0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Mathematical Methods in Counterterrorism (Hardcover, 2009 ed.): Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben... Mathematical Methods in Counterterrorism (Hardcover, 2009 ed.)
Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn
R4,410 Discovery Miles 44 100 Ships in 10 - 15 working days

Terrorism is one of the serious threats to international peace and security that we face in this decade. No nation can consider itself immune from the dangers it poses, and no society can remain disengaged from the efforts to combat it. The termcounterterrorism refers to the techniques, strategies, and tactics used in the ?ght against terrorism. Counterterrorism efforts involve many segments of so- ety, especially governmental agencies including the police, military, and intelligence agencies (both domestic and international). The goal of counterterrorism efforts is to not only detect and prevent potential future acts but also to assist in the response to events that have already occurred. A terrorist cell usually forms very quietly and then grows in a pattern - sp- ning international borders, oceans, and hemispheres. Surprising to many, an eff- tive "weapon," just as quiet - mathematics - can serve as a powerful tool to combat terrorism, providing the ability to connect the dots and reveal the organizational pattern of something so sinister. The events of 9/11 instantly changed perceptions of the wordsterrorist andn- work, especially in the United States. The international community was confronted with the need to tackle a threat which was not con?ned to a discreet physical - cation. This is a particular challenge to the standard instruments for projecting the legal authority of states and their power to uphold public safety. As demonstrated by the events of the 9/11 attack, we know that terrorist attacks can happen anywhere.

From Sociology to Computing in Social Networks - Theory, Foundations and Applications (Hardcover, Edition.): Nasrullah Memon,... From Sociology to Computing in Social Networks - Theory, Foundations and Applications (Hardcover, Edition.)
Nasrullah Memon, Reda Alhajj
R4,424 Discovery Miles 44 240 Ships in 10 - 15 working days

Important aspects of social networking analysis are covered in this work by combining experimental and theoretical research. A specific focus is devoted to emerging trends and the industry needs associated with utilizing data mining techniques. Some of the techniques covered include data mining advances in the discovery and analysis of communities, in the personalization of solitary activities (like searches) and social activities (like discovering potential friends), in the analysis of user behavior in open fora (like conventional sites, blogs and fora) and in commercial platforms (like e-auctions), and in the associated security and privacy-preservation challenges; as well as social network modeling, scalable, customizable social network infrastructure construction, and the identification and discovery of dynamic growth and evolution patterns using machine learning approaches or multi-agent based simulation. These topics will be of interest to practitioners and researchers alike in this dynamic and growing field.

Mathematical Methods in Counterterrorism (Paperback, 2009 ed.): Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben... Mathematical Methods in Counterterrorism (Paperback, 2009 ed.)
Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn
R4,380 Discovery Miles 43 800 Ships in 10 - 15 working days

Terrorism is one of the serious threats to international peace and security that we face in this decade. No nation can consider itself immune from the dangers it poses, and no society can remain disengaged from the efforts to combat it. The termcounterterrorism refers to the techniques, strategies, and tactics used in the ?ght against terrorism. Counterterrorism efforts involve many segments of so- ety, especially governmental agencies including the police, military, and intelligence agencies (both domestic and international). The goal of counterterrorism efforts is to not only detect and prevent potential future acts but also to assist in the response to events that have already occurred. A terrorist cell usually forms very quietly and then grows in a pattern - sp- ning international borders, oceans, and hemispheres. Surprising to many, an eff- tive "weapon", just as quiet - mathematics - can serve as a powerful tool to combat terrorism, providing the ability to connect the dots and reveal the organizational pattern of something so sinister. The events of 9/11 instantly changed perceptions of the wordsterrorist andn- work, especially in the United States. The international community was confronted with the need to tackle a threat which was not con?ned to a discreet physical - cation. This is a particular challenge to the standard instruments for projecting the legal authority of states and their power to uphold public safety. As demonstrated by the events of the 9/11 attack, we know that terrorist attacks can happen anywhere.

Data Mining for Social Network Data (Paperback, 2010): Nasrullah Memon, Jennifer Jie Xu, David L. Hicks, Hsinchun Chen Data Mining for Social Network Data (Paperback, 2010)
Nasrullah Memon, Jennifer Jie Xu, David L. Hicks, Hsinchun Chen
R2,926 Discovery Miles 29 260 Ships in 10 - 15 working days

Driven by counter-terrorism efforts, marketing analysis and an explosion in online social networking in recent years, data mining has moved to the forefront of information science. This proposed Special Issue on Data Mining for Social Network Data will present a broad range of recent studies in social networking analysis. It will focus on emerging trends and needs in discovery and analysis of communities, solitary and social activities, activities in open for a and commercial sites as well. It will also look at network modeling, infrastructure construction, dynamic growth and evolution pattern discovery using machine learning approaches and multi-agent based simulations. Editors are three rising stars in world of data mining, knowledge discovery, social network analysis, and information infrastructures, and are anchored by Springer author/editor Hsinchun Chen (Terrorism Informatics; Medical Informatics; Digital Government), who is one of the most prominent intelligence analysis and data mining experts in the world.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Essentials of Habermas
Xunwu Chen Hardcover R3,382 Discovery Miles 33 820
Expressive Digital Painting in Procreate…
Shirish Deshpande Paperback R1,183 Discovery Miles 11 830
Pragmatism and the Philosophy of Sport
John Kaag, Douglas Anderson, … Hardcover R3,667 R2,581 Discovery Miles 25 810
Austin's Rubaiyat of Rhymes and Reasons
Austin Torney Hardcover R1,258 Discovery Miles 12 580
Advances in System Dynamics and Control
Ahmad Taher Azar, Sundarapandian Vaidyanathan Hardcover R6,366 Discovery Miles 63 660
The Art of Hand Analysis
Mir Bashir Paperback R318 Discovery Miles 3 180
Basics of Software Engineering…
Natalia Juristo, Ana M. Moreno Hardcover R5,822 Discovery Miles 58 220
Heliocentric Astrology or Essentials of…
Holmes Whittier Merton Hardcover R750 Discovery Miles 7 500
Plans of the Righteous Availeth Much…
Cynthia L Robinson Hardcover R1,230 Discovery Miles 12 300
3D QSAR in Drug Design - Recent Advances
Hugo Kubinyi, Gerd Folkers, … Hardcover R5,641 Discovery Miles 56 410

 

Partners