In the last few years, there has been extensive research activity in the emerging area of Intermittently Connected Mobile Ad Hoc Networks (ICMANs). By considering the nature of intermittent connectivity in most real word mobile environments without any restrictions placed on users' behavior, ICMANs are eventually formed without any assumption with regard to the existence of a end-to-end path between two nodes wishing to communicate. It is different from the conventional Mobile Ad Hoc Networks (MANETs), which have been implicitly viewed as a connected graph with established complete paths...
In the last few years, there has been extensive research activity in the emerging area of Intermittently Connected Mobile Ad Hoc Networks (ICMANs). By...
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft detection, plagiarism detection, and software clone detection. Extracting program features, processing those features into suitable representations, and constructing distance metrics to define similarity and dissimilarity are the key methods to identify software variants, clones, derivatives, and classes of software. Software Similarity and Classification reviews the literature of those core concepts, in addition to relevant literature in each...
Software similarity and classification is an emerging topic with wide applications. It is applicable to the areas of malware detection, software theft...
Machine learning and nonparametric function estimation procedures can be effectively used in forecasting. One important and current application is used to make forecasts of "future dangerousness" to inform criminal justice decision. Examples include the decision to release an individual on parole, determination of the parole conditions, bail recommendations, and sentencing. Since the 1920s, "risk assessments" of various kinds have been used in parole hearings, but the current availability of large administrative data bases, inexpensive computing power, and developments in statistics and...
Machine learning and nonparametric function estimation procedures can be effectively used in forecasting. One important and current application is use...
This book describes a computational framework for real-time detection of psychological signals related to Post-Traumatic Stress Disorder (PTSD) in online text-based posts, including blogs and web forums. Further, it explores how emerging computational techniques such as sentiment mining can be used in real-time to identify posts that contain PTSD-related signals, flag those posts, and bring them to the attention of psychologists, thus providing an automated flag and referral capability. The use of sentiment extraction technologies allows automatic in-depth analysis of opinions and emotions...
This book describes a computational framework for real-time detection of psychological signals related to Post-Traumatic Stress Disorder (PTSD) in onl...
Cooperative transmission aims to improve the reliability of wireless mobile communications through the use of diversity provided by additional relays assisting in the transmission between the source and destination nodes. This is possible as the rationale behind spatio-temporal processing can be easily mapped onto networked systems. Autonomic Cooperative Networking studies the further evolution of this phenomenon by first involving the network layer routines and then additionally incorporating the notion of autonomic system design.
Cooperative transmission aims to improve the reliability of wireless mobile communications through the use of diversity provided by additional relays ...
This book provides an analysis of transmission power and network performance in different wireless communication networks. It presents the latest research and techniques for power and interference control and performance modeling in wireless communication networks with different network topologies, air interfaces, and transmission techniques. While studying the power distributions and resource management, the reader will also learn basic methodology and skills for problem formulations, can ascertain the complexity for designing radio resource management strategies in modern wireless...
This book provides an analysis of transmission power and network performance in different wireless communication networks. It presents the latest rese...
The research in content-based indexing and retrieval of visual information such as images and video has become one of the most populated directions in the vast area of information technologies. Social networks such as YouTube, Facebook, FileMobile, and DailyMotion host and supply facilities for accessing a tremendous amount of professional and user generated data. The areas of societal activity, such as, video protection and security, also generate thousands and thousands of terabytes of visual content. This book presents the most recent results and important trends in visual information...
The research in content-based indexing and retrieval of visual information such as images and video has become one of the most populated directions in...
Social media has drastically improved the way we can reach target audiences and serve our customers. Like its financial counterpart, the social media audit (SMA) can be described as a formalized review of anorganization's social media activities. However, contrary to financial audits, social media audits are not guided by government regulations or a set of professional rules and standards.
This book will address social media marketing issues using a cost benefit approach, while presenting a systematic approach to review the organization's social media activities. Using the...
Social media has drastically improved the way we can reach target audiences and serve our customers. Like its financial counterpart, the social med...
Over the last 50 years there have been an increasing number of applications of algebraic tools to solve problems in communications, in particular in the fields of error-control codes and cryptography. More recently, broader applications have emerged, requiring quite sophisticated algebra - for example, the Alamouti scheme in MIMO communications is just Hamilton's quaternions in disguise and has spawned the use of PhD-level algebra to produce generalizations. Likewise, in the absence of credible alternatives, the industry has in many cases been forced to adopt elliptic curve cryptography. In...
Over the last 50 years there have been an increasing number of applications of algebraic tools to solve problems in communications, in particular in t...