0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (634)
  • R250 - R500 (2,258)
  • R500+ (12,918)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet

Signals in the Soil - Developments in Internet of Underground Things (Hardcover, 1st ed. 2020): Abdul Salam, Usman Raza Signals in the Soil - Developments in Internet of Underground Things (Hardcover, 1st ed. 2020)
Abdul Salam, Usman Raza
R4,424 Discovery Miles 44 240 Ships in 10 - 15 working days

This book provides an in-depth coverage of the most recent developments in the field of wireless underground communications, from both theoretical and practical perspectives. The authors identify technical challenges and discuss recent results related to improvements in wireless underground communications and soil sensing in Internet of Underground Things (IOUT). The book covers both existing network technologies and those currently in development in three major areas of SitS: wireless underground communications, subsurface sensing, and antennas in the soil medium. The authors explore novel applications of Internet of Underground Things in digital agriculture and autonomous irrigation management domains. The book is relevant to wireless researchers, academics, students, and decision agriculture professionals. The contents of the book are arranged in a comprehensive and easily accessible format. Focuses on fundamental issues of wireless underground communication and subsurface sensing; Includes advanced treatment of IOUT custom applications of variable-rate technologies in the field of decision agriculture, and covers protocol design and wireless underground channel modeling; Provides a detailed set of path loss, antenna, and wireless underground channel measurements in various novel Signals in the Soil (SitS) testbed settings.

2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing - BDCC 2019 (Hardcover, 1st ed.... 2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing - BDCC 2019 (Hardcover, 1st ed. 2021)
Anandakumar Haldorai, Arulmurugan Ramu, Sudha Mohanram, Mu-Yen Chen
R5,672 Discovery Miles 56 720 Ships in 10 - 15 working days

This proceeding features papers discussing big data innovation for sustainable cognitive computing. The papers feature details on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference focuses on cognitive computing technologies, from knowledge representation techniques and natural language processing algorithms to dynamic learning approaches. Topics covered include Data Science for Cognitive Analysis, Real-Time Ubiquitous Data Science, Platform for Privacy Preserving Data Science, and Internet-Based Cognitive Platform. The 2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2019) took place in Coimbatore, India on December 12-13, 2019. Contains proceedings from 2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2019), Coimbatore, India, December 12-13, 2019; Features topics ranging from Data Science for Cognitive Analysis to Internet-Based Cognitive Platforms; Includes contributions from researchers, academics, and professionals from around the world.

When Compressive Sensing Meets Mobile Crowdsensing (Hardcover, 1st ed. 2019): Linghe Kong, Bowen Wang, Guihai Chen When Compressive Sensing Meets Mobile Crowdsensing (Hardcover, 1st ed. 2019)
Linghe Kong, Bowen Wang, Guihai Chen
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

This book provides a comprehensive introduction to applying compressive sensing to improve data quality in the context of mobile crowdsensing. It addresses the following main topics: recovering missing data, efficiently collecting data, preserving user privacy, and detecting false data. Mobile crowdsensing, as an emerging sensing paradigm, enables the masses to take part in data collection tasks with the aid of powerful mobile devices. However, mobile crowdsensing platforms have yet to be widely adopted in practice, the major concern being the quality of the data collected. There are numerous causes: some locations may generate redundant data, while others may not be covered at all, since the participants are rarely systematically coordinated; privacy is a concern for some people, who don't wish to share their real-time locations, and therefore some key information may be missing; further, some participants may upload fake data in order to fraudulently gain rewards. To address these problematic aspects, compressive sensing, which works by accurately recovering a sparse signal using very few samples, has proven to offer an effective solution.

How to Podcast - Your Step By Step Guide to Podcasting (Hardcover): Howexpert How to Podcast - Your Step By Step Guide to Podcasting (Hardcover)
Howexpert
R783 Discovery Miles 7 830 Ships in 10 - 15 working days
Contesting Media Power - Alternative Media in a Networked World (Paperback, New): Nick Couldry, James Curran Contesting Media Power - Alternative Media in a Networked World (Paperback, New)
Nick Couldry, James Curran; Contributions by Chris Atton, Lance Bennett, Rodney Benson, …
R1,547 Discovery Miles 15 470 Ships in 12 - 19 working days

Contesting Media Power is the most ambitious international collection to date on the worldwide growth of alternative media that are challenging the power concentration in large media corporations. Media scholars and political scientists develop a broad comparative framework for analyzing alternative media in Australia, Chile, China, Indonesia, Malaysia, Russia, Sweden, South Africa, the United Kingdom, and the United States. Topics include independent media centers, gay online networks and alternative web discussion forums, feminist film, political journalism and social networks, indigenous communication, and church-sponsored media. This important book will help shape debates on the media's role in current global struggles, such as the anti-globalization movement.

Emerging Pedagogies in the Networked Knowledge Society - Practices Integrating Social Media and Globalization (Hardcover):... Emerging Pedagogies in the Networked Knowledge Society - Practices Integrating Social Media and Globalization (Hardcover)
Marohang Limbu, Binod Gurung
R4,839 Discovery Miles 48 390 Ships in 10 - 15 working days

Since the dawn of the digital era, the transfer of knowledge has shifted from analog to digital, local to global, and individual to social. Complex networked communities are a fundamental part of these new information-based societies. Emerging Pedagogies in the Networked Knowledge Society: Practices Integrating Social Media and Globalization examines the production, dissemination, and consumption of knowledge within networked communities in the wider global context of pervasive Web 2.0 and social media services. This book will offer insight for business stakeholders, researchers, scholars, and administrators by highlighting the important concepts and ideas of information- and knowledge-based economies.

Smart Cards, Tokens, Security and Applications (Hardcover, 2nd ed. 2017): Keith Mayes, Konstantinos Markantonakis Smart Cards, Tokens, Security and Applications (Hardcover, 2nd ed. 2017)
Keith Mayes, Konstantinos Markantonakis
R3,029 Discovery Miles 30 290 Ships in 12 - 19 working days

This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.

Data Analytics in Digital Humanities (Hardcover, 1st ed. 2017): Shalin Hai-Jew Data Analytics in Digital Humanities (Hardcover, 1st ed. 2017)
Shalin Hai-Jew
R5,009 Discovery Miles 50 090 Ships in 12 - 19 working days

This book covers computationally innovative methods and technologies including data collection and elicitation, data processing, data analysis, data visualizations, and data presentation. It explores how digital humanists have harnessed the hypersociality and social technologies, benefited from the open-source sharing not only of data but of code, and made technological capabilities a critical part of humanities work. Chapters are written by researchers from around the world, bringing perspectives from diverse fields and subject areas. The respective authors describe their work, their research, and their learning. Topics include semantic web for cultural heritage valorization, machine learning for parody detection by classification, psychological text analysis, crowdsourcing imagery coding in natural disasters, and creating inheritable digital codebooks.Designed for researchers and academics, this book is suitable for those interested in methodologies and analytics that can be applied in literature, history, philosophy, linguistics, and related disciplines. Professionals such as librarians, archivists, and historians will also find the content informative and instructive.

Cryptocurrency - 50 Expert Secrets for Beginners You Need to Know When It Comes to Investing in Bitcoing, Ethereum AND... Cryptocurrency - 50 Expert Secrets for Beginners You Need to Know When It Comes to Investing in Bitcoing, Ethereum AND LIitecoin (Hardcover)
Jared Snyder
R604 R542 Discovery Miles 5 420 Save R62 (10%) Ships in 10 - 15 working days
Emerging Technologies of Augmented Reality - Interfaces and Design (Hardcover): Michael Haller, Mark Billinghurst, Bruce Thomas Emerging Technologies of Augmented Reality - Interfaces and Design (Hardcover)
Michael Haller, Mark Billinghurst, Bruce Thomas
R2,868 Discovery Miles 28 680 Ships in 10 - 15 working days

Although the field of mixed reality has grown significantly over the last decade, there have been few published books about augmented reality, particularly the interface design aspects. ""Emerging Technologies of Augmented Reality: Interfaces and Design"" provides a foundation of the main concepts of augmented reality (AR), with a particular emphasis on user interfaces, design, and practical AR techniques, from tracking algorithms to design principles for AR interfaces. ""Emerging Technologies of Augmented Reality: Interfaces and Design"" contains comprehensive information focusing on the following topics: technologies that support AR, development environments, interface design and evaluation of applications, and case studies of AR applications.

Solutions for Cyber-Physical Systems Ubiquity (Hardcover): Norbert Druml, Andreas Genser, Armin Krieg, Manuel Menghin, Andrea... Solutions for Cyber-Physical Systems Ubiquity (Hardcover)
Norbert Druml, Andreas Genser, Armin Krieg, Manuel Menghin, Andrea Hoeller
R6,208 Discovery Miles 62 080 Ships in 10 - 15 working days

Cyber-physical systems play a crucial role in connecting aspects of online life to physical life. By studying emerging trends in these systems, programming techniques can be optimized and strengthened to create a higher level of effectiveness. Solutions for Cyber-Physical Systems Ubiquity is a critical reference source that discusses the issues and challenges facing the implementation, usage, and challenges of cyber-physical systems. Highlighting relevant topics such as the Internet of Things, smart-card security, multi-core environments, and wireless sensor nodes, this scholarly publication is ideal for engineers, academicians, computer science students, and researchers that would like to stay abreast of current methodologies and trends involving cyber-physical system progression. Topics Covered The many academic areas covered in this publication include, but are not limited to: Automotive Domain Internet of Things Multi-Core Environments Safety Concerns Security strategies Smart Card Security System Verification Wireless Sensor Nodes

Web Design and Development - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover): Irma Web Design and Development - Concepts, Methodologies, Tools, and Applications, VOL 3 (Hardcover)
Irma
R23,522 Discovery Miles 235 220 Ships in 10 - 15 working days
Social Manufacturing: Fundamentals and Applications (Hardcover, 1st ed. 2019): Pingyu Jiang Social Manufacturing: Fundamentals and Applications (Hardcover, 1st ed. 2019)
Pingyu Jiang
R2,911 Discovery Miles 29 110 Ships in 10 - 15 working days

This book introduces social manufacturing, the next generation manufacturing paradigm that covers product life cycle activities that deal with Internet-based organizational and interactive mechanisms under the context of socio-technical systems in the fields of industrial and production engineering. Like its subject, the book's approach is multi-disciplinary, including manufacturing systems, operations management, computational social sciences and information systems applications. It reports on the latest research findings regarding the social manufacturing paradigm, the architecture, configuration and execution of social manufacturing systems and more. Further, it describes the individual technologies enabled by social manufacturing for each topic, supported by case studies. The technologies discussed include manufacturing resource minimalization and their socialized reorganizations, blockchain models in cybersecurity, computing and decision-making, social business relationships and organizational networks, open product design, social sensors and extended cyber-physical systems, and social factory and inter-connections. This book helps engineers and managers in industry to practice social manufacturing, as well as offering a systematic reference resource for researchers in manufacturing. Students also benefit from the detailed discussions of the latest research and technologies that will have been put into practice by the time they graduate.

Artificial Intelligence Applications and Innovations - 17th IFIP WG 12.5 International Conference, AIAI 2021, Hersonissos,... Artificial Intelligence Applications and Innovations - 17th IFIP WG 12.5 International Conference, AIAI 2021, Hersonissos, Crete, Greece, June 25-27, 2021, Proceedings (Hardcover, 1st ed. 2021)
Ilias Maglogiannis, John MacIntyre, Lazaros Iliadis
R5,273 Discovery Miles 52 730 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 17th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2021, held virtually and in Hersonissos, Crete, Greece, in June 2021. The 50 full papers and 11 short papers presented were carefully reviewed and selected from 113 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections: adaptive modeling/ neuroscience; AI in biomedical applications; AI impacts/ big data; automated machine learning; autonomous agents; clustering; convolutional NN; data mining/ word counts; deep learning; fuzzy modeling; hyperdimensional computing; Internet of Things/ Internet of energy; machine learning; multi-agent systems; natural language; recommendation systems; sentiment analysis; and smart blockchain applications/ cybersecurity. Chapter "Improving the Flexibility of Production Scheduling in Flat Steel Production Through Standard and AI-based Approaches: Challenges and Perspective" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Connected Vehicles in the Internet of Things - Concepts, Technologies and Frameworks for the IoV (Hardcover, 1st ed. 2020):... Connected Vehicles in the Internet of Things - Concepts, Technologies and Frameworks for the IoV (Hardcover, 1st ed. 2020)
Zaigham Mahmood
R4,252 Discovery Miles 42 520 Ships in 12 - 19 working days

This book presents an overview of the latest smart transportation systems, IoV connectivity frameworks, issues of security and safety in VANETs, future developments in the IoV, technical solutions to address key challenges, and other related topics. A connected vehicle is a vehicle equipped with Internet access and wireless LAN, which allows the sharing of data through various devices, inside as well as outside the vehicle. The ad-hoc network of such vehicles, often referred to as VANET or the Internet of vehicles (IoV), is an application of IoT technology, and may be regarded as an integration of three types of networks: inter-vehicle, intra-vehicle, and vehicular mobile networks. VANET involves several varieties of vehicle connectivity mechanisms, including vehicle-to-infrastructure (V2I), vehicle-to-vehicle (V2V), vehicle-to-cloud (V2C), and vehicle-to-everything (V2X). According to one survey, it is expected that there will be approximately 380 million connected cars on the roads by 2020. IoV is an important aspect of the new vision for smart transportation. The book is divided into three parts: examining the evolution of IoV (basic concepts, principles, technologies, and architectures), connectivity of vehicles in the IoT (protocols, frameworks, and methodologies), connected vehicle environments and advanced topics in VANETs (security and safety issues, autonomous operations, machine learning, sensor technology, and AI). By providing scientific contributions and workable suggestions from researchers and practitioners in the areas of IoT, IoV, and security, this valuable reference aims to extend the body of existing knowledge.

Green Internet of Things (IoT): Energy Efficiency Perspective (Hardcover, 1st ed. 2021): Zhenyu Zhou, Zheng Chang, Haijun Liao Green Internet of Things (IoT): Energy Efficiency Perspective (Hardcover, 1st ed. 2021)
Zhenyu Zhou, Zheng Chang, Haijun Liao
R4,352 Discovery Miles 43 520 Ships in 10 - 15 working days

Energy efficiency issues for green internet of things (IoT) are investigated in this book, from the perspectives of device-to-device (D2D) communications, machine-to-machine (M2M) communications, and air-ground networks. Specifically, critical green IoT techniques from D2D communications in the cellular network to M2M communications in industrial IoT (IIoT), (from single physical-layer optimization to cross-layer optimization, and from single-layer ground networks to stereoscopic air-ground networks) are discussed in both theoretical problem formulation and simulation result analysis in this book. Internet of Things (IoT) offers a platform that enables sensors and devices to connect seamlessly in an intelligent environment, thus providing intelligence services including monitoring systems, industrial automation, and ultimately smart cities. However, the huge potentials of IoT are constrained by high energy consumption, limited battery capacity, and the slow progress of battery technology. The high energy consumption of IoT device causes communication interruption, information loss, and short network lifetime. Moreover, once deployed, the batteries inside IoT devices cannot be replaced in time. Therefore, energy efficient resource allocation is urgent to be investigated to improve the energy efficiency of IoT, facilitate green IoT, and extend the network lifetime. This book provides readers with a comprehensive overview of the state-of-the-art key technologies, frameworks, related optimization algorithms, and corresponding integrated designs on green IoT. It also presents an easy-to-understand style in a professional manner, making the book suitable for a wider range of readers from students to professionals interested in the green IoT.

Advances in Electronic Business (Hardcover, New): Advances in Electronic Business (Hardcover, New)
R2,447 Discovery Miles 24 470 Ships in 10 - 15 working days

Advances in Electronic Business, Volume 1 advances the understanding of management methods, information technology, and their joint application in business processes. The applications of electronic commerce draw great attention of the practitioners in applying digital technologies to the buy-and-sell activities. This first volume addresses the importance of management and technology issues in electronic business, including collaborative design, collaborative engineering, collaborative decision making, electronic collaboration, communication and cooperation, workflow collaboration, knowledge networking, collaborative e-learning, costs and benefits analysis of collaboration, collaborative transportation, and ethics.

Online Harassment (Hardcover, 1st ed. 2018): Jennifer Golbeck Online Harassment (Hardcover, 1st ed. 2018)
Jennifer Golbeck
R4,058 R3,488 Discovery Miles 34 880 Save R570 (14%) Ships in 12 - 19 working days

Online Harassment is one of the most serious problems in social media. To address it requires understanding the forms harassment takes, how it impacts the targets, who harasses, and how technology that stands between users and social media can stop harassers and protect users. The field of Human-Computer Interaction provides a unique set of tools to address this challenge. This book brings together experts in theory, socio-technical systems, network analysis, text analysis, and machine learning to present a broad set of analyses and applications that improve our understanding of the harassment problem and how to address it. This book tackles the problem of harassment by addressing it in three major domains. First, chapters explore how harassment manifests, including extensive analysis of the Gamer Gate incident, stylistic features of different types of harassment, how gender differences affect misogynistic harassment. Then, we look at the results of harassment, including how it drives people offline and the impacts it has on targets. Finally, we address techniques for mitigating harassment, both through automated detection and filtering and interface options that users control. Together, many branches of HCI come together to provide a comprehensive look at the phenomenon of online harassment and to advance the field toward effective human-oriented solutions.

Distance Education and Distributed Learning (Hardcover, New): Charalambos Vrasidas, Gene V. Glass Distance Education and Distributed Learning (Hardcover, New)
Charalambos Vrasidas, Gene V. Glass
R2,781 Discovery Miles 27 810 Ships in 10 - 15 working days

This work discusses issues relating to distance education and distributed learning. There are essays covering: rethinking assessment for the online environment; the role of collaborative learning in social and intellectual development; and the embodiment of knowledge in virtual environments.

Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018): Sikhar Patranabis, Debdeep... Fault Tolerant Architectures for Cryptography and Hardware Security (Hardcover, 1st ed. 2018)
Sikhar Patranabis, Debdeep Mukhopadhyay
R4,121 Discovery Miles 41 210 Ships in 10 - 15 working days

This book uses motivating examples and real-life attack scenarios to introduce readers to the general concept of fault attacks in cryptography. It offers insights into how the fault tolerance theories developed in the book can actually be implemented, with a particular focus on a wide spectrum of fault models and practical fault injection techniques, ranging from simple, low-cost techniques to high-end equipment-based methods. It then individually examines fault attack vulnerabilities in symmetric, asymmetric and authenticated encryption systems. This is followed by extensive coverage of countermeasure techniques and fault tolerant architectures that attempt to thwart such vulnerabilities. Lastly, it presents a case study of a comprehensive FPGA-based fault tolerant architecture for AES-128, which brings together of a number of the fault tolerance techniques presented. It concludes with a discussion on how fault tolerance can be combined with side channel security to achieve protection against implementation-based attacks. The text is supported by illustrative diagrams, algorithms, tables and diagrams presenting real-world experimental results.

Joomla! Bible, Second Edition (Paperback, 2nd Edition): R Shreves Joomla! Bible, Second Edition (Paperback, 2nd Edition)
R Shreves
R1,192 R1,026 Discovery Miles 10 260 Save R166 (14%) Ships in 10 - 15 working days

Your complete guide to the Joomla content management system

Whether you use Joomla to power a website, intranet, or blog, you'll need a good how-to reference on this complex, but not always intuitive, content management software. "Joomla Bible, Second Edition" is that book. It not only brings you up to speed on the changes and extensions that are now part of Joomla 3.0, it thoroughly covers functions and tasks, including installation, configuration, management, advanced modules, and extended coverage of two key extensions.

You'll learn how to obtain code and deploy it to a server; how to obtain, modify, and delete content; how to choose between the Joomla Platform and the Joomla CMS; and more. By the time you finish the "Joomla Bible, Second Edition," you'll be well prepared to build and maintain a Joomla -based website.Walks you through obtaining the Joomla 3.0 code and how to deploy it to a server, configure the site, create content, and manage content and user hierarchiesHelps you get the most out of core modules that provide advanced functionality, including the Polls Module, the Banner Manager, Content Syndication, Newsfeed Aggregation, and othersIncludes hands-on tutorials and real-world practical applications

Whether you're a content manager, website manager, developer, or do-it-yourselfer, make sure you keep "Joomla Bible, Second Edition" on hand.

How to Profit from Bitcoin 2022 - The Best Bitcoin Guide for Beginners (Hardcover): Faba's Diaries How to Profit from Bitcoin 2022 - The Best Bitcoin Guide for Beginners (Hardcover)
Faba's Diaries
R935 R807 Discovery Miles 8 070 Save R128 (14%) Ships in 10 - 15 working days
Connectivity and Edge Computing in IoT: Customized Designs and AI-based Solutions (Hardcover, 1st ed. 2021): Jie Gao, Mushu Li,... Connectivity and Edge Computing in IoT: Customized Designs and AI-based Solutions (Hardcover, 1st ed. 2021)
Jie Gao, Mushu Li, Weihua Zhuang
R3,610 Discovery Miles 36 100 Ships in 10 - 15 working days

This book covers connectivity and edge computing solutions for representative Internet of Things (IoT) use cases, including industrial IoT, rural IoT, Internet of Vehicles (IoV), and mobile virtual reality (VR). Based on their unique characteristics and requirements, customized solutions are designed with targets such as supporting massive connections or seamless mobility and achieving low latency or high energy efficiency. Meanwhile, the book highlights the role of artificial intelligence (AI) in future IoT networks and showcases AI-based connectivity and edge computing solutions. The solutions presented in this book serve the overall purpose of facilitating an increasingly connected and intelligent world. The potential benefits of the solutions include increased productivity in factories, improved connectivity in rural areas, enhanced safety for vehicles, and enriched entertainment experiences for mobile users. Featuring state-of-the-art research in the IoT field, this book can help answer the question of how to connect billions of diverse devices and enable seamless data collection and processing in future IoT. The content also provides insights regarding the significance of customizing use case-specific solutions as well as approaches of using various AI methods to empower IoT. This book targets researchers and graduate students working in the areas of electrical engineering, computing engineering, and computer science as a secondary textbook or reference. Professionals in industry who work in the field of IoT will also find this book useful.

Malicious Attack Propagation and Source Identification (Hardcover, 1st ed. 2019): Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu,... Malicious Attack Propagation and Source Identification (Hardcover, 1st ed. 2019)
Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, …
R3,615 Discovery Miles 36 150 Ships in 10 - 15 working days

This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.

Social Media Listening and Monitoring for Business Applications (Hardcover): N. Raghavendra Rao Social Media Listening and Monitoring for Business Applications (Hardcover)
N. Raghavendra Rao
R5,686 Discovery Miles 56 860 Ships in 10 - 15 working days

Social Media has transformed the ways in which individuals keep in touch with family and friends. Likewise, businesses have identified the profound opportunities present for customer engagement and understanding through the massive data available on social media channels, in addition to the customer reach of such sites. Social Media Listening and Monitoring for Business Applications explores research-based solutions for businesses of all types interested in an understanding of emerging concepts and technologies for engaging customers online. Providing insight into the currently available social media tools and practices for various business applications, this publication is an essential resource for business professionals, graduate-level students, technology developers, and researchers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Natural Disaster and Reconstruction in…
Kinnia Yau Shuk-Ting Hardcover R3,486 Discovery Miles 34 860
Financial Econometrics Modeling…
G. Gregoriou, R. Pascalau Hardcover R1,515 Discovery Miles 15 150
Tools and Techniques for Economic…
Jelena Stankovi, Pavlos Delias, … Hardcover R5,603 Discovery Miles 56 030
Operations and Supply Chain Management
James Evans, David Collier Hardcover R1,456 R1,352 Discovery Miles 13 520
Problems, Methods and Tools in…
Kesra Nermend, Malgorzata Latuszynska Hardcover R4,395 Discovery Miles 43 950
Fuzzy Decision-Making Methods Based on…
Xiaoli Tian, Zeshui Xu Hardcover R3,611 Discovery Miles 36 110
United States Foreign Trade Highlights…
Susan Ockert Paperback R2,665 Discovery Miles 26 650
Success on Our Own Terms - Tales of…
V. O'Brien Hardcover R1,154 R974 Discovery Miles 9 740
Econometrics as a Con Art - Exposing the…
Imad A Moosa Hardcover R3,490 Discovery Miles 34 900
Essential Mathematics for Economics and…
T. Bradley Paperback R1,752 Discovery Miles 17 520

 

Partners