Abstract:
A device may receive behavior information that identifies a first user, of a first set of users, in association with a behavior. The behavior may relate to one or more requests, from a client device being used by the first user, to access a network resource. The device may determine, based on a model, whether the behavior is normal. The model may include a normal behavior pattern based on behavior information associated with the first set of users. The device may provide an instruction to allow the client device to proceed with the behavior or provide an instruction to disallow the client device from proceeding with the behavior based on determining whether the behavior is normal. The device may update the model based on the behavior information that identifies the first user and that identifies the behavior.
Abstract:
A device may receive behavior information that identifies a first user, of a first set of users, in association with a behavior. The behavior may relate to one or more requests, from a client device being used by the first user, to access a network resource. The device may determine, based on a model, whether the behavior is normal. The model may include a normal behavior pattern based on behavior information associated with the first set of users. The device may provide an instruction to allow the client device to proceed with the behavior or provide an instruction to disallow the client device from proceeding with the behavior based on determining whether the behavior is normal. The device may update the model based on the behavior information that identifies the first user and that identifies the behavior.
Abstract:
A device receives a request for a flight path for a UAV to travel from a first location to a second location, and determines capability information for the UAV based on component information of the UAV. The device calculates the flight path based on the capability information, and generates flight path instructions that include delivery confirmation instructions. The device provides the flight path instructions to the UAV to permit the UAV to travel from the first location to the second location to deliver a payload, and obtains, based on the delivery confirmation instructions, user credentials associated with a user at the second location. The device determines whether the user is an authorized recipient of the payload, based on the user credentials, and causes the UAV to selectively deliver the payload to the user based on whether the user is the authorized recipient of the payload.
Abstract:
An exemplary method includes a telematics computing system collecting telematics data from a telematics device associated with a vehicle, aggregating the telematics data collected over time from the telematics device associated with the vehicle, analyzing the aggregated telematics data to determine a set of discrete segments of driving behavior associated with the vehicle, classifying the set of discrete segments of the driving behavior associated with the vehicle based on the analyzing of the aggregated telematics data, and generating a representation of the driving behavior based on the classifying of the set of discrete segments of the driving behavior, the representation of the driving behavior including weighting factors assigned to the classified set of discrete segments of the driving behavior.
Abstract:
A device receives a request for a flight path from a first location to a second location in a region. The request includes component information associated with components of UAVs in a group. The device calculates a most efficient flight path from the first location to the second location based weather information, air traffic information, obstacle information, or regulatory information associated with the region, and determines capability information for the UAVs in the group based on the component information. The device selects, from the UAVs in the group, a particular UAV that is capable of traversing the most efficient flight path based on the capability information, and generates flight path instructions for the most efficient flight path. The device provides the flight path instructions to the particular UAV to permit the particular UAV to travel from the first location to the second location via the most efficient flight path.
Abstract:
A device receives user information associated with users of user devices, and receives vendor information associated with vendors. The device identifies a performance metric for the vendors based on a request received from a particular vendor of the vendors, and determines performance information for the vendors based on the identified performance metric, the user information, and the vendor information. The device anonymizes the performance information for the vendors to produce anonymous performance information, without anonymizing the performance information for the particular vendor. The device generates a user interface that visually depicts the anonymous performance information and the performance information for the particular vendor, and provides the user interface to a device associated with the particular vendor.
Abstract:
A device receives a request for a flight path of UAV from a first location to a second location in a region, and determines, based on credentials associated with the UAV, whether the UAV is authenticated for utilizing the device and a network. The device determines, when the UAV is authenticated, capability information for the UAV based on the request and component information associated with the UAV. The device calculates the flight path from the first location to the second location based on the capability information and one or more of weather information, air traffic information, obstacle information, or regulatory information associated with the region. The device generates flight path instructions for the flight path based on one or more of the weather information, the air traffic information, the obstacle information, or the regulatory information associated with the region, and provides the flight path instructions to the UAV.
Abstract:
A device receives a request for a flight path, for a UAV, from a first location to a second location, and calculates the flight path based on the request. The device determines network requirements for the flight path based on the request, and selects a network based on the network requirements. The device generates flight path instructions, and device provides the flight path instructions to the UAV to permit the UAV to travel from the first location to the second location via the flight path. The device receives, at a particular point of the flight path, an indication that the UAV is leaving a coverage area of the network and entering a coverage area of a third party network, and hands off the UAV to a third party device to permit the third party device to monitor traversal of the flight path by the UAV, via the third party network.
Abstract:
A method and device may estimate the accuracy of position data using kernel density estimator. The method may include receiving, from a plurality of user devices, network requests having embedded position data representing locations of the plurality of user devices. The method further includes extracting, from the network requests over a time period, the embedded position data of a user device associated with the plurality of user devices; and receiving baseline position data representing the locations of the user device over the time period. The method included generating a probability density estimate of the locations of the user device based on a kernel density estimator using the baseline position data, determining accuracy scores for the embedded position data using the probability density estimate of the locations, and filtering the embedded position data to remove outliers from the embedded position data.
Abstract:
A device receives information associated with machine-to-machine (M2M) devices connected to a host server device via a network. The information associated with the M2M devices include one or more of device information associated with components of the M2M devices, application information generated by the M2M devices, or network information associated with interactions of the M2M devices, with the network, when the M2M devices provide the application information to the host server device via the network. The device performs an analysis of the information associated with the M2M devices via one or more analytics techniques, and generates analysis information based on the analysis of the information associated with the M2M devices. The device provides the analysis information for display by the host server device.