نتایج جستجو برای: پروژه bot

تعداد نتایج: 19654  

2005
Roderich Groß Michael Bonani Francesco Mondada Marco Dorigo

In this paper, we present a comprehensive study on autonomous self-assembly. In particular, we discuss the selfassembling capabilities of the swarm-bot, a distributed robotics concept that lies at the intersection between collective and selfreconfigurable robotics. A swarm-bot comprises autonomous mobile robots called s-bots. S-bots can either act independently or self-assemble into a swarm-bot...

2012
M. Eddahibi A. Nejeoui C. Cherkaoui R. H. Guttman A. G. Moukas G. Swamynathan C. Wilson B. Boe K. Almeroth B. Y. Zhao S. Staab E. Erdmann A. Maedche S. Hubner H. Neumann H. Stuckenschmidt G. Schuster T. Vogele U. Visser

Price comparison is an increasingly common usage of the internet. Its goal is to locate access and compare relevant information for specific products from retailers from whom users can buy. This work is devoted to the design and the development of a shopping bot with the aim of overcoming the well-known difficulties in price comparison area. iShopBot is a shopping bot that combines several tech...

Journal: :Electrochimica Acta 2021

The present work describes the performance of a new voltammetric sensor based on modification glassy carbon electrodes (GCE) with black (CB) and botryosphaeran (BOT) (CB-BOT/GCE) for electroanalytical determination cyclobenzaprine. BOT is fungal exocellular (1→3)(1→6)-β-ᴅ-glucan, which was used to improve adherence CB onto surface GCE. electrochemical characterisation performed by impedance spe...

Journal: :Journal of Travel Medicine 1995

Journal: :Indian Scientific Journal Of Research In Engineering And Management 2022

Abstract—Discord is a popular real-time chat platform with comprehensive bot support. Bots are common on Discord and offer variety of services such as moderating aid, games, music, internet searches, money processing, more. We attempted to create simple variation in the community by deploying this study. The purpose study implement safe that identifies emotions automatically eliminates chats no...

Journal: :Interaction Studies 2021

Abstract In human-chatbot interaction, users casually and regularly offend abuse the chatbot they are interacting with. The current paper explores relationship between humanlikeness on one hand sexual advances verbal aggression by user other hand. 283 conversations Cleverbot its were harvested analysed. Our results showed higher counts of comments towards when appeared more humanlike in behavio...

Journal: :CoRR 2016
Nicole M. Radziwill Morgan C. Benton

This exploratory study used the R Statistical Software to perform Monte Carlo simulation of time maps, which characterize events based on the elapsed time since the last event and the time that will transpire until the next event, and compare them to time maps from real Twitter users. Time maps are used to explore differences in the interarrival patterns of Tweets between human users, humans wh...

2010
Phillip A. Porras Hassen Saïdi Vinod Yegneswaran

We present an analysis of the iKee.B (duh) Apple iPhone bot client, captured on November 25, 2009. The bot client was released throughout several countries in Europe, with the initial purpose of coordinating its infected iPhones via a Lithuanian botnet server. This report details the logic and function of iKee’s scripts, its configuration files, and its two binary executables, which we have rev...

Journal: :I. J. Network Security 2014
Soniya Balram M. Wilscy

Bots are malicious software components used for generating spams, launching denial of service attacks, phishing, identity theft and information exfiltration and such other illegal activities. Bot detection is an area of active research in recent times. Here we propose a bot detection mechanism for a single host. A user traffic profile is used to filter out normal traffic generated by the host. ...

2007
Satoshi Kondo Naoshi Sato

Bots, which are new malignant programs are hard to detect by signature based pattern matching techniques. In this research, we focused on a unique function of the bots the remote control channel (C&C session). We clarified that the C&C session has unique characteristics that come from the behavior of bot programs. Accordingly, we propose an alternative technique to identify computers compromise...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید