0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Mathematical Methods in Counterterrorism (Hardcover, 2009 ed.): Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben... Mathematical Methods in Counterterrorism (Hardcover, 2009 ed.)
Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn
R4,281 Discovery Miles 42 810 Ships in 12 - 17 working days

Terrorism is one of the serious threats to international peace and security that we face in this decade. No nation can consider itself immune from the dangers it poses, and no society can remain disengaged from the efforts to combat it. The termcounterterrorism refers to the techniques, strategies, and tactics used in the ?ght against terrorism. Counterterrorism efforts involve many segments of so- ety, especially governmental agencies including the police, military, and intelligence agencies (both domestic and international). The goal of counterterrorism efforts is to not only detect and prevent potential future acts but also to assist in the response to events that have already occurred. A terrorist cell usually forms very quietly and then grows in a pattern - sp- ning international borders, oceans, and hemispheres. Surprising to many, an eff- tive "weapon," just as quiet - mathematics - can serve as a powerful tool to combat terrorism, providing the ability to connect the dots and reveal the organizational pattern of something so sinister. The events of 9/11 instantly changed perceptions of the wordsterrorist andn- work, especially in the United States. The international community was confronted with the need to tackle a threat which was not con?ned to a discreet physical - cation. This is a particular challenge to the standard instruments for projecting the legal authority of states and their power to uphold public safety. As demonstrated by the events of the 9/11 attack, we know that terrorist attacks can happen anywhere.

From Sociology to Computing in Social Networks - Theory, Foundations and Applications (Hardcover, Edition.): Nasrullah Memon,... From Sociology to Computing in Social Networks - Theory, Foundations and Applications (Hardcover, Edition.)
Nasrullah Memon, Reda Alhajj
R4,804 R4,287 Discovery Miles 42 870 Save R517 (11%) Ships in 12 - 17 working days

Important aspects of social networking analysis are covered in this work by combining experimental and theoretical research. A specific focus is devoted to emerging trends and the industry needs associated with utilizing data mining techniques. Some of the techniques covered include data mining advances in the discovery and analysis of communities, in the personalization of solitary activities (like searches) and social activities (like discovering potential friends), in the analysis of user behavior in open fora (like conventional sites, blogs and fora) and in commercial platforms (like e-auctions), and in the associated security and privacy-preservation challenges; as well as social network modeling, scalable, customizable social network infrastructure construction, and the identification and discovery of dynamic growth and evolution patterns using machine learning approaches or multi-agent based simulation. These topics will be of interest to practitioners and researchers alike in this dynamic and growing field.

Mathematical Methods in Counterterrorism (Paperback, 2009 ed.): Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben... Mathematical Methods in Counterterrorism (Paperback, 2009 ed.)
Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn
R4,260 Discovery Miles 42 600 Ships in 10 - 15 working days

Terrorism is one of the serious threats to international peace and security that we face in this decade. No nation can consider itself immune from the dangers it poses, and no society can remain disengaged from the efforts to combat it. The termcounterterrorism refers to the techniques, strategies, and tactics used in the ?ght against terrorism. Counterterrorism efforts involve many segments of so- ety, especially governmental agencies including the police, military, and intelligence agencies (both domestic and international). The goal of counterterrorism efforts is to not only detect and prevent potential future acts but also to assist in the response to events that have already occurred. A terrorist cell usually forms very quietly and then grows in a pattern - sp- ning international borders, oceans, and hemispheres. Surprising to many, an eff- tive "weapon", just as quiet - mathematics - can serve as a powerful tool to combat terrorism, providing the ability to connect the dots and reveal the organizational pattern of something so sinister. The events of 9/11 instantly changed perceptions of the wordsterrorist andn- work, especially in the United States. The international community was confronted with the need to tackle a threat which was not con?ned to a discreet physical - cation. This is a particular challenge to the standard instruments for projecting the legal authority of states and their power to uphold public safety. As demonstrated by the events of the 9/11 attack, we know that terrorist attacks can happen anywhere.

Data Mining for Social Network Data (Paperback, 2010): Nasrullah Memon, Jennifer Jie Xu, David L. Hicks, Hsinchun Chen Data Mining for Social Network Data (Paperback, 2010)
Nasrullah Memon, Jennifer Jie Xu, David L. Hicks, Hsinchun Chen
R3,436 R2,017 Discovery Miles 20 170 Save R1,419 (41%) Ships in 9 - 15 working days

Driven by counter-terrorism efforts, marketing analysis and an explosion in online social networking in recent years, data mining has moved to the forefront of information science. This proposed Special Issue on Data Mining for Social Network Data will present a broad range of recent studies in social networking analysis. It will focus on emerging trends and needs in discovery and analysis of communities, solitary and social activities, activities in open for a and commercial sites as well. It will also look at network modeling, infrastructure construction, dynamic growth and evolution pattern discovery using machine learning approaches and multi-agent based simulations. Editors are three rising stars in world of data mining, knowledge discovery, social network analysis, and information infrastructures, and are anchored by Springer author/editor Hsinchun Chen (Terrorism Informatics; Medical Informatics; Digital Government), who is one of the most prominent intelligence analysis and data mining experts in the world.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Christian Dior Dior Homme Sport Eau De…
R3,065 Discovery Miles 30 650
JCB S.W.A.T Soft Toe Tactical Boot…
R1,899 Discovery Miles 18 990
Astrum MU100 USB Optical Mouse (Black)
R79 Discovery Miles 790
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Sluggem Pellets (500g)
R234 Discovery Miles 2 340
Cable Guys Controller and Smartphone…
R399 R359 Discovery Miles 3 590
Tenet
John David Washington, Robert Pattinson, … DVD  (1)
R51 Discovery Miles 510
Magnetic Fidget Pen (Black)
R373 R341 Discovery Miles 3 410
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840

 

Partners