0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (3)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Mathematical Methods in Counterterrorism (Paperback, 2009 ed.): Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben... Mathematical Methods in Counterterrorism (Paperback, 2009 ed.)
Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn
R4,519 Discovery Miles 45 190 Ships in 10 - 15 working days

Terrorism is one of the serious threats to international peace and security that we face in this decade. No nation can consider itself immune from the dangers it poses, and no society can remain disengaged from the efforts to combat it. The termcounterterrorism refers to the techniques, strategies, and tactics used in the ?ght against terrorism. Counterterrorism efforts involve many segments of so- ety, especially governmental agencies including the police, military, and intelligence agencies (both domestic and international). The goal of counterterrorism efforts is to not only detect and prevent potential future acts but also to assist in the response to events that have already occurred. A terrorist cell usually forms very quietly and then grows in a pattern - sp- ning international borders, oceans, and hemispheres. Surprising to many, an eff- tive "weapon", just as quiet - mathematics - can serve as a powerful tool to combat terrorism, providing the ability to connect the dots and reveal the organizational pattern of something so sinister. The events of 9/11 instantly changed perceptions of the wordsterrorist andn- work, especially in the United States. The international community was confronted with the need to tackle a threat which was not con?ned to a discreet physical - cation. This is a particular challenge to the standard instruments for projecting the legal authority of states and their power to uphold public safety. As demonstrated by the events of the 9/11 attack, we know that terrorist attacks can happen anywhere.

Mathematical Methods in Counterterrorism (Hardcover, 2009 ed.): Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben... Mathematical Methods in Counterterrorism (Hardcover, 2009 ed.)
Nasrullah Memon, Jonathan David Farley, David L. Hicks, Torben Rosenorn
R4,552 Discovery Miles 45 520 Ships in 10 - 15 working days

Terrorism is one of the serious threats to international peace and security that we face in this decade. No nation can consider itself immune from the dangers it poses, and no society can remain disengaged from the efforts to combat it. The termcounterterrorism refers to the techniques, strategies, and tactics used in the ?ght against terrorism. Counterterrorism efforts involve many segments of so- ety, especially governmental agencies including the police, military, and intelligence agencies (both domestic and international). The goal of counterterrorism efforts is to not only detect and prevent potential future acts but also to assist in the response to events that have already occurred. A terrorist cell usually forms very quietly and then grows in a pattern - sp- ning international borders, oceans, and hemispheres. Surprising to many, an eff- tive "weapon," just as quiet - mathematics - can serve as a powerful tool to combat terrorism, providing the ability to connect the dots and reveal the organizational pattern of something so sinister. The events of 9/11 instantly changed perceptions of the wordsterrorist andn- work, especially in the United States. The international community was confronted with the need to tackle a threat which was not con?ned to a discreet physical - cation. This is a particular challenge to the standard instruments for projecting the legal authority of states and their power to uphold public safety. As demonstrated by the events of the 9/11 attack, we know that terrorist attacks can happen anywhere.

Data Mining for Social Network Data (Paperback, 2010): Nasrullah Memon, Jennifer Jie Xu, David L. Hicks, Hsinchun Chen Data Mining for Social Network Data (Paperback, 2010)
Nasrullah Memon, Jennifer Jie Xu, David L. Hicks, Hsinchun Chen
R3,576 R2,097 Discovery Miles 20 970 Save R1,479 (41%) Ships in 9 - 15 working days

Driven by counter-terrorism efforts, marketing analysis and an explosion in online social networking in recent years, data mining has moved to the forefront of information science. This proposed Special Issue on Data Mining for Social Network Data will present a broad range of recent studies in social networking analysis. It will focus on emerging trends and needs in discovery and analysis of communities, solitary and social activities, activities in open for a and commercial sites as well. It will also look at network modeling, infrastructure construction, dynamic growth and evolution pattern discovery using machine learning approaches and multi-agent based simulations. Editors are three rising stars in world of data mining, knowledge discovery, social network analysis, and information infrastructures, and are anchored by Springer author/editor Hsinchun Chen (Terrorism Informatics; Medical Informatics; Digital Government), who is one of the most prominent intelligence analysis and data mining experts in the world.

From Sociology to Computing in Social Networks - Theory, Foundations and Applications (Hardcover, Edition.): Nasrullah Memon,... From Sociology to Computing in Social Networks - Theory, Foundations and Applications (Hardcover, Edition.)
Nasrullah Memon, Reda Alhajj
R4,567 Discovery Miles 45 670 Ships in 10 - 15 working days

Important aspects of social networking analysis are covered in this work by combining experimental and theoretical research. A specific focus is devoted to emerging trends and the industry needs associated with utilizing data mining techniques. Some of the techniques covered include data mining advances in the discovery and analysis of communities, in the personalization of solitary activities (like searches) and social activities (like discovering potential friends), in the analysis of user behavior in open fora (like conventional sites, blogs and fora) and in commercial platforms (like e-auctions), and in the associated security and privacy-preservation challenges; as well as social network modeling, scalable, customizable social network infrastructure construction, and the identification and discovery of dynamic growth and evolution patterns using machine learning approaches or multi-agent based simulation. These topics will be of interest to practitioners and researchers alike in this dynamic and growing field.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Snappy Tritan Bottle (1.2L)(Coral)
R209 R169 Discovery Miles 1 690
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Shield Sheen Interior Wipes (Pack of 20…
R47 Discovery Miles 470
Cadac 40cm Paella Pan
R1,199 R649 Discovery Miles 6 490
Efekto Karbadust Insecticide Dusting…
R54 Discovery Miles 540
Peptine Pro Canine/Feline Hydrolysed…
R359 R279 Discovery Miles 2 790
Elastoplus Elastic Adhesive Bandage…
R65 Discovery Miles 650
The Lion King - Blu-Ray + DVD
Blu-ray disc R344 Discovery Miles 3 440
Bostik Super Clear Tape on Dispenser…
R44 Discovery Miles 440
Lucky Lubricating Clipper Oil (100ml)
R49 R29 Discovery Miles 290

 

Partners