional interactions with a … 2.2. A General-Purpose Sensing Floor Architecture for Human–Environment Interaction If the goal is to understand behaviors of interacting humans, or to provide …

K9-Blyzer: Towards Video-Based Automatic Analysis of Canine Behavior
S Amir, A Zamansky, D van der Linden – Proceedings of the Fourth …, 2017 – dl.acm.org
… tool for video-based automatic canine behavior recognition called K9-Blyzer (short for CaNINE Behavior anaLYZER) … the tool’s key features is simplicity of use, both for the human user and … of dogs with various types of agents, including social interactions with humans and robots …

An Automated Analyzer for Users’ Anti-Phishing Behaviour within a LAN
AM Alnajim – International Journal of Soft Computing and …, 2015 – researchgate.net
… for individuals [3]. Phishing is aimed at people to take advantage of the way humans interact with … These subcomponents are an agent named as the User Behaviour Analyser’ (UBA), a database named as the User … the SIGCHI conference on Human factors in computing systems …

Smart Fabric-an infrastructure-agnostic artifact topology deployment framework
JM Schleicher, M Vogler, C Inzinger… – 2015 IEEE International …, 2015 – computer.org
… 323 Page 5. Human Interaction Automated Approach Rails Configuration Analyser Escalation . . . . . Rails Convention Analyser Rails Request Behaviour Analyser Rails Expert Abstract Adaptation Specific Adaptation Fig. 4: Confidence Adaptation Model Escalation …

The hybrid agent MARCO
N Riesterer, C Becker Asano, J Hué… – Proceedings of the 16th …, 2014 – dl.acm.org
… 1. INTRODUCTION Our robotic system combines ideas from several previous research projects that enabled humans to play chess against the machine … A Kinect RGBD camera is used by the “NovA – Nonverbal Behavior Analyzer” [2] to track the human player’s nonverbal …

An Integrated Framework to Identify Different Psychological Behaviour of a Human Being
N Rajatha, PV Pinto, PJ Shetty, MR Rithika – 2018 – irjet.net
… is one of the example for artificial intelligence was able to defeat humans in board … Being” focuses on developing a machine learning approach that identifies a human behaviour using … The architecture diagram for the Behaviour Analyzer system is shown in Fig-1. The Behaviour …

An Introduction of WUBA (Web User Behavior Analysis)
N Pushpalatha – 2014 – ijarcsms.com
… on the web site traffic, and represents a major data source about human behavior … Web User Behavior Analyzer (WUBA) focuses on the development of techniques and tools to study users web … Web usage data are usually supplied by two sources: trial runs by humans and Web …

“It’s Shocking!”: Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser
S Kirrane – Data and Applications Security and Privacy XXXII …, 2018 – books.google.com
… By proposing a transparency tool called Android Apps Behaviour Analyser (A3) we analyse the behaviour of installed apps on the user’s smart- phone to identify privacy deviated activities … In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp …

“It’s Shocking!”: Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser
M Hatamian, A Kitkowska, J Korunovska… – IFIP Annual Conference …, 2018 – Springer
… By proposing a transparency tool called Android Apps Behaviour Analyser (A3) we analyse the behaviour of installed apps on the user’s smartphone to identify privacy deviated activities … In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp …

Verifying a Behavior Based Anti-Phishing Approach using Model Checking
AM Alnajim – researchgate.net
… is a deceptive attack which aims to take advantage of the way humans interact with … Fig 4. Flowchart of User Behaviour Analyzer (UBA) The UBA?s task is to frequently … Generating Specification Properties From Task Models for the Formal Verification of Human–Automation …

UAS Behaviour and Consistency Monitoring System for Countering Cyber Security Threats
R Felix, J Economou, K Knowles – 2014 – papers.sae.org
… They can use such systems to reconnoiter dangerous areas, provide 24-hr aerial security surveillance for force protection purposes or even attack enemy targets all the while avoiding friendly human losses in the process … The way in which the behavior analyzer works is …

A Behavioral Action Sequences Process Design
M Kilany, AE Hassanien, A Badr, PW Tsai… – … Conference on Advanced …, 2016 – Springer
… Proposed process decomposition is introduced as a core step towards design and implementation of a behavior analyzer system … Remington, R., Boehm-Davis, D., Folk, C.: Determinants of human behavior. In: Introduction to Humans in Engineered Systems, pp …

Strategic behavior and Ambidexterity: a study applied along the brazilian wineries
E Silveira Martins, CR Rosseto, NC Lima… – Revista Brasileira de …, 2014 – redalyc.org
Artículo en PDF. How to cite. Complete issue. More information about this article. Journal’s homepage in redalyc.org. Sistema de Información Científica. Red de Revistas Científicas de América Latina y el Caribe, España y Portugal. 392. Rev. bus. manag., São Paulo, Vol. 16, No …

Data Analytics and Decision Support for Cybersecurity
IP Carrascosa, HK Kalutarage, Y Huang – 2017 – Springer
… vi Preface Aggregated/pre-processed information Domain-specific extracted knowledge Human review DATA SOURCES Social Network Network Traffic Data DATA FUSION FEATURE SELECTION UNCERTAINTY HANDLING INCOMPLETE INFORMATION MANAGEMENT …

Exploring interaction strategies for virtual characters to induce stress in simulated job interviews
P Gebhard, T Baur, I Damian, G Mehlmann… – Proceedings of the …, 2014 – dl.acm.org
… of sensing devices as well as a variety of tools for the real time recording and pre-processing human behavior data … The NOnVerbal behavior Analyzer (NOVA) is used to analysis of recorded job interview simulations [4]. Through intelligent visualization of social signals, NOVA …

Correlating health and wellness analytics for personalized decision making
WA Khan, M Idris, T Ali, R Ali, S Hussain… – E-health Networking …, 2015 – ieeexplore.ieee.org
… Human Behavior Analyzer helps in understanding the human behavior which can prove helpful in supporting an active lifestyle and wellbeing [8]. This module takes the low-level and high-level contexts as input and analyzes a subjects short-term and long-term behavior …

Multi-View Security and Surveillance at MtA SZtAKI
L Havasi, T Szirányi – ERCIM NEWS, 2016 – eprints.sztaki.hu
… To measure the parking duration, the behaviour analyser module followed the state changes/transitions and associ- ated timestamps while the tracking method remained stable. In the fol- lowing figure the parking car in the restricted area and the loitering human are marked …

Advancing Models of Privacy Decision Making: Exploring the What & How of Privacy Behaviours
A Kitkowska – 2018 – diva-portal.org
… Keywords. Privacy, Human factors, Attitudes, Decision making … Available from: 2018-06-26 Created: 2018-06-26 Last updated: 2018-10-30Bibliographically approved. 2. “It’s shocking!”: Analysing the impact and reactions to the A3: Android apps behaviour analyser …

A Two-Level Autonomous Intrusion Detection Model Inspired by the Immune System
EB Noeparast, R Ravanmehr – International Journal of …, 2014 – pdfs.semanticscholar.org
… III. THE IMMUNE SYSTEM The human body has the immune system to remove infection elements. This … agent. – Behavior Analyzer: This module tracks behaviors in the snapshots by looking through BehaviorFunction knowledgebase …

Experience of Crowds as a Guarantee for Safe Artificial Self
R Rzepka, K Araki – 2014 AAAI Spring Symposium Series, 2014 – aaai.org
… our thoughts on possibility of manufacturing agents for particular purposes as behavior analyzers or moral … in theory, become more eth- ical in its judgements than humans often flawed … an artifi- cial, not necessarily physical, agent could become intelligent (human-level intelligent …

Experience of Crowds as a Guarantee for Safe Artificial Self
R Rafal, A Kenji – … . Reports from AAAI Spring Symposium on …, 2014 – eprints.lib.hokudai.ac.jp
… our thoughts on possibility of manufacturing agents for particular purposes as behavior analyzers or moral … in theory, become more eth- ical in its judgements than humans often flawed … an artifi- cial, not necessarily physical, agent could become intelligent (human-level intelligent …

Anomaly behavior analysis for building automation systems
Z Pan, J Pacheco, S Hariri – Computer Systems and …, 2016 – ieeexplore.ieee.org
… II. RELATED WORK The integration of physical and cyber systems as well as the human component behaviors and interactions (eg, producers, consumers, defenders and attackers) that will be the norm in Smart Buildings will … Data Structures Behavior Analyzer Residential …

A resource elasticity framework for QoS-aware execution of cloud applications
PD Kaur, I Chana – Future Generation Computer Systems, 2014 – Elsevier
… The QRE framework uses the following system components to accomplish its functionalities: (1) Workload Analyzer, (2) Application Centric Behavior Analyzer, (3) QoS Mapper, (4) Resource Centric Behavior analyzer and (5) Performance Database …

Effect of spleen-invigorating, Qi-replenishing and blood-arresting formula on zebrafish models with simvastatin-induced hemorrhage caused by spleen failing …
G Chong, W Jun, W Jia, Z Xiaoyu, Z Changle… – Journal of Traditional …, 2018 – Elsevier
… 1 Nevertheless, the animal models whose prognosis is intervened artificially can’t reflect the natural law of disease in human beings … Behavior analyzer (V3, ViewPoint, Ltd., Lyon, France). Precision Electric Balance (CP214, OHAUS, NJ, USA). Formulas …

Exploiting System Model for Securing CPS: the Anomaly Based IDS Perspective
R Colelli, S Panzieri, F Pascucci – 2018 IEEE 23rd International …, 2018 – ieeexplore.ieee.org
… According to the IIoT paradigm, indeed, most of the devices in the factory (ie, robots, sensors, actuators, Human Machine Interface – HMI) are … Specifically, the signature based IDS is implemented on the real-time device, while the behavior analyzer is moved to the main SCADA …

Understanding therapists’ needs and attitudes towards robotic support. the roboterapia project
I Zubrycki, G Granosik – International Journal of Social Robotics, 2016 – Springer
… projects increasingly place robots as a form of enhancement of care already in place, rather than a replacement of the human caregiver [13] … Moreover, the first ranked role is that of a child’s behaviour analyser; ie rather an observer than active participant in therapy (creating the …

Collaborative smart grids–a survey on trends
LM Camarinha-Matos – Renewable and Sustainable Energy Reviews, 2016 – Elsevier
… and collaborative agents. Energy systems are becoming complex socio-technical systems which combine a variety of technical aspects and automated processes with human behavior and social/societal factors [80]. More and …

Traffic situation estimator for Adaptive Cruise Control
T Yu, J Edén, C Englund… – World of Wireless, Mobile …, 2016 – ieeexplore.ieee.org
… a system that can decrease the number of accidents, save lives and humans from severe … Unfortunately the camera’s field of view is smaller than that of a human, especially since … Based on the traffic behavior analyzer the state machine transforms the different states into different …

Informatics, Networking and Intelligent Computing: Proceedings of the 2014 International Conference on Informatics, Networking and Intelligent Computing …
J Zhang – 2015 – content.taylorfrancis.com
… JF Yao, L. Lysandra, L. Yang, BR Yang & ZC Huang ASM (Active Shape Model) modeling of the human body and its … on multi-implementation game product-based learning for game development specialty students 143 C. He A network behaviour analyser: Automatic fingerprint …

Methods for Automated Generation of Scripts Hierarchies from Examples and Diagnosis of Behavior
V Ruvinskaya, A Moldavskaya – … on Data Science and Intelligent Analysis …, 2018 – Springer
… The task of the behavior analyzer is recovering the top level having the bottom one, and thus discovering typical behaviors … In addition, scripts have found application in psychology and linguistics [11], because they are based on human perception of the world and the …

Biometric intelligence in authentication machines: From talking faces to talking robots
SC Eastwood, VP Shmerko… – … (IIAIAAI), 2014 IIAI …, 2014 – ieeexplore.ieee.org
… Verification starts • Behavior analyzer is activated • e … has vision, hearing, olfactory, tactile (implemented through artificial retinas, e-nose, and e-tongue); it provides senses analogous to those of humans and allow the robot an analysis of the world and human with whom it …

Ontological IDS monitoring on defined attack
VK Shukla, D Ojha – Int J Sci Res, 2014 – researchgate.net
… Application behavior analyzer It examines the call initiated by the application, that application is allowed to start the call or this is initiated to check that it looks like the attack. File integrity checker … They assist in the communication between humans …

Automated prediction and analysis of job interview performance: The role of what you say and how you say it
I Naim, MI Tanveer, D Gildea… – Automatic Face and …, 2015 – ieeexplore.ieee.org
… Human raters labeled interviewee perfor- mance by watching videos of job interviews … The TARDIS framework incorporates a sub- module named NovA (NonVerbal behavior Analyzer) [16] that can recognize several lower level social cues: hands- to-face, looking away, postures …

Assessment of tobacco heating product THP1. 0. Part 8: study to determine puffing topography, mouth level exposure and consumption among Japanese …
J Gee, K Prasad, S Slayford, A Gray, K Nother… – Regulatory Toxicology …, 2018 – Elsevier
… use with THPs was examined by comparison of the agreement between the optical NFDPM and NFDPM produced from duplicated human records … and THPs ad libitum, their normal behaviour may have been altered by the need to use the smoking behaviour analyser and the …

DRAW-A-PIN: Authentication using finger-drawn PIN on touch devices
T Van Nguyen, N Sae-Bae, N Memon – computers & security, 2017 – Elsevier
… We develop a finger-drawn digit PIN authentication algorithm comprising two cascade modules: PIN Content Analyzer and Drawing Behaviour Analyzer to verify the two factors of a log-in attempt. • … 4. Drawing Behavior Analyzer (DBA) …

Indoor Location System for Security Guards in Subway Stations
JF De Paz, G Villarrubia, J Bajo, G Sirvent… – Trends in Practical …, 2014 – Springer
… 112 JF De Paz et al. recommendation systems, human behaviour analyzers, etc. [28][30]. The majority of these services are deployed in indoor environments such as hospitals, subway stations, shopping malls and so on, characterized by a weak or inexistent GPS signal …

Statistical analysis of road–vehicle–driver interaction as an enabler to designing behavioral models
T Chakravarty, A Chowdhury, A Ghose… – … Journal of Modeling …, 2014 – World Scientific
… This section describes Journey Classifier Algorithm (JCA) and Micro-trip Behavior Analyzer (MBA) algorithm which classifies the entire journey depending on overall JE and also velocity-dependent JE … Human Factors and Ergonomics Society Annual Meeting, Vol …

Real Time Asset Monitoring and Risk Management of Critical Infrastructures
V Tsoulkas, D Kostopoulos… – … , Uncertainty, and Risk …, 2014 – ascelibrary.org
… This data set is applied on a behavior analyzer that translates the raw data events into possibleCI asset behaviors, which are added … RTRM is a complex project and integrates many diverse fields (statistics, semantics, human machine interface, safety/security policies and rules …

Network-based intrusion prevention system prototype with multi-detection: A position paper
D Kavan, K Škodová, M Klíma – Security and Cryptography …, 2014 – ieeexplore.ieee.org
… Behavior analyzers and anomaly detectors can reveal previously unseen problems, but they do not work as fast as signatures and for known … Employment of an NBA-based detector usually assumes a human-expert participation to investigate the conditions and circumstances …

Resource provisioning for cloud applications: a 3-D, provident and flexible approach
MS Aslanpour, SE Dashti, M Ghobaei-Arani… – The Journal of …, 2018 – Springer
… 1). This pattern is based on usual human habits such as office hours, lunch time, sleeping time, business days and … the mechanism (see Table 3). Recognized analyzers in the cloud resources system are divided into three categories: resource behavior analyzer, SLA behavior …

An architecture framework for self-aware adaptive systems
A Sutcliffe – Economics-Driven Software Architecture, 2014 – Elsevier
… research challenges in design for adaptation, architecture of adaptation engines, and the interaction between software components and human agents … for adaptation; they also note the need for reference architectures and higher-order natural adaptation where humans are in …

A toolset for intrusion and insider threat detection
M Ring, S Wunderlich, D Grüdl, D Landes… – Data Analytics and …, 2017 – Springer
… coordinates, pixel-based visualization, or radial visualizations to display large amounts of multi-dimensional data to a human security expert … these data points is created for investigating the user flows from a specific view, namely Network Behaviour Analyser, Service Behaviour …

Automatic assessment of communication skill in interface-based employment interviews using audio-visual cues
S Rasipuram, DB Jayagopi – 2016 IEEE International Conference on …, 2016 – computer.org
… Anderson et al. developed a tool called Non verbal behavior Analyzer (NovA) to analyze the non-verbal behavior in a human-human setting or a human-agent setting [8]. DeGroot et al. used only prosodic features to predict the personality traits [6]. Hoque et al …

An algebraic specification language for organizational behavior of OOMAS
Y Zhang, L Liao – Proceedings of the 1st International Workshop on …, 2016 – dl.acm.org
… [25] RW Pew and AS Mavor. Modeling human and organizational behavior : application to military simulations. National Academy Press, 1998 … [31] T. Uchiya and T. Kinoshita. Behavior Analyzer for Developing Multiagent System on Repository-Based Multiagent Framework …

Indoor Location System for Security Guards in Subway Stations
JF de Paz Santana, G Villarrubia González… – 2014 – gredos.usal.es
… 112 JF De Paz et al. recommendation systems, human behaviour analyzers, etc. [28][30]. The majority of these services are deployed in indoor environments such as hospitals, subway stations, shopping malls and so on, characterized by a weak or inexistent GPS signal …

Practical darknet traffic analysis: Methods and case studies
T Ban, D Inoue – … Intelligence & Computing, Advanced & Trusted …, 2017 – ieeexplore.ieee.org
… The collected programs are fed to a behavior analyzer and a code analyzer to obtain profiles their characteristics and behaviors … predicts with high confidence, an alert will be issued based on the result, otherwise, the information will be forwarded to a human operator for …

Estimating Attention of Faces due to its Growing Level of Emotions
RK Kumar, J Garain, DR Kisku… – 2018 IEEE/CVF …, 2018 – openaccess.thecvf.com
… as a salient object and this phenomenon is called visual saliency [4, 5]. Computer modeling with the salient facial expressions might be used in numerous applications like; Human Behavior Analyzer [6], Surveillance … We humans first detect a face then only recognize its emotion …

3-3 Data Mining Applied to Darknet Traffic Analysis
BAN Tao – analysis, 2016 – pdfs.semanticscholar.org
… Acquired malware specimens are fed to a malware behavior analyzer and a malware code analyzer so that a profile is learned based on their behav- ioral … If the classifier predicts with low confi- dence, the incident is will be forwarded to human operators for justification …

Large-scale drive-by download detection: visit n. process. analyse. report.
A Dens, M Bogaard, J van der Lelie, W Katz – 2015 – os3.nl
… It is important to note that no analysis is done in Step 2, only events are added to the graph. It is up to the analysers in this step to find malicious behaviour. Analysers are highly dependent on the graph structure to correctly interpret the graph …

A survey on video detection and tracking of maritime vessels
R Moreira, NFF Ebecken, AS Alves, F Livernet… – International Journal of …, 2014 – iaras.org
… The manual operation of surveillance systems is not efficient due to fatigue, stress and the limited ability of human beings to … video surveillance system consists of five main components, the initial detector, the image processor, the classifier, the tracker and the behavior analyzer …

A Review of Freely Available, Open-Source Software for the Automated Analysis of the Behavior of Adult Zebrafish
JE Franco-Restrepo, DA Forero, RA Vargas – Zebrafish, 2019 – liebertpub.com
… analyses. In comparison with the human genome sequence, genes from mice have ?80% homology, 5 zebrafish 70%, 4 and fruit flies 60%. 6 These genetic similarities allow the study of human diseases and biological phenomena …

Test oracles for simulink-like models
L Baresi, M Delamaro, P Nardi – Automated Software Engineering, 2017 – Springer
… In practice, the problem is often tackled by asking human testers to decide whether results are correct, and even Simulink native assertion blocks … The analyses are carried out by a special-purpose TRIO analyzer that comprises a main controller, a behavior analyzer and an …

GWVT: A GPU maritime vessel tracker based on the wisard weightless neural network
R da Silva Moreira, NFF Ebecken – Naval Engineers Journal, 2017 – ingentaconnect.com
… It is used for surveillance (Bloisi et al., 2011), target tracking (Moreira, Ebecken, 2015), simulation of human gait motion (Tandl et al … The components of the video surveillance system, object detector, image processor, classifier, tracker and behavior analyzer, have to execute their …

Advancing Models of Privacy Decision Making
A Kitkowska – diva-portal.org
… “It’s shocking!”: Analysing the Impact and Reactions to the A3: Android Apps Behaviour Analyser … In Pro- ceedings of the Mobile Privacy and Security for an Ageing Population workshop at the 20th International Conference on Human-Computer Interaction with Mobile Devices …

Classification-Driven Video Analytics for Critical Infrastructure Protection
P Curtis, M Harb, R Abielmona, E Petriu – Recent Advances in …, 2016 – Springer
… module. Open image in new window. Fig. 7 Block diagram illustrating the behavior engine. The behavior analyzers that are currently implemented include intrusion detection, abandoned object, and counting object analyzers. The …

TouchWB: Touch behavioral user authentication based on web browsing on smartphones
W Meng, Y Wang, DS Wong, S Wen, Y Xiang – Journal of Network and …, 2018 – Elsevier
… address this issue, research has been discussed on the use of behavioral authentication, which uses measurements from human actions to … The system particularly employed a PIN Content Analyzer and a Drawing Behavior Analyzer to identify imposters according to these two …

Performance and power profiling for emulated android systems
CH Tu, HH Hsu, JH Chen, CH Chen… – ACM Transactions on …, 2014 – dl.acm.org
… While software behavior analyzers excel on reporting the results of program analysis, by re- solving program symbols [Albertsson 2006], constructing call … Face Recognition We wrote a face recognition application to detect human faces in pictures and match the faces against a …

A Two-Pillar Approach to Analyze the Privacy Policies and Resource Access Behaviors of Mobile Augmented Reality Applications
D Harborth, M Hatamian… – … of the 52nd …, 2019 – scholarspace.manoa.hawaii.edu
… issues in MAR in the IS domain, in the specific domain dealing with mixed and augmented reality and in the human-computer interaction … In order to analyze the privacy behavior of MAR apps, we used a tool called Android Apps Behavior Analyzer (A3), which was developed …

Adaptive contents for interactive TV guided by machine learning based on predictive sentiment analysis of data
VM Mondragon, V García-Díaz, C Porcel, RG Crespo – Soft Computing, 2018 – Springer
… function is to regulate the content transmitted based on the feedback of the viewers which is analyzed by a behavior analyzer … social networks and the feedback received through them, express the beliefs, sensations, judgment, emotions and sentiments of human beings (Julian …

Software Analytics for Web Usability: A Systematic Mapping
LH Pellizon, J Choma, TS da Silva, E Guerra… – … Science and Its …, 2017 – Springer
… In another example, Zhu et al. [55] propose an user behavior analyzer, which can help the product owner find faults without having to reproduce the navigation … In: CHI 2006 Extended Abstracts on Human Factors in Computing Systems CHI 2006, no …

Application of technology to social communication impairment in childhood and adolescence
AT Wieckowski, SW White – Neuroscience & Biobehavioral Reviews, 2017 – Elsevier
… or questionnaire measures may decrease or even eliminate the need for direct contact with a clinician, which may improve the validity of the intervention (eg, if client behaves differently owing to therapist presence), as well as decrease the time burden on human assessors …

HTTP flood attack detection in application layer using machine learning metrics and bio inspired bat algorithm
I Sreeram, VPK Vuppala – Applied Computing and Informatics, 2017 – Elsevier
… The major focus of an HTTP flood DDoS attack is toward generating attack traffic that closely simulates legitimacy of a human user … DAT (Defending Systems Against Tilt DDoS Attacks) is built with two coordinated defenders namely In/egress filter (IF) and Behavior Analyzer (BA …

Investigation of hemostatic effect of Spleen-invigorating, Qi-replenishing and Blood-arresting Formula on simvastatin-induced zebrafish hemorrhage model
Y Chu, L Zhang, X Zhu, Y Zhang, B Xia, L Hou… – Journal of Traditional …, 2016 – Elsevier
… In order to exclude the impacts of human factors on the experiment results, blind design was allied in the preparation of … at different concentration were given, the velocity of motion of 11 zebrafish chosen from each experimental group was recorded using the behavior analyzer …

Real-time recognition of sows in video: a supervised approach
E Khoramshahi, J Hietaoja, A Valros, J Yun… – Information Processing in …, 2014 – Elsevier
… In fact, a number of behavior analyzers (such as aggression detection [18] and sleeping detection [7]) are potentially eligible to be … of automatic image-based monitoring is especially emphasized for high-risk situations (eg farrowing), where the lack of human supervision could …

A Complete Behavioral Measurement and Reporting: Optimized for Mobile Devices
TAMFA Zuhairi, JAS Musa, M Nauman – researchgate.net
… One way to tackle these malware is via signature-based techniques. However, this requires human effort in identification of threats and is not scalable. The … calls. They have developed a behavior analyzer to verify these system calls …

Privacy preservation framework for smart connected toys
B Yankson, F Iqbal, PCK Hung – Computing in Smart Toys, 2017 – Springer
… The theme is design three toy engines modules capable of: unlimited talking, emotional recognizing, and moral behavior analyzer … discussed current privacy protection frameworks across the globe; mainly focusing on European Union approach to privacy as a human right issue …

Online Product Search with Focus on Customers’ Needs
I Custódio, S Siqueira – 2016 – aisel.aisnet.org
… Journal of Intelligent Information Systems, 34(3), pp.227-248. Zin, TT, Tin, P., Toriu, T. e Hama, H. 2014. “A Human Behavior Analyzer Framework for consumer product search engines”. In Consumer Electronics (GCCE), IEEE 3rd Global Conference on (pp. 138- 139). IEEE.

Ameliorative effect of dietary milk-derived sphingomyelin concentrates on atopic-like dermatitis in NC/Nga mice
K Takeshima, Y Mori, F Sakai, Y Haruta-Ono… – Journal of Functional …, 2014 – Elsevier
… NC/Nga mice, which develop spontaneous dermatitis, are reported to be a good model for human atopic dermatitis (Matsuda et al., 1997), and the ceramide content in NC/Nga mice with … In this study, we used a SCLABA ® -Real automatic scratching behaviour analyser …

Suspicious Score Based Mechanism to Protect Web Servers against Application Layer Distributed Denial of Service Attacks
RD Saravanan, S Loganathan… – … Journal of Intelligent …, 2017 – researchgate.net
… This scheme assumes that humans can easily pass through the test but the bots cannot … Liu et al. [9] proposed a mechanism against Tilt DDoS attacks in which behaviour analyser is used to extract the web user’s behaviour and classifies the user as malicious or legitimate user …

Real-Time Recognition of Sows in Video: A Supervised Approach
K Ehsan, J Hietaoja, A Valros, J Yunb, M Pastella – 2014 – cyberleninka.org
… 44 In fact, a number of behavior analyzers (such as aggression detection[18] and sleeping 45 … The role of automatic image-based monitoring is especially emphasized for high-risk 53 situations (eg farrowing), where the lack of human supervision could lead to animal injuries 54 …

Toward overcoming neurodegenerative disease by the circadian molecular clock study
N ISHIDA – Synthesiology English edition, 2017 – jstage.jst.go.jp
… In humans, there was an interesting report that blood FGF21 was expressed in circadian rhythm following fatty acid rhythms.[25] In … FGF21 was induced by unsaturated fatty acid like linoleic acid rather than saturated acid like palmitic acid, using human hepatocarcinoma-derived …

Towards the Maintenance Principles of Cyber-Physical Systems.
S Ruiz-Arenas, I Horváth… – … Vestnik/Journal of …, 2014 – researchgate.net
… In general, CPSs strive toward a natural human-machine interaction that also extends to the human cognitive domain [25] … Any failure in MCSs can lead to loss of human life and to damage to the environment, and may cause losses in terms of supply and cost [33] …

Case studies of WSN-CPS applications
FJ Wu, T Luo, HP Tan – Cyber-Physical System Design with Sensor …, 2016 – mysmu.edu.sg
… monitoring. The goal of the first type is to improve sleep quality of humans, while the second type concentrates on identifying body motion patterns … 12.5.1 Conversation behavior analyzer As conversation is an important part of daily human activities, many application …

Analysis of facial expressions in children: Experiments based on the DB Child Affective Facial Expression (CAFE)
L Roa Barco – 2016 – addi.ehu.es
… 60 ix Page 10. Page 11. 1. CHAPTER Introduction Humans can recognize facial expressions and trough them can deduce emotions. However there are some human beings, like autistic persons, who can not deduce well emotions by reading the human facial expressions …

SensorApp: the light at the end of the tunnel for visually impaired learners
RK Sungkur, H Bissessur, K Camdoo – Journal of Computers in Education, 2017 – Springer
… PDA, improved with sensors, the wireless LAN, camera, GPS receivers and software sensors, network congestion manager, student behavior analyzer, web log … a markup language that defines a set of rules for encoding documents in a format which is both human readable and …

Quantitative and Qualitative Rating and Ranking Studies for Consolidation of an Application Portfolio for Large Scale Pilots
HH Nap, A van Berlo, R Wichert – Ambient Assisted Living, 2015 – Springer
… and reminders”, “Safe environment at home”, “Help when outdoors”, “Food and shopping management”, “Medication management” and “Long Term Behaviour Analyser” … 1. Mead, SE, Lamson, N., Rogers, WA: Human factors guidelines for web site usability: health-oriented web …

Automated analysis and prediction of job interview performance
I Naim, MI Tanveer, D Gildea… – IEEE Transactions on …, 2018 – ieeexplore.ieee.org
… paper, we address the challenge of automated under- standing of multimodal human interactions, including facial expression, prosody, and … The TARDIS framework incorporates a sub-module named NovA (NonVerbal behavior Analyzer) [32] that can rec- ognize several lower …

Development of a Zebrafish Model for Rapid Drug Screening against Alzheimer’s Disease
W Huang, C Li, Z Shen, X Zhu, B Xia… – Journal of Pharmacy and …, 2016 – zhunter.com
… Zebrafish movement D (distance) and ?S (speed change) to light-dark and dark-light cycles were recorded by viewpoint behavior analyzer (Zebralab V3 … “Human Prokinetic Drugs Promote Gastrointestinal Motility in Zebrafish.” Neurogastroenterology and Motility 26: 589-95 …

On test oracles for Simulink-like models
PA Nardi – 2014 – teses.usp.br
… the correctness of the program, and; (ii) the oracle problem (Weyuker, 1982) – the identi- fication of a procedure to decide whether the obtained result matches the expected result. Usually, the oracle role is played by a human tester …

Heterogeneity-aware adaptive auto-scaling heuristic for improved QoS and resource usage in cloud environments
J Sahni, DP Vidyarthi – Computing, 2017 – Springer
… caused by the similarities between tasks that the Cloud client is running or the repetitive nature of human behaviour … auto-scaling functionalities: (a) workload analyser, (b) application centric behaviour analysis, (c) QoS mapper, (d) resource centric behaviour analyser and (e …

BARTD: Bio-inspired anomaly based real time detection of under rated App-DDoS attack on web
KM Prasad, ARM Reddy, KV Rao – … of King Saud University-Computer and …, 2017 – Elsevier
… The major focus of an HTTP flood DDoS attack is toward generating attack traffic that closely simulates legitimacy of a human user … DAT (Defending Systems Against Tilt DDoS Attacks) is built with two coordinated defenders namely In/egress filter (IF) and Behavior Analyzer (BA …

QoS based Scheduling in Cloud Computing
PD Kaur, IG Chana – 2014 – tudr.thapar.edu
… resource specific attributes. The mapping operation is accomplished by facilitating scheduler with the behavior analysis information retrieved from behavior analyzer components … centric. For the application centric behavior analyzer, the system is modeled as a closed form …

Robust evaluation of products and reviewers in social rating systems
M Allahbakhsh, A Ignjatovic, HR Motahari-Nezhad… – World Wide Web, 2015 – Springer
Page 1. DOI 10.1007/s11280-013-0242-4 Robust evaluation of products and reviewers in social rating systems Mohammad Allahbakhsh·Aleksandar Ignjatovic· Hamid Reza Motahari-Nezhad·Boualem Benatallah Received: 21 …

User-Centric Power Management For Mobile Operating Systems
H Chen – 2016 – digitalcommons.wayne.edu
Page 1. Wayne State University Wayne State University Dissertations 1-1-2016 User-Centric Power Management For Mobile Operating Systems Hui Chen Wayne State University, Follow this and additional works at: http://digitalcommons.wayne.edu/oa_dissertations …

Injectable Nanoreinforced Shape-Memory Hydrogel System for Regenerating Spinal Cord Tissue from Traumatic Injury
C Wang, H Yue, Q Feng, B Xu, L Bian… – ACS applied materials & …, 2018 – ACS Publications
ADVERTISEMENT …

Mobile Interaction in Real Augmented Environments: Principles, Platforms, Models, Formalisms, Development Processes, and Applications
B David, R Chalon – Handbook of Research on Innovations in …, 2015 – igi-global.com
… AR devices and techniques can be particularly useful in this respect. Our aim is to study, through Ubiquitous Computing and Mixed Reality domains, some innovative human computer interfaces (Beau- douin-Lafon, 2000). These …

User Identification and Authentication on Emerging Interfaces
T Van Nguyen – 2018 – search.proquest.com
… His research interest includes cy- bersecurity, user identification and authentication, machine learning, human-computer interaction (HCI), and biometrics … 61 3.6.3 Performance of the Drawing Behavior Analyzer … Research has suggested that it is easier for humans to …

Search Engine Creation for a Web Platform Where the Data of Sun Follower Robots are Stored
R Szabo – 2018 26th Telecommunications Forum (TELFOR), 2018 – ieeexplore.ieee.org
… 2017, pp. 865–868. [9] TT Zin, P. Tin, T. Toriu, H. Hama, “A Human Behavior Analyzer Framework for consumer product search engines,” in Proc. 3rd Global Conference on Consumer Electronics (GCCE), 2014, pp. 138–139. [10 …

CAS: Cell Annotation Software–Research on Neuronal Tissue Has Never Been so Transparent
K Nurzynska, A Mikhalkin, A Piorkowski – Neuroinformatics, 2017 – Springer
… The common advantage of all adaptive methods is the lack of necessity for the operator to set parameters, hence the human influence on data processing is removed … Area. Dendrites. a. the makaka. 40. 30. Otsu. 40. 3. b. the human. 70. 70. Otsu. 100. 3. c. the mouse. 40. 13. Otsu …

Comparative Evaluation of Log-Based Pro-cess Performance Analysis Techniques
K Popov – pdfs.semanticscholar.org
… Figure 6. Abnormal activities [2] and present them in a human understandable way. [3] aims to describe a novel approach for dealing with latent waiting time and latent activi- ty time of the process. As in [1] authors use average time values …

Modeling, evaluation and provisioning of elastic service-based business processes in the cloud
M Amziani – 2015 – tel.archives-ouvertes.fr
Page 1. HAL Id: tel-01217186 https://tel.archives-ouvertes.fr/tel-01217186 Submitted on 19 Oct 2015 HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not …

Towards Dialogue Strategies for Cognitive Workload Man
J Villing – Accident Analysis and Prevention, 2015 – researchgate.net
… However, we will probably see a more natural and human-like dialogue in future dialogue sys- tems, where both the user and the system are able … as a demand placed upon humans (De Waard, 1996).The con- cept is hard to define, since the term can have different mean- ings …

Towards Dialogue Strategies for Cognitive Workload Management
J Villing – 2015 – gupea.ub.gu.se
… However, we will probably see a more natural and human-like dialogue in future dialogue sys- tems, where both the user and the system are able … as a demand placed upon humans (De Waard, 1996).The con- cept is hard to define, since the term can have different mean- ings …

Hypothalamic CNTF volume transmission shapes cortical noradrenergic excitability upon acute stress
A Alpár, P Zahola, J Hanics, Z Hevesi… – The EMBO …, 2018 – emboj.embopress.org
Skip to main content. Advertisement. Other Publications: EMBO Press; The EMBO Journal (Home); EMBO reports; EMBO Molecular Medicine; Molecular Systems Biology; Life Science Alliance. Institution: Google Indexer. Login. Search. Search for this keyword. Advanced Search …

Oral administration of Pantoea agglomerans-derived lipopolysaccharide prevents metabolic dysfunction and Alzheimer’s disease-related memory loss in …
Y Kobayashi, H Inagawa, C Kohchi, K Kazumura… – PloS one, 2018 – journals.plos.org
… that orally administered Pantoea agglomerans-derived lipopolysaccharide (LPSp) exhibited an LDL (low-density lipoprotein)-lowering effect in human volunteers with … but no efficient clinical drug has emerged until now due to the presence of side effects in humans [3] …

From Individual To Connected Driving: An Interactive Driver Vehicle Environment For Road User Safety
J Xu – 2017 – repository.library.northeastern.edu
… Though these technologies will change the transportation mode, the human being will not be removed from the heart of the transportation system. However, the role of humans and the way they interact with vehicles and other road users will be redefined …

A comparative study of systems for the design of flexible user interfaces
C Mayer, G Zimmermann, A Grguric… – Journal of Ambient …, 2016 – content.iospress.com
… sign language icons next to the input fields, and pressing them will show an overlay window with a human sign language … It displays an example setup where Medication Manager, Agenda, Long Term Behaviour Analyzer (LTBA) and Food and Shopping services are installed …

(Visited 10 times, 1 visits today)