|
Showing 1 - 4 of
4 matches in All Departments
This book focuses on novel and state-of-the-art scientific work in
the area of detection and prediction techniques using information
found generally in graphs and particularly in social networks.
Community detection techniques are presented in diverse contexts
and for different applications while prediction methods for
structured and unstructured data are applied to a variety of fields
such as financial systems, security forums, and social networks.
The rest of the book focuses on graph-based techniques for data
analysis such as graph clustering and edge sampling. The research
presented in this volume was selected based on solid reviews from
the IEEE/ACM International Conference on Advances in Social
Networks, Analysis, and Mining (ASONAM '17). Chapters were then
improved and extended substantially, and the final versions were
rigorously reviewed and revised to meet the series standards. This
book will appeal to practitioners, researchers and students in the
field.
This book addresses surveillance in action-related applications,
and presents novel research on military, civil and cyber
surveillance from an international team of experts. The first part
of the book, Surveillance of Human Features, reviews surveillance
systems that use biometric technologies. It discusses various novel
approaches to areas including gait recognition, face-based
physiology-assisted recognition, face recognition in the visible
and infrared bands, and cross-spectral iris recognition. The second
part of the book, Surveillance for Security and Defense, discusses
the ethical issues raised by the use of surveillance systems in the
name of combatting terrorism and ensuring security. It presents
different generations of satellite surveillance systems and
discusses the requirements for real-time satellite surveillance in
military contexts. In addition, it explores the new standards of
surveillance using unmanned air vehicles and drones, proposes
surveillance techniques for detecting stealth aircrafts and drones,
and highlights key techniques for maritime border surveillance,
bio-warfare and bio-terrorism detection. The last part of the book,
Cyber Surveillance, provides a review of data hiding techniques
that are used to hinder electronic surveillance. It subsequently
presents methods for collecting and analyzing information from
social media sites and discusses techniques for detecting internal
and external threats posed by various individuals (such as
spammers, cyber-criminals, suspicious users or extremists in
general). The book concludes by examining how high-performance
computing environments can be exploited by malicious users, and
what surveillance methods need to be put in place to protect these
valuable infrastructures. The book is primarily intended for
military and law enforcement personnel who use surveillance-related
technologies, as well as researchers, Master's and Ph.D. students
who are interested in learning about the latest advances in
military, civilian and cyber surveillance.
Following the introduction of Myspace, Linkedin and Facebook,
social networks have become part of people's everyday life. New
online social networks appear almost daily developed to attract the
attention of Internet users. However, design and implementation
standards and guidelines are often sacrificed for innovation
resulting in unusable social networking platforms destined to be
doomed. Within this context, the present book recommends a design
and implementation methodology which will allow future social
networking platform designers and developers to work in a
scientifically systematic and sound manner to reach their goal. The
journey begins with the identification of the pursued objective of
the social network and the potential participants. The presentation
of various methods and techniques to collect the requirements of
the intended user group of the social networking platform follows.
Best practices, guidelines and standards that will facilitate the
conceptual and physical design of the platform are portrayed. An
analysis of advantages and limitations for existing implementation
platforms and potential implementation techniques is subsequently
offered to facilitate the selection of the most appropriate tool
for the implementation of the online social networking website.
Various representative visualization techniques are examined in
order to enhance the visual representation of the social network
participants. Various usability evaluation techniques are then
presented to aid in the assessment of usability and improvement of
the actual user experience. Finally, future trends in the design
and use of social networks are presented.
Following the introduction of Myspace, Linkedin and Facebook,
social networks have become part of people's everyday life. New
online social networks appear almost daily developed to attract the
attention of Internet users. However, design and implementation
standards and guidelines are often sacrificed for innovation
resulting in unusable social networking platforms destined to be
doomed. Within this context, the present book recommends a design
and implementation methodology which will allow future social
networking platform designers and developers to work in a
scientifically systematic and sound manner to reach their goal. The
journey begins with the identification of the pursued objective of
the social network and the potential participants. The presentation
of various methods and techniques to collect the requirements of
the intended user group of the social networking platform follows.
Best practices, guidelines and standards that will facilitate the
conceptual and physical design of the platform are portrayed. An
analysis of advantages and limitations for existing implementation
platforms and potential implementation techniques is subsequently
offered to facilitate the selection of the most appropriate tool
for the implementation of the online social networking website.
Various representative visualization techniques are examined in
order to enhance the visual representation of the social network
participants. Various usability evaluation techniques are then
presented to aid in the assessment of usability and improvement of
the actual user experience. Finally, future trends in the design
and use of social networks are presented.
|
You may like...
Not available
Ab Wheel
R209
R149
Discovery Miles 1 490
|