You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book offers an excellent source of knowledge for readers who are interested in keeping up with the developments in the field of cyber security and social media analysis. It covers the possibility of using augmented reality to monitor cyber security feeds in a multitasking environment. It describes a real-time scheduled security scanner. E-commerce concept labeling is tackled by introducing a lightweight global taxonomy induction system. Blogsphere analytics and online video narratives and networks are explored. The effect of global and local network structure, credibility based prevention of fake news dissemination, and detection of trending topics and influence from social media are investigated. This book helps the reader in developing their own perspective about how to deal with cyber security and how to benefit from the development in technology to tackle cyber security issues. The reader of this book will realize how to use various machine learning techniques for tackling various applications involving social medial analysis.
Recent developments in parallel computing for various fields of application are providing improved solutions for handling data. These newer, innovative ideas offer the technical support necessary to enhance intellectual decisions, while also dealing more efficiently with the huge volumes of data currently involved. This book presents the proceedings of ICAPTA 2022, the International Conference on Advances in Parallel Computing Technologies and Applications, hosted as a virtual conference from Bangalore, India, on 27 and 28 January 2022. The aim of the conference was to provide a forum for the sharing of knowledge about various aspects of parallel computing in communications systems and netwo...
In the world, many women are at risk of being exposed to economic, physical, sexual, psychological, and emotional violence, or even intentional homicide. They might also be exposed to discrimination based on their socio-demographic characteristics, such as their ethnic background, religion, and educational level. The purpose of this book is to bring together academics and researchers working in the fields of applied econometrics and applied statistics as they pertain to women’s issues. The twelve-chapter book includes insights on present econometric and statistical methodologies on women’s issues, as well as a better understanding and evaluation of contemporary policy implications, initiatives, and procedures pertaining to women.
Intelligent Environments (IE) play an increasingly important role in many areas of our lives, including education, healthcare and the domestic environment. The term refers to physical spaces incorporating pervasive computing technology used to achieve specific goals for the user, the environment or both. This book presents the proceedings of the workshops of the 9th International Conference on Intelligent Environments (IE ‘13), held in Athens, Greece, in July 2013. The workshops which were presented in the context of this conference range from regular lectures to practical sessions. They provide a forum for scientists, researchers and engineers from both industry and academia to engage in ...
Mühendislik Bilimlerinde Güncel Araştırmalar ve Uygulama, Livre de Lyon
This book focusses on recommendation, behavior, and anomaly, among of social media analysis. First, recommendation is vital for a variety of applications to narrow down the search space and to better guide people towards educated and personalized alternatives. In this context, the book covers supporting students, food venue, friend and paper recommendation to demonstrate the power of social media data analysis. Secondly, this book treats behavior analysis and understanding as important for a variety of applications, including inspiring behavior from discussion platforms, determining user choices, detecting following patterns, crowd behavior modeling for emergency evacuation, tracking community structure, etc. Third, fraud and anomaly detection have been well tackled based on social media analysis. This has is illustrated in this book by identifying anomalous nodes in a network, chasing undetected fraud processes, discovering hidden knowledge, detecting clickbait, etc. With this wide coverage, the book forms a good source for practitioners and researchers, including instructors and students.
This book addresses the challenges of social network and social media analysis in terms of prediction and inference. The chapters collected here tackle these issues by proposing new analysis methods and by examining mining methods for the vast amount of social content produced. Social Networks (SNs) have become an integral part of our lives; they are used for leisure, business, government, medical, educational purposes and have attracted billions of users. The challenges that stem from this wide adoption of SNs are vast. These include generating realistic social network topologies, awareness of user activities, topic and trend generation, estimation of user attributes from their social content, and behavior detection. This text has applications to widely used platforms such as Twitter and Facebook and appeals to students, researchers, and professionals in the field.
None