You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Important aspects of social networking analysis are covered in this work by combining experimental and theoretical research. A specific focus is devoted to emerging trends and the industry needs associated with utilizing data mining techniques. Some of the techniques covered include data mining advances in the discovery and analysis of communities, in the personalization of solitary activities (like searches) and social activities (like discovering potential friends), in the analysis of user behavior in open fora (like conventional sites, blogs and fora) and in commercial platforms (like e-auctions), and in the associated security and privacy-preservation challenges; as well as social network modeling, scalable, customizable social network infrastructure construction, and the identification and discovery of dynamic growth and evolution patterns using machine learning approaches or multi-agent based simulation. These topics will be of interest to practitioners and researchers alike in this dynamic and growing field.
An Iranian Town in Transition deals with the social and economic history of Tabriz, a town in north-west Iran and the centre of the historical province Azerbaijan. The focus of this study is on the notables of the town in an epoch of fundamental change that stretches from the mid-eighteenth to the mid-nineteenth century. Far from narrating a simple history of events, the study addresses major questions related to endowments (waqf), the workings of the Shiite judiciary, urban and provincial administration, the changing role of the 'ulama, and tenure of landed property in concrete case-studies. With its wide perspective on developments in urban society, the study interprets the process of social change in the transitional period from the Zands to the Qajars as a crucial starting point for the modern history of Iran. Stressing the importance of indigenous sources for this period, the author drew heavily on hitherto neglected Persian archival material. A large number of documents, deeds, and court protocols are included in critical edition in the appendix.
Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities.
This book constitutes the refereed proceedings of the Second International Multi-topic Conference, IMTIC 2012, held in Jamshoro, Pakistan, in March 2012. The 51 revised full papers presented were carefully reviewed and selected from 205 submissions. The papers address topics from information communication technologies.
This book constitutes the throughly refereed post-proceedings of the 6th International Workshop on Systems Analysis and Modeling, SAM 2010, held in collocation with MODELS 2010 in Oslo, Norway in October 2010. The 15 revised full papers presented went through two rounds of reviewing and improvement. The papers are organized in topical sections on modularity, composition, choreography, application of SDL and UML; SDL language profiles; code generation and model transformations; verification and analysis; and user requirements notification.
The international multi-topic conference IMTIC 2008 was held in Pakistan during April 11–12, 2008. It was a joint venture between Mehran University, Jamshoro, Sindh and Aalborg University, Esbjerg, Denmark. Apart from the two-day main event, two workshops were also held: the Workshop on Creating Social Semantic Web 2.0 Information Spaces and the Workshop on Wireless Sensor Networks. Two hundred participants registered for the main conference from 24 countries and 43 papers were presented; the two workshops had overwhelming support and over 400 delegates registered. IMTIC 2008 served as a platform for international scientists and the engineering community in general, and in particular for l...
This book constitutes the thoroughly refereed proceedings of the Third International Multi-topic Conference on Communications, Technologies, Information Security and Sustainable Development, IMTIC 2013, held in Jamshoro, Pakistan, in December 2013. The 27 revised papers presented in this volume were carefully reviewed and selected from 140 submissions. The topics presented had a reasonable balance between theory and practice in multi-disciplined topics including wireless sensor networks, cloud computing, wireless communication, antenna design, signal processing, software engineering, image processing, bioinformatics and telemedicine, neural networks, automation and control, and green renewable energy.
This book constitutes the refereed conference proceedings of the 4th International Conference on Emerging Technologies in Computing, iCEtiC 2021, held in August 2021. Due to VOVID-19 pandemic the conference was helt virtually. The 15 revised full papers were reviewed and selected from 44 submissions and are organized in topical sections covering Information and Network Security; Cloud, IoT and Distributed Computing; AI, Expert Systems and Big Data Analytics
This book constitutes the refereed proceedings of the 5th International Conference on Advanced Data Mining and Applications, ADMA 2009, held in Beijing, China, in August 2009. The 34 revised full papers and 47 revised short papers presented together with the abstract of 4 keynote lectures were carefully reviewed and selected from 322 submissions from 27 countries. The papers focus on advancements in data mining and peculiarities and challenges of real world applications using data mining and feature original research results in data mining, spanning applications, algorithms, software and systems, and different applied disciplines with potential in data mining.
This book, first published in 1982, attempts to explain how and why Iraqi military intervened in the affairs of state between 1936 and 1941. The intention is not to describe the various coups of this period, but to explain the gradual assumption of a political role by the Iraqi army and the contributing factors at play, for example the fragmented nature of Iraqi society and the presence of the British. In addition, an understanding of the political role of the Iraqi army requires a thorough investigation of the development of the Iraqi state itself.