Results 21 to 30 of about 190 (112)
Abstract This article explains the factors that led to the use of a hybrid data collection tool—i.e., a single questionnaire designed to collect both quantitative and qualitative data—in two different research projects that focused on the relation between the labour market trajectories of young people and the use and accumulation of network social ...
Joan M. Verd
wiley +1 more source
There is some evidence that ethnocultural diversity encourages superordinate levels of categorisation, such as feeling identified with people globally. A remaining question is what type of engagement with diversity facilitates this link and why. We use immigrants' personal social network data and examine the link between global identification and ...
Magdalena Bobowik +2 more
wiley +1 more source
Interaction Context‐Aware Network Behavior Anomaly Detection for Discovering Unknown Attacks
Network behavior anomaly detection is an effective approach to discover unknown attacks, where generating high‐efficacy network behavior representation is one of the most crucial parts. Nowadays, complicated network environments and advancing attack techniques make it more challenging.
Zhi-Quan Qin +4 more
wiley +1 more source
Overlapping Community Detection Based on Strong Tie Detection and Non‐Overlapping Link Clustering
Many clustering algorithms are in favour of node‐based methods, but a link between nodes has one single feature, so link‐based clustering is sometimes easier than node‐based methods. Being dependent on the characteristics of links, a detection algorithm for a non‐overlapping link community is put forward in this paper.
Lin Guo, Miao Zhang, Jian Lin
wiley +1 more source
Ajalon: Simplifying the authoring of wearable cognitive assistants
Summary Wearable Cognitive Assistance (WCA) amplifies human cognition in real time through a wearable device and low‐latency wireless access to edge computing infrastructure. It is inspired by, and broadens, the metaphor of GPS navigation tools that provide real‐time step‐by‐step guidance, with prompt error detection and correction.
Truong An Pham +6 more
wiley +1 more source
A weighted graph‐based method for detection of data integrity attacks in electricity markets
Abstract The negative impacts of data integrity attacks against multi‐settlement electricity markets have been recently studied. It has been shown that adversaries could launch profitable cyber attacks by casting an incorrect image of transmission lines' congestion pattern while simultaneously submitting bogus bids in electricity markets.
Ramin Moslemi +2 more
wiley +1 more source
Optimal block designs for experiments on networks
Abstract We propose a method for constructing optimal block designs for experiments on networks. The response model for a given network interference structure extends the linear network effects model to incorporate blocks. The optimality criteria are chosen to reflect the experimental objectives and an exchange algorithm is used to search across the ...
Vasiliki Koutra +2 more
wiley +1 more source
Detecting Abnormal Social Network Accounts with Hurst of Interest Distribution
With the rapid development of the Internet since the beginning of the 21st century, social networks have provided a significant amount of convenience for work, study, and entertainment. Specifically, because of the irreplaceable superiority of social platforms in disseminating information, criminals have thus updated the main methods of social ...
Xiujuan Wang +5 more
wiley +1 more source
Exhaustive Exploitation of Local Seeding Algorithms for Community Detection in a Unified Manner
Community detection is an essential task in network analysis and is challenging due to the rapid growth of network scales. Recently, discovering communities from the local perspective of some specified nodes called seeds, rather than requiring the global
Yanmei Hu, Bo Yang, Bin Duo, Xing Zhu
doaj +1 more source
The strenuous mining and arduous discovery of the concealed community structure in complex networks has received tremendous attention by the research community and is a trending domain in the multifaceted network as it not only reveals details about the hierarchical structure of multifaceted network but also assists in better understanding of the core ...
Bader Fahad Alkhamees +4 more
wiley +1 more source

