Listing 1 - 10 of 15 | << page >> |
Sort by
|
Choose an application
Following the introduction of Myspace, Linkedin and Facebook, social networks have become part of people’s everyday life. New online social networks appear almost daily developed to attract the attention of Internet users. However, design and implementation standards and guidelines are often sacrificed for innovation resulting in unusable social networking platforms destined to be doomed. Within this context, the present book recommends a design and implementation methodology which will allow future social networking platform designers and developers to work in a scientifically systematic and sound manner to reach their goal. The journey begins with the identification of the pursued objective of the social network and the potential participants. The presentation of various methods and techniques to collect the requirements of the intended user group of the social networking platform follows. Best practices, guidelines and standards that will facilitate the conceptual and physical design of the platform are portrayed. An analysis of advantages and limitations for existing implementation platforms and potential implementation techniques is subsequently offered to facilitate the selection of the most appropriate tool for the implementation of the online social networking website. Various representative visualization techniques are examined in order to enhance the visual representation of the social network participants. Various usability evaluation techniques are then presented to aid in the assessment of usability and improvement of the actual user experience. Finally, future trends in the design and use of social networks are presented.
Online social networks --- Design. --- Computer science. --- Application software. --- Statistical physics. --- Dynamical systems. --- Physics. --- Computer Science. --- Computer Appl. in Social and Behavioral Sciences. --- Statistical Physics, Dynamical Systems and Complexity. --- Complex Networks. --- Information Systems Applications (incl. Internet). --- Natural philosophy --- Philosophy, Natural --- Physical sciences --- Dynamics --- Dynamical systems --- Kinetics --- Mathematics --- Mechanics, Analytic --- Force and energy --- Mechanics --- Physics --- Statics --- Mathematical statistics --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Informatics --- Science --- Statistical methods --- Electronic social networks --- Social networking Web sites --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Social sciences --- Complex Systems. --- Applications of Graph Theory and Complex Networks. --- Statistical Physics and Dynamical Systems. --- Data processing.
Choose an application
Following the introduction of Myspace, Linkedin and Facebook, social networks have become part of people’s everyday life. New online social networks appear almost daily developed to attract the attention of Internet users. However, design and implementation standards and guidelines are often sacrificed for innovation resulting in unusable social networking platforms destined to be doomed. Within this context, the present book recommends a design and implementation methodology which will allow future social networking platform designers and developers to work in a scientifically systematic and sound manner to reach their goal. The journey begins with the identification of the pursued objective of the social network and the potential participants. The presentation of various methods and techniques to collect the requirements of the intended user group of the social networking platform follows. Best practices, guidelines and standards that will facilitate the conceptual and physical design of the platform are portrayed. An analysis of advantages and limitations for existing implementation platforms and potential implementation techniques is subsequently offered to facilitate the selection of the most appropriate tool for the implementation of the online social networking website. Various representative visualization techniques are examined in order to enhance the visual representation of the social network participants. Various usability evaluation techniques are then presented to aid in the assessment of usability and improvement of the actual user experience. Finally, future trends in the design and use of social networks are presented.
Social sciences (general) --- Demography --- Statistical physics --- Computer science --- Information systems --- Computer. Automation --- theoretische fysica --- analytische chemie --- Facebook --- biochemie --- computers --- informatica --- sociale wetenschappen --- informatiesystemen --- computernetwerken --- computerkunde
Choose an application
This book introduces readers to novel, efficient and user-friendly software tools for power systems studies, to issues related to distributed and dispersed power generation, and to the correlation between renewable power generation and electricity demand. Discussing new methodologies for addressing grid stability and control problems, it also examines issues concerning the safety and protection of transmission and distribution networks, energy storage and power quality, and the application of embedded systems to these networks. Lastly, the book sheds light on the implications of these new methodologies and developments for the economics of the power industry. As such, it offers readers a comprehensive overview of state-of-the-art research on modern electricity transmission and distribution networks.
Computer science. --- Management Theory --- Management --- Business & Economics --- Electric power transmission. --- Electric power distribution. --- Electricity --- Power distribution, Electric --- Power transmission, Electric --- Distribution --- Transmission --- Electric power systems --- Power transmission --- Electric power transmission --- Electrification --- Electric lines --- Electric power distribution --- Management. --- Computer engineering. --- Innovation/Technology Management. --- Energy Systems. --- Electrical Engineering. --- Computer Applications. --- Informatics --- Science --- Computers --- Administration --- Industrial relations --- Organization --- Design and construction --- Industrial management. --- Energy systems. --- Electrical engineering. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Electric engineering --- Engineering --- Business administration --- Business enterprises --- Business management --- Corporate management --- Corporations --- Industrial administration --- Management, Industrial --- Rationalization of industry --- Scientific management --- Business --- Industrial organization
Choose an application
This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition. The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection. The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general). The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures. The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master’s and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.
Political science. --- Politics and war. --- Pattern recognition. --- Biometrics (Biology). --- System safety. --- Computer crimes. --- Political Science and International Relations. --- Military and Defence Studies. --- Cybercrime. --- Pattern Recognition. --- Biometrics. --- Security Science and Technology. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Design perception --- Pattern recognition --- Form perception --- Perception --- Figure-ground perception --- War --- War and politics --- Administration --- Civil government --- Commonwealth, The --- Government --- Political theory --- Political thought --- Politics --- Science, Political --- Social sciences --- State, The --- Prevention --- Statistical methods --- Political aspects --- Electronic surveillance. --- Video surveillance. --- Military surveillance. --- Surveillance, Military --- Detectors --- Military intelligence --- Electronic surveillance --- Video recording --- Electronics in surveillance --- SIGINT (Electronic surveillance) --- Signals intelligence --- Surveillance, Electronic --- Remote sensing --- Optical pattern recognition. --- Optical data processing --- Pattern perception --- Perceptrons --- Visual discrimination
Choose an application
This book introduces readers to novel, efficient and user-friendly software tools for power systems studies, to issues related to distributed and dispersed power generation, and to the correlation between renewable power generation and electricity demand. Discussing new methodologies for addressing grid stability and control problems, it also examines issues concerning the safety and protection of transmission and distribution networks, energy storage and power quality, and the application of embedded systems to these networks. Lastly, the book sheds light on the implications of these new methodologies and developments for the economics of the power industry. As such, it offers readers a comprehensive overview of state-of-the-art research on modern electricity transmission and distribution networks.
Methodology of economics --- Thermodynamics --- Relation between energy and economics --- Electrical engineering --- Applied physical engineering --- Business policy --- Organization theory --- Production management --- Business management --- Business economics --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- thermodynamica --- financieel management --- organisatiemanagement --- hernieuwbare energie --- applicatiebeheer --- apps --- management --- organisatiecultuur --- energietechniek --- informatietechnologie --- elektrotechniek --- architectuur (informatica)
Choose an application
This book addresses surveillance in action-related applications, and presents novel research on military, civil and cyber surveillance from an international team of experts. The first part of the book, Surveillance of Human Features, reviews surveillance systems that use biometric technologies. It discusses various novel approaches to areas including gait recognition, face-based physiology-assisted recognition, face recognition in the visible and infrared bands, and cross-spectral iris recognition. The second part of the book, Surveillance for Security and Defense, discusses the ethical issues raised by the use of surveillance systems in the name of combatting terrorism and ensuring security. It presents different generations of satellite surveillance systems and discusses the requirements for real-time satellite surveillance in military contexts. In addition, it explores the new standards of surveillance using unmanned air vehicles and drones, proposes surveillance techniques for detecting stealth aircrafts and drones, and highlights key techniques for maritime border surveillance, bio-warfare and bio-terrorism detection. The last part of the book, Cyber Surveillance, provides a review of data hiding techniques that are used to hinder electronic surveillance. It subsequently presents methods for collecting and analyzing information from social media sites and discusses techniques for detecting internal and external threats posed by various individuals (such as spammers, cyber-criminals, suspicious users or extremists in general). The book concludes by examining how high-performance computing environments can be exploited by malicious users, and what surveillance methods need to be put in place to protect these valuable infrastructures. The book is primarily intended for military and law enforcement personnel who use surveillance-related technologies, as well as researchers, Master’s and Ph.D. students who are interested in learning about the latest advances in military, civilian and cyber surveillance.
Politics --- Criminal law. Criminal procedure --- Polemology --- Mathematical statistics --- Biomathematics. Biometry. Biostatistics --- Military engineering --- Production management --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- patroonherkenning --- factoranalyse --- biomathematica --- veiligheid (mensen) --- drones --- gezichtsherkenning (informatica) --- biostatistiek --- politiek --- biometrie --- computercriminaliteit --- defensie --- optica
Choose an application
This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.
Social media. --- User-generated media --- Communication --- User-generated content --- Data mining. --- Social sciences—Data processing. --- Social sciences—Computer programs. --- Big data. --- Social sciences --- Data Mining and Knowledge Discovery. --- Computational Social Sciences. --- Big Data/Analytics. --- Computer Appl. in Social and Behavioral Sciences. --- Complex Systems. --- Data processing. --- Computer programs. --- Data sets, Large --- Large data sets --- Data sets --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Application software. --- Statistical physics. --- Dynamical systems. --- Dynamical systems --- Kinetics --- Mathematics --- Mechanics, Analytic --- Force and energy --- Mechanics --- Physics --- Statics --- Mathematical statistics --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Statistical methods
Choose an application
The book presents novel research in the areas of social identity and security when using mobile platforms. The topics cover a broad range of applications related to securing social identity as well as the latest advances in the field, including the presentation of novel research methods that are in the service of all citizens using mobile devices. More specifically, academic, industry-related and government (law enforcement, intelligence and defence) organizations, will benefit from the research topics of this book that cover the concept of identity management and security using mobile platforms from various perspectives, i.e. whether a user navigates to social media, accesses their own phone devices, access their bank accounts, uses online shopping service providers, accesses their personal documents or accounts with valuable information, surfs the internet, or even becomes a victim of cyberattacks. In all of the aforementioned cases, there is a need for mobile related technologies that protect the users’ social identity and well-being in the digital world, including the use of biometrics, cybersecurity software and tools, active authentication and identity anti-spoofing algorithms and more.
Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computers and civilization. --- System safety. --- Social sciences—Data processing. --- Social sciences—Computer programs. --- Computer crimes. --- Biometrics (Biology). --- Computers and Society. --- Security Science and Technology. --- Computational Social Sciences. --- Cybercrime. --- Biometrics. --- Biological statistics --- Biology --- Biometrics (Biology) --- Biostatistics --- Biomathematics --- Statistics --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Safety, System --- Safety of systems --- Systems safety --- Accidents --- Industrial safety --- Systems engineering --- Civilization and computers --- Civilization --- Statistical methods --- Prevention
Choose an application
This book examines modern paradigms of disease control based on social network surveillance applications, including electronic sentinel surveillance and wireless application-based surveillance science. It also highlights topics that integrate statistical and epidemiological sciences with surveillance practice and, in order to reflect the evolution of social networking practices, discusses topics concerning the challenges for surveillance theory and practice. In turn, the book goes a step further by providing insights on how we need to analyse epidemiological trends by following best practices on distinguishing useful information from noise, namely fake news, false reporting of disease incidents and events, etc. At the same time, we need to be able to protect health-focused applications and communication tools via cybersecurity technologies and to ensure that anonymity of reporting and privacy are preserved. In closing, the book discusses the role and impact of social media on disease surveillance, as well as the current role of communities in infectious disease surveillance and control.
Public health surveillance. --- Online social networks. --- Communities, Online (Online social networks) --- Communities, Virtual (Online social networks) --- Electronic social networks --- Online communities (Online social networks) --- Social networking Web sites --- Virtual communities --- Social media --- Social networks --- Sociotechnical systems --- Web sites --- Population surveillance (Public health) --- Surveillance, Public health --- Epidemiology --- Artificial intelligence --- Medical informatics. --- Public health. --- Epidemiology. --- Data Science. --- Health Informatics. --- Public Health. --- Data processing. --- Diseases --- Public health --- Community health --- Health services --- Hygiene, Public --- Hygiene, Social --- Public health services --- Public hygiene --- Social hygiene --- Health --- Human services --- Biosecurity --- Health literacy --- Medicine, Preventive --- National health services --- Sanitation --- Clinical informatics --- Health informatics --- Medical information science --- Information science --- Medicine --- Data processing
Choose an application
This book focuses on novel and state-of-the-art scientific work in the area of detection and prediction techniques using information found generally in graphs and particularly in social networks. Community detection techniques are presented in diverse contexts and for different applications while prediction methods for structured and unstructured data are applied to a variety of fields such as financial systems, security forums, and social networks. The rest of the book focuses on graph-based techniques for data analysis such as graph clustering and edge sampling. The research presented in this volume was selected based on solid reviews from the IEEE/ACM International Conference on Advances in Social Networks, Analysis, and Mining (ASONAM '17). Chapters were then improved and extended substantially, and the final versions were rigorously reviewed and revised to meet the series standards. This book will appeal to practitioners, researchers and students in the field.
Social sciences (general) --- Sociology --- Demography --- Social sciences --- Discrete mathematics --- Computer architecture. Operating systems --- Information systems --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- grafentheorie --- datamining --- analytische chemie --- biochemie --- informatica --- sociale wetenschappen --- computerprogramma's --- gegevensanalyse --- data acquisition --- gegevensverwerking
Listing 1 - 10 of 15 | << page >> |
Sort by
|