Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 4 of 4 matches in All Departments
This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.
Following the introduction of Myspace, Linkedin and Facebook, social networks have become part of people's everyday life. New online social networks appear almost daily developed to attract the attention of Internet users. However, design and implementation standards and guidelines are often sacrificed for innovation resulting in unusable social networking platforms destined to be doomed. Within this context, the present book recommends a design and implementation methodology which will allow future social networking platform designers and developers to work in a scientifically systematic and sound manner to reach their goal. The journey begins with the identification of the pursued objective of the social network and the potential participants. The presentation of various methods and techniques to collect the requirements of the intended user group of the social networking platform follows. Best practices, guidelines and standards that will facilitate the conceptual and physical design of the platform are portrayed. An analysis of advantages and limitations for existing implementation platforms and potential implementation techniques is subsequently offered to facilitate the selection of the most appropriate tool for the implementation of the online social networking website. Various representative visualization techniques are examined in order to enhance the visual representation of the social network participants. Various usability evaluation techniques are then presented to aid in the assessment of usability and improvement of the actual user experience. Finally, future trends in the design and use of social networks are presented.
This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition. The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection. The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general). The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures. The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master's and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.
Following the introduction of Myspace, Linkedin and Facebook, social networks have become part of people's everyday life. New online social networks appear almost daily developed to attract the attention of Internet users. However, design and implementation standards and guidelines are often sacrificed for innovation resulting in unusable social networking platforms destined to be doomed. Within this context, the present book recommends a design and implementation methodology which will allow future social networking platform designers and developers to work in a scientifically systematic and sound manner to reach their goal. The journey begins with the identification of the pursued objective of the social network and the potential participants. The presentation of various methods and techniques to collect the requirements of the intended user group of the social networking platform follows. Best practices, guidelines and standards that will facilitate the conceptual and physical design of the platform are portrayed. An analysis of advantages and limitations for existing implementation platforms and potential implementation techniques is subsequently offered to facilitate the selection of the most appropriate tool for the implementation of the online social networking website. Various representative visualization techniques are examined in order to enhance the visual representation of the social network participants. Various usability evaluation techniques are then presented to aid in the assessment of usability and improvement of the actual user experience. Finally, future trends in the design and use of social networks are presented.
|
You may like...
|