| 000 | 00000nam u2200205 a 4500 | |
| 001 | 000046047496 | |
| 005 | 20201005103312 | |
| 006 | m d | |
| 007 | cr | |
| 008 | 200916s2014 sz a ob 001 0 eng d | |
| 020 | ▼a 9783319051642 | |
| 040 | ▼a 211009 ▼c 211009 ▼d 211009 | |
| 050 | 0 0 | ▼a TK5105.7 |
| 082 | 0 4 | ▼a 005.7 ▼2 23 |
| 084 | ▼a 005.7 ▼2 DDCK | |
| 090 | ▼a 005.7 | |
| 245 | 0 0 | ▼a Social networking ▼h [electronic resource] : ▼b mining, visualization, and security / ▼c Mrutyunjaya Panda, Satchidananda Dehuri, Gi-Nam Wang, editors. |
| 260 | ▼a Cham : ▼b Springer International Publishing : ▼b Imprint: Springer, ▼c 2014. | |
| 300 | ▼a 1 online resource (20, 297 p.) : ▼b ill. | |
| 490 | 1 | ▼a Intelligent systems reference library, ▼x 1868-4394 ; ▼v 65 |
| 500 | ▼a Title from e-Book title page. | |
| 504 | ▼a Includes bibliographical references and index. | |
| 505 | 0 | ▼a Diffusion of Information in Social Networks -- Structure and Evolution of Online Social Networks -- Machine Learning for Auspicious Social Network Mining -- Testing Community Detection Algorithms: A Closer Look at Datasets -- Societal Networks: The networks of Dynamics of Interpersonal Associations -- Methods of tracking online community in social network -- Social Network Analysis Approach for Studying Caste, Class and Social Support in Rural Jharkhand and West Bengal: An Empirical Attempt -- Evaluating the Propagation Strength of Malicious Metaphor in Social Network: Flow Through Inspiring Influence of Members -- Social Network Analysis: A methodology for studying Terrorism -- Privacy and Anonymization in Social Networks -- On the use of Brokerage Approach to discover Influencing Nodes in Terrorist Networks. |
| 520 | ▼a With the proliferation of social media and on-line communities in networked world a large gamut of data has been collected and stored in databases. The rate at which such data is stored is growing at a phenomenal rate and pushing the classical methods of data analysis to their limits. This book presents an integrated framework of recent empirical and theoretical research on social network analysis based on a wide range of techniques from various disciplines like data mining, social sciences, mathematics, statistics, physics, network science, machine learning with visualization techniques, and security. The book illustrates the potential of multi-disciplinary techniques in various real life problems and intends to motivate researchers in social network analysis to design more effective tools by integrating swarm intelligence and data mining. . | |
| 530 | ▼a Issued also as a book. | |
| 538 | ▼a Mode of access: World Wide Web. | |
| 650 | 0 | ▼a Local area networks (Computer networks). |
| 650 | 0 | ▼a Social networks ▼x Computer network resources. |
| 650 | 0 | ▼a Online social networks. |
| 650 | 0 | ▼a Data mining. |
| 650 | 0 | ▼a Computational intelligence. |
| 700 | 1 | ▼a Panda, Mrutyunjaya. |
| 700 | 1 | ▼a Dehuri, Satchidananda. |
| 700 | 1 | ▼a Wang, Gi-Nam. |
| 830 | 0 | ▼a Intelligent systems reference library ; ▼v 65. |
| 856 | 4 0 | ▼u https://oca.korea.ac.kr/link.n2s?url=http://dx.doi.org/10.1007/978-3-319-05164-2 |
| 945 | ▼a KLPA | |
| 991 | ▼a E-Book(소장) |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 중앙도서관/e-Book 컬렉션/ | 청구기호 CR 005.7 | 등록번호 E14033555 | 도서상태 대출불가(열람가능) | 반납예정일 | 예약 | 서비스 |
