Results for ' Network Traffic, '

981 found
Order:
  1.  77
    Advanced Network Traffic Analysis Models for Detecting Sophisticated Cyber Espionage Campaigns.V. Jain Jayant - 2025 - International Journal of Advanced Research in Cyber Security 6 (1):6-10.
    Cyber espionage campaigns pose significant challenges to global security, exploiting vulnerabilities in network infrastructures. This research paper explores advanced network traffic analysis models tailored for detecting sophisticated cyber espionage operations. The study focuses on leveraging machine learning algorithms, anomaly detection systems, and hybrid threat detection frameworks to identify subtle yet malicious activities within network traffic. Through a review of research, this paper synthesizes key findings and outlines practical applications, offering a roadmap for enhancing cybersecurity frameworks. Findings highlight (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  65
    User Activity Analysis Via Network Traffic Using DNN and Optimized Federated Learning based Privacy Preserving Method in Mobile Wireless Networks (14th edition).Sugumar R. - 2024 - Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 14 (2):66-81.
    Mobile and wireless networking infrastructures are facing unprecedented loads due to increasing apps and services on mobiles. Hence, 5G systems have been developed to maximise mobile user experiences as they can accommodate large volumes of traffics with extractions of fine-grained data while offering flexible network resource controls. Potential solutions for managing networks and their security using network traffic are based on UAA (User Activity Analysis). DLTs (Deep Learning Techniques) have been recently used in network traffic analysis for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  67
    User Activity Analysis Via Network Traffic Using DNN and Optimized Federated Learning based Privacy Preserving Method in Mobile Wireless Networks.DrV. R. Vimal and DrR. Sugumar DrR. Udayakumar, Dr Suvarna Yogesh Pansambal, Dr Yogesh Manohar Gajmal - 2023 - INDIA: ESS- ESS PUBLICATION.
    Mobile and wireless networking infrastructures are facing unprecedented loads due to increasing apps and services on mobiles. Hence, 5G systems have been developed to maximise mobile user experiences as they can accommodate large volumes of traffics with extractions of fine-grained data while offering flexible network resource controls. Potential solutions for managing networks and their security using network traffic are based on UAA (User Activity Analysis). DLTs (Deep Learning Techniques) have been recently used in network traffic analysis for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4.  32
    Traffic Optimization Utilizing AI to Dynamically Adjust Network Routes based on Real-Time Traffic Patterns to Minimize Latency and Maximize Throughput.Odubade Kehinde Santhosh Katragadda - 2021 - International Journal of Innovative Research in Computer and Communication Engineering 9 (1):1-12.
    Internet network optimization techniques require immediate expansion because users require fast latency performance alongside improved data transmission speed. Dynamic traffic systems operate with Machine learning algorithms that belong to the Artificial Intelligence category to power their fundamental operational tools. Through real-time data processing, AI systems can modify network pathways in operation thus generating enhanced performance together with outstanding user interface quality. Using reinforcement learning and neural networks developed by artificial intelligence enables better traffic prediction along with response abilities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5.  85
    Securing IoT Networks: Machine Learning-Based Malware Detection and Adaption.G. Ganesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-16.
    Although Internet of Things (IoT) devices are being rapidly embraced worldwide, there are still several security concerns. Due to their limited resources, they are susceptible to malware assaults such as Gafgyt and Mirai, which have the ability to interrupt networks and infect devices. This work looks into methods based on machine learning to identify and categorize malware in IoT network activity. A dataset comprising both malware and benign traffic is used to assess different classification techniques, such as Random Forest, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Engineering Social Justice into Traffic Control for Self-Driving Vehicles?Milos N. Mladenovic & Tristram McPherson - 2016 - Science and Engineering Ethics 22 (4):1131-1149.
    The convergence of computing, sensing, and communication technology will soon permit large-scale deployment of self-driving vehicles. This will in turn permit a radical transformation of traffic control technology. This paper makes a case for the importance of addressing questions of social justice in this transformation, and sketches a preliminary framework for doing so. We explain how new forms of traffic control technology have potential implications for several dimensions of social justice, including safety, sustainability, privacy, efficiency, and equal access. Our central (...)
    Download  
     
    Export citation  
     
    Bookmark   16 citations  
  7.  30
    Deep Learning-based Traffic Sign Detection and Recognition (TSDR).Vattem Srinath Shaik Nagul Meera - 2023 - International Journal of Multidisciplinary Research in Science, Engineering, Technology and Management 10 (11):13073-13076.
    Traffic sign detection and recognition (TSDR) is a critical aspect of autonomous driving and intelligent transportation systems. Traditional methods of traffic sign detection rely on handcrafted features and classical machine learning algorithms, which often struggle to achieve high accuracy in complex real-world environments. In contrast, deep learning techniques, particularly Convolutional Neural Networks (CNNs), have shown remarkable performance in both detecting and recognizing traffic signs in diverse conditions. This paper reviews the application of deep learning methods for TSDR, focusing on recent (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Network Intrusion Detection using Machine Learning.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (4):1-15.
    With the growing sophistication and frequency of cyberattacks, there is a critical need for effective systems that can detect and prevent breaches in real time. The AI/ML-based Network Intrusion Detection System (NIDS) addresses this need by analyzing traffic patterns to identify security breaches in firewalls, routers, and network infrastructures. By integrating machine learning algorithms—K-Nearest Neighbors (KNN), Support Vector Machine (SVM), and Random Forest—the system is able to detect both known cyber threats and previously unseen attack vectors. Unlike traditional (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  28
    Network Intrusion Classification.O. Sri Nagesh - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (11):1-14.
    The rapid proliferation of interconnected devices and the increasing complexity of digital networks in the modern era have resulted in a surge of diverse and voluminous network traffic. This growth poses considerable challenges in effectively distinguishing between normal and malicious data flows. As cyber threats continue to evolve, traditional traffic classification methods struggle to keep pace with the dynamic and multifaceted security challenges of contemporary networks. In this context, ensuring robust network security has become an imperative. This research (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  21
    Machine Learning Meets Network Management and Orchestration in Edge-Based Networking Paradigms": The Integration of Machine Learning for Managing and Orchestrating Networks at the Edge, where Real-Time Decision-Making is C.Odubade Kehinde Santhosh Katragadda - 2022 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (4):1635-1645.
    Integrating machine learning (ML) into network management and orchestration has revolutionized edgebased networking paradigms, where real-time decision-making is critical. Traditional network management approaches often struggle with edge environments' dynamic and resource-constrained nature. By leveraging ML algorithms, networks at the edge can achieve enhanced efficiency, automation, and adaptability in areas such as traffic prediction, resource allocation, and anomaly detection (Wang et al., 2021). Supervised and unsupervised learning techniques facilitate proactive network optimization, reducing latency and improving quality of service (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  36
    Data Compression for Backbone Networking.K. Sadanandam - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (11):1-15.
    . The surge in data traffic strains backbone networks, causing congestion, latency, and higher costs. This project proposes a data compression system tailored for backbone networks, utilizing Lempel-Ziv (LZ) and Huffman encoding to enhance processing time and network efficiency. Adaptive features allow the system to respond to network conditions, ensuring scalability and cost-effectiveness. The primary objective is to optimize network performance by reducing data packet size, increasing throughput, lowering latency, and reducing energy use.
    Download  
     
    Export citation  
     
    Bookmark  
  12. To overhear or not to overhear: a dilemma between network coding gain and energy consumption in multi-hop wireless networks.Nastooh Taheri Javan - 2019 - Wireless Networks 25 (7):4097-4113.
    Any properly designed network coding technique can result in increased throughput and reliability of multi-hop wireless networks by taking advantage of the broadcast nature of wireless medium. In many inter-flow network coding schemes nodes are encouraged to overhear neighbour’s traffic in order to improve coding opportunities at the transmitter nodes. A study of these schemes reveal that some of the overheard packets are not useful for coding operation and thus this forced overhearing increases energy consumption dramatically. In this (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13.  32
    Resource Allocation Optimizing Resource Allocation in Data Centers and Networks using AI to Efficiently Distribute Bandwidth and Computing Power.Santhosh Katragadda Amarnadh Eedupuganti - 2019 - International Journal of Advanced Research in Education and Technology 6 (5):1609-1620.
    Rapidly expanding data centers along with networks create a fundamental problem regarding resource allocation efficiency. Standard resource management systems prove unable to adapt dynamically to varying workloads so bandwidth allocation and computing utilization stays inefficient. Developers use recent advancements in artificial intelligence technology to build automatic optimization algorithms that instantly adjust resource distributions. Through the integration of machine learning with deep reinforcement learning systems organizations obtain predictive power to prepare resource distribution ahead of time without endangering operational efficiency. According to (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14.  45
    LBAODV: a new load balancing multipath routing algorithm for mobile ad hoc networks.Nastooh Taheri Javan - 2008 - 2008 6Th National Conference on Telecommunication Technologies 1 (1):344-349.
    An ad hoc network is comprised of mobile hosts without any wired infrastructure support. Multipath routing allows the establishment of multiple paths between a source and a destination. It distributes traffic among multiple paths instead of routing all the traffics along a single path. In this paper, we propose a new multipath routing protocol that uses all discovered paths simultaneously for transmitting data, by using this approach data packets are balanced over discovered paths and energy consumption is distributed across (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. A New Framework and Performance Assessment Method for Distributed Deep Neural NetworkBased Middleware for Cyberattack Detection in the Smart IoT Ecosystem.Tambi Varun Kumar - 2024 - International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering 11 (5):2283-2291.
    In the current digital environment, cyberattacks continue to pose a serious risk and difficulty. Internet of Things (IoT) devices are becoming more and more vulnerable due to security problems like ransomware, malware, poor encryption, and IoT botnets. These flaws may result in ransom demands, data tampering, illegal access, and system risks. Creating strong cybersecurity procedures for contemporary smart environments is essential to resolving these problems. This strategy uses proactive network traffic monitoring to spot any dangers in the Internet of (...)
    Download  
     
    Export citation  
     
    Bookmark   85 citations  
  16.  74
    Design of Cybersecurity Smart Controller For Grid Connected Microgrid.Soma Abhiram - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (5):1-15.
    The research introduces to the design and implementation of the Cybersecurity Enabled Smart Controller for the grid connected microgrid which uses the combination of the Web technologies and the authentication mechanism which enables real time monitoring with help of the Dashboards built using Chart.js which is a framework of JavaScript. Due to the role and connection of the Microgrids with the critical infrastructure they are vulnerable to the cyber threats. This project leverages the use of HTML, CSS, JavaScript and MongoDB (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17.  48
    Shielding the Cloud: _A Survey of Different DDoS Detection Techniques (13th edition).Kruthika B. Anil Kumar, , Lavanya G. S. - 2024 - International Journal of Innovative Research in Science, Engineering and Technology 13 (10):17762-17766. Translated by Lavanya G S Anil Kumar.
    Security is a major concern on the internet, and Distributed Denial of Service (DDoS) attacks are a significant threat. These attacks overwhelm network resources and use up bandwidth, making it difficult for legitimate users to access services. One challenge in dealing with DDoS attacks is telling the difference between a sudden increase in traffic from real users, known as a "flash crowd," and actual attack traffic. This paper looks at different existing solutions for detecting DDoS attacks and explains how (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18.  84
    Advanced Threat Detection Using AI-Driven Anomaly Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 4 (1):266-272.
    In the rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated, making traditional security measures inadequate. Advanced Threat Detection (ATD) leveraging Artificial Intelligence (AI)-driven anomaly detection systems offers a proactive approach to identifying and mitigating cyber threats in real time. This paper explores the integration of AI, particularly machine learning (ML) and deep learning (DL) techniques, in anomaly detection to enhance cybersecurity defenses. By analyzing vast amounts of network traffic, user behavior, and system logs, AI-driven models can identify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19.  67
    Enhancing Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-664.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20.  24
    Strengthening Cloud Security with AI-Based Intrusion Detection Systems.Sharma Sidharth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):658-663.
    Cloud computing has transformed data management by providing scalable and on-demand services, but its open and shared infrastructure makes it highly vulnerable to sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) struggle with dynamic and large-scale cloud environments due to high false positives, limited adaptability, and computational overhead. To address these challenges, this paper proposes an AI-driven Intrusion Detection System (AI-IDS) that leverages deep learning models, including Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) networks, to analyze network (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21.  61
    AI-Driven Anomaly Detection for Advanced Threat Detection.Sharma Sidharth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):266-272.
    In the rapidly evolving digital landscape, cyber threats are becoming increasingly sophisticated, making traditional security measures inadequate. Advanced Threat Detection (ATD) leveraging Artificial Intelligence (AI)-driven anomaly detection systems offers a proactive approach to identifying and mitigating cyber threats in real time. This paper explores the integration of AI, particularly machine learning (ML) and deep learning (DL) techniques, in anomaly detection to enhance cybersecurity defenses. By analyzing vast amounts of network traffic, user behavior, and system logs, AI-driven models can identify (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup (...)
    Download  
     
    Export citation  
     
    Bookmark   111 citations  
  23. EFFICIENT STRATEGIES FOR SEAMLESS CLOUD MIGRATIONS USING ADVANCED DEPLOYMENT AUTOMATIONS.Tummalachervu Chaitanya Kanth - 2023 - Journal of Science Technology and Research (JSTAR) 4 (1):61-70.
    The increasing complexity and scale of modern computing needs have led to the development and adoption of cloud computing as a ubiquitous paradigm for data storage and processing. The hybrid cloud model, which combines both public and private cloud infrastructures, has been particularly appealing to organizations that require both the scalability offered by public clouds and the security features of private clouds. Various strategies for configuring and managing resources have been developed to optimize the hybrid cloud environment. These strategies aim (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  24. Policing Uncertainty: On Suspicious Activity Reporting.Meg Stalcup - 2015 - In Rabinow Simimian-Darash, Modes of Uncertainty: Anthropological Cases. University of Chicago. pp. 69-87.
    A number of the men who would become the 9/11 hijackers were stopped for minor traffic violations. They were pulled over by police officers for speeding or caught by random inspection without a driver’s license. For United States government commissions and the press, these brushes with the law were missed opportunities. For some police officers though, they were of personal and professional significance. These officers replayed the incidents of contact with the 19 men, which lay bare the uncertainty of every (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  25. What Studios Do.Eliot Bates - 2012 - Journal on the Art of Record Production 7 (1).
    Studios resist reductive analyses. Although isolated, they have their own frontstages and backstages, and like the laboratories studied by Knorr-Cetina, function as more than simply “internal environments.” The placeness of studios leaves both audible traces (the early reflections of sounds) and visible ones, if we think of those studios that become shrines or pilgrimage sites, or photo or video documentation of studios that provide the outside world a brief glimpse into the interior isolation of recording studio life. It would seem (...)
    Download  
     
    Export citation  
     
    Bookmark  
  26. IMPROVING ENERGY EFFICIENCY IN MANETS BY MULTI-PATH ROUTING.Nastooh Taheri Javan - 2013 - International Journal of Wireless and Mobile Networks 5 (1):163-176.
    Some multi-path routing algorithm in MANET, simultaneously send information to the destination through several directions to reduce end-to-end delay. In all these algorithms, the sent traffic through a path affects the adjacent path and unintentionally increases the delay due to the use of adjacent paths. Because, there are repetitive competitions among neighboring nodes, in order to obtain the joint channel in adjacent paths. The represented algorithm in this study tries to discover the distinct paths between source and destination nodes with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27.  65
    Forecasting and Scheduling of Railway Rakes using Machine Learning.A. Pranay - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (7):1-15.
    Efficient rake scheduling and demand forecasting in railway operations are essential to address the complexities of passenger demand, minimize delays, and enhance utilization. This project uses advanced machine learning methods, specifically LSTM (Long Short-Term Memory) networks and GBM (Gradient Boosting Machine), to predict demand and optimize rake scheduling dynamically. Integrating a user-friendly web interface allows realtime data monitoring, enabling railway operators to make informed decisions. By leveraging real-time data sources, including rake movement, schedules, weather, and traffic conditions, this project aims (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28.  60
    Investigation of vulnerabilities in implementation of crypto library used by OpenVPN for IPV6 deployment.B. Ravinder Reddy - 2024 - International Journal of Engineering Innovations and Management Strategies, 1 (4):1-13.
    Abstract. The increasing adoption of IPv6 has introduced new security concerns, including the threat of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These attacks leads service disruptions, financial losses, and reputational damage. A Denial of Service (DoS) attack is when a single computer or device sends a large amount of traffic to a network or website. Whereas A Distributed Denial of Service (DDoS) launched from multiple devices or computers, making it harder to block and more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29.  92
    AN INTRUSION DETECTION SYSTEM MODEL FOR DETECTING KNOWN AND INNOVATIVE CYBER ATTACKS USING SVM ALGORITHM.Selvan Arul - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):150-157.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30.  97
    SVM Model for Cyber Threat Detection: Known and Innovative Attacks.Prathap Jeyapandi - 2022 - Journal of Science Technology and Research (JSTAR) 3 (1):201-209.
    Nowadays, intrusions have become a major problem faced by users. To stop these cyber attacks from happening, the development of a reliable and effective Intrusion Detection System (IDS) for cyber security has become an urgent issue to be solved. The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Network representation and complex systems.Charles Rathkopf - 2018 - Synthese (1).
    In this article, network science is discussed from a methodological perspective, and two central theses are defended. The first is that network science exploits the very properties that make a system complex. Rather than using idealization techniques to strip those properties away, as is standard practice in other areas of science, network science brings them to the fore, and uses them to furnish new forms of explanation. The second thesis is that network representations are particularly helpful (...)
    Download  
     
    Export citation  
     
    Bookmark   35 citations  
  32. The Traffic in Women: Notes on the "Political Economy" of Sex.Gayle Rubin - 1975 - In Rayna R. Reiter, Toward an Anthropology of Women. New York: Monthly Review Press. pp. 157--210.
    Download  
     
    Export citation  
     
    Bookmark   96 citations  
  33. Scientific Networks on Data Landscapes: Question Difficulty, Epistemic Success, and Convergence.Patrick Grim, Daniel J. Singer, Steven Fisher, Aaron Bramson, William J. Berger, Christopher Reade, Carissa Flocken & Adam Sales - 2013 - Episteme 10 (4):441-464.
    A scientific community can be modeled as a collection of epistemic agents attempting to answer questions, in part by communicating about their hypotheses and results. We can treat the pathways of scientific communication as a network. When we do, it becomes clear that the interaction between the structure of the network and the nature of the question under investigation affects epistemic desiderata, including accuracy and speed to community consensus. Here we build on previous work, both our own and (...)
    Download  
     
    Export citation  
     
    Bookmark   24 citations  
  34. Networks of Gene Regulation, Neural Development and the Evolution of General Capabilities, Such as Human Empathy.Alfred Gierer - 1998 - Zeitschrift Für Naturforschung C - A Journal of Bioscience 53:716-722.
    A network of gene regulation organized in a hierarchical and combinatorial manner is crucially involved in the development of the neural network, and has to be considered one of the main substrates of genetic change in its evolution. Though qualitative features may emerge by way of the accumulation of rather unspecific quantitative changes, it is reasonable to assume that at least in some cases specific combinations of regulatory parts of the genome initiated new directions of evolution, leading to (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  35. Hierarchies, Networks, and Causality: The Applied Evolutionary Epistemological Approach.Nathalie Gontier - 2021 - Journal for General Philosophy of Science / Zeitschrift für Allgemeine Wissenschaftstheorie 52 (2):313-334.
    Applied Evolutionary Epistemology is a scientific-philosophical theory that defines evolution as the set of phenomena whereby units evolve at levels of ontological hierarchies by mechanisms and processes. This theory also provides a methodology to study evolution, namely, studying evolution involves identifying the units that evolve, the levels at which they evolve, and the mechanisms and processes whereby they evolve. Identifying units and levels of evolution in turn requires the development of ontological hierarchy theories, and examining mechanisms and processes necessitates theorizing (...)
    Download  
     
    Export citation  
     
    Bookmark   9 citations  
  36. Neural Network-Based Water Quality Prediction.Mohammed Ashraf Al-Madhoun & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (9):25-31.
    Water quality assessment is critical for environmental sustainability and public health. This research employs neural networks to predict water quality, utilizing a dataset of 21 diverse features, including metals, chemicals, and biological indicators. With 8000 samples, our neural network model, consisting of four layers, achieved an impressive 94.22% accuracy with an average error of 0.031. Feature importance analysis revealed arsenic, perchlorate, cadmium, and others as pivotal factors in water quality prediction. This study offers a valuable contribution to enhancing water (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  37. Artificial Neural Network for Forecasting Car Mileage per Gallon in the City.Mohsen Afana, Jomana Ahmed, Bayan Harb, Bassem S. Abu-Nasser & Samy S. Abu-Naser - 2018 - International Journal of Advanced Science and Technology 124:51-59.
    In this paper an Artificial Neural Network (ANN) model was used to help cars dealers recognize the many characteristics of cars, including manufacturers, their location and classification of cars according to several categories including: Make, Model, Type, Origin, DriveTrain, MSRP, Invoice, EngineSize, Cylinders, Horsepower, MPG_Highway, Weight, Wheelbase, Length. ANN was used in prediction of the number of miles per gallon when the car is driven in the city(MPG_City). The results showed that ANN model was able to predict MPG_City with (...)
    Download  
     
    Export citation  
     
    Bookmark   47 citations  
  38. Learning Networks and Connective Knowledge.Stephen Downes - 2010 - In Harrison Hao Yang & Steve Chi-Yin Yuen, Collective Intelligence and E-Learning 2.0: Implications of Web-Based Communities and Networking. IGI Global.
    The purpose of this chapter is to outline some of the thinking behind new e-learning technology, including e-portfolios and personal learning environments. Part of this thinking is centered around the theory of connectivism, which asserts that knowledge - and therefore the learning of knowledge - is distributive, that is, not located in any given place (and therefore not 'transferred' or 'transacted' per se) but rather consists of the network of connections formed from experience and interactions with a knowing community. (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  39. Networked Learning and Three Promises of Phenomenology.Lucy Osler - forthcoming - In Phenomenology in Action for Researching Networked Learning Experiences.
    In this chapter, I consider three ‘promises’ of bringing phenomenology into dialogue with networked learning. First, a ‘conceptual promise’, which draws attention to conceptual resources in phenomenology that can inspire and inform how we understand, conceive of, and uncover experiences of participants in networked learning activities and environments. Second, a ‘methodological promise’, which outlines a variety of ways that phenomenological methodologies and concepts can be put to use in empirical research in networked learning. And third, a ‘critical promise’, which suggests (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. Network ethics: information and business ethics in a networked society.Luciano Floridi - 2009 - Journal of Business Ethics 90 (S4):649 - 659.
    This article brings together two research fields in applied ethics - namely, information ethics and business ethics- which deal with the ethical impact of information and communication technologies but that, so far, have remained largely independent. Its goal is to articulate and defend an informational approach to the conceptual foundation of business ethics, by using ideas and methods developed in information ethics, in view of the convergence of the two fields in an increasingly networked society.
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  41. Nature as a Network of Morphological Infocomputational Processes for Cognitive Agents.Gordana Dodig Crnkovic - 2017 - Eur. Phys. J. Special Topics 226 (2):181-195.
    This paper presents a view of nature as a network of infocomputational agents organized in a dynamical hierarchy of levels. It provides a framework for unification of currently disparate understandings of natural, formal, technical, behavioral and social phenomena based on information as a structure, differences in one system that cause the differences in another system, and computation as its dynamics, i.e. physical process of morphological change in the informational structure. We address some of the frequent misunderstandings regarding the natural/morphological (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  42. Neural Network-Based Audit Risk Prediction: A Comprehensive Study.Saif al-Din Yusuf Al-Hayik & Samy S. Abu-Naser - 2023 - International Journal of Academic Engineering Research (IJAER) 7 (10):43-51.
    Abstract: This research focuses on utilizing Artificial Neural Networks (ANNs) to predict Audit Risk accurately, a critical aspect of ensuring financial system integrity and preventing fraud. Our dataset, gathered from Kaggle, comprises 18 diverse features, including financial and historical parameters, offering a comprehensive view of audit-related factors. These features encompass 'Sector_score,' 'PARA_A,' 'SCORE_A,' 'PARA_B,' 'SCORE_B,' 'TOTAL,' 'numbers,' 'marks,' 'Money_Value,' 'District,' 'Loss,' 'Loss_SCORE,' 'History,' 'History_score,' 'score,' and 'Risk,' with a total of 774 samples. Our proposed neural network architecture, consisting of (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  43. Actor Network, Ontic Structural Realism and the Ontological Status of Actants.Corrado Matta - 2014 - Proceedings of the 9th International Conference on Networked Learning 2014.
    In this paper I discuss the ontological status of actants. Actants are argued as being the basic constituting entities of networks in the framework of Actor Network Theory (Latour, 2007). I introduce two problems concerning actants that have been pointed out by Collin (2010). The first problem concerns the explanatory role of actants. According to Collin, actants cannot play the role of explanans of networks and products of the same newtork at the same time, at pain of circularity. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. On Networks and Dialogues.Gabriel Furmuzachi - manuscript
    This essay inquires into the possibility of extending Randall Collins' analysis (as it is presented in The Sociology of Philosophies) of the process of innovation within intellectual networks.
    Download  
     
    Export citation  
     
    Bookmark  
  45. Density Based Traffic Control Signaling Using IR sensors.Tenepalli Kalyan Sai Manikanta Chari & SaiTeja Tutika - 2019 - IJEAIS 3 (3):51-60.
    Abstract—Traffic clog is a serious issue in the majority of the urban areas over the world and it has turned into a bad dream for the residents. It is brought about by postponement in flag, improper planning of traffic flagging and so on. The postponement of traffic light is hard coded and it doesn't depend on traffic. In this manner for streamlining traffic control, there is an expanding request in precise snappy programmed framework. This paper is intended to build up (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46. Fuzzy Networks for Modeling Shared Semantic Knowledge.Farshad Badie & Luis M. Augusto - 2023 - Journal of Artificial General Intelligence 14 (1):1-14.
    Shared conceptualization, in the sense we take it here, is as recent a notion as the Semantic Web, but its relevance for a large variety of fields requires efficient methods of extraction and representation for both quantitative and qualitative data. This notion is particularly relevant for the investigation into, and construction of, semantic structures such as knowledge bases and taxonomies, but given the required large, often inaccurate, corpora available for search we can get only approximations. We see fuzzy description logic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. Examining the Network Structure among Moral Functioning Components with Network Analysis.Hyemin Han - 2024 - Personality and Individual Differences 217:112435.
    I explored the association between components constituting the basis for moral and optimal human functioning, i.e., moral reasoning, moral identity, empathy, and purpose, via network analysis. I employed factor scores instead of composite scores that most previous studies used for better accuracy in score estimation in this study. Then, I estimated the network structure among collected variables and centrality indicators. For additional information, the structure and indicators were compared between two groups, participants who engaged in civic activities highly (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
  48. Self-Assembling Networks.Jeffrey A. Barrett, Brian Skyrms & Aydin Mohseni - 2019 - British Journal for the Philosophy of Science 70 (1):1-25.
    We consider how an epistemic network might self-assemble from the ritualization of the individual decisions of simple heterogeneous agents. In such evolved social networks, inquirers may be significantly more successful than they could be investigating nature on their own. The evolved network may also dramatically lower the epistemic risk faced by even the most talented inquirers. We consider networks that self-assemble in the context of both perfect and imperfect communication and compare the behaviour of inquirers in each. This (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  49. Using Network Models in Person-Centered Care in Psychiatry: How Perspectivism Could Help To Draw Boundaries.Nina de Boer, Daniel Kostić, Marcos Ross, Leon de Bruin & Gerrit Glas - 2022 - Frontiers in Psychiatry, Section Psychopathology 13 (925187).
    In this paper, we explore the conceptual problems arising when using network analysis in person- centered care (PCC) in psychiatry. Personalized network models are potentially helpful tools for PCC, but we argue that using them in psychiatric practice raises boundary problems, i.e., problems in demarcating what should and should not be included in the model, which may limit their ability to provide clinically-relevant knowledge. Models can have explanatory and representational boundaries, among others. We argue that we can make (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Learning Computer Networks Using Intelligent Tutoring System.Mones M. Al-Hanjori, Mohammed Z. Shaath & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1).
    Intelligent Tutoring Systems (ITS) has a wide influence on the exchange rate, education, health, training, and educational programs. In this paper we describe an intelligent tutoring system that helps student study computer networks. The current ITS provides intelligent presentation of educational content appropriate for students, such as the degree of knowledge, the desired level of detail, assessment, student level, and familiarity with the subject. Our Intelligent tutoring system was developed using ITSB authoring tool for building ITS. A preliminary evaluation of (...)
    Download  
     
    Export citation  
     
    Bookmark   29 citations  
1 — 50 / 981