Results 21 to 30 of about 190 (112)

Using a hybrid data collection tool: Analysis of youth labour market trajectories integrating quantitative, qualitative and social network data

open access: yesInternational Journal of Social Welfare, Volume 32, Issue 1, Page 9-19, January 2023., 2023
Abstract This article explains the factors that led to the use of a hybrid data collection tool—i.e., a single questionnaire designed to collect both quantitative and qualitative data—in two different research projects that focused on the relation between the labour market trajectories of young people and the use and accumulation of network social ...
Joan M. Verd
wiley   +1 more source

Ethnocultural diversity of immigrants' personal social networks, bicultural identity integration and global identification

open access: yesInternational Journal of Psychology, Volume 57, Issue 4, Page 491-500, August 2022., 2022
There is some evidence that ethnocultural diversity encourages superordinate levels of categorisation, such as feeling identified with people globally. A remaining question is what type of engagement with diversity facilitates this link and why. We use immigrants' personal social network data and examine the link between global identification and ...
Magdalena Bobowik   +2 more
wiley   +1 more source

Interaction Context‐Aware Network Behavior Anomaly Detection for Discovering Unknown Attacks

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Network behavior anomaly detection is an effective approach to discover unknown attacks, where generating high‐efficacy network behavior representation is one of the most crucial parts. Nowadays, complicated network environments and advancing attack techniques make it more challenging.
Zhi-Quan Qin   +4 more
wiley   +1 more source

Overlapping Community Detection Based on Strong Tie Detection and Non‐Overlapping Link Clustering

open access: yesMathematical Problems in Engineering, Volume 2022, Issue 1, 2022., 2022
Many clustering algorithms are in favour of node‐based methods, but a link between nodes has one single feature, so link‐based clustering is sometimes easier than node‐based methods. Being dependent on the characteristics of links, a detection algorithm for a non‐overlapping link community is put forward in this paper.
Lin Guo, Miao Zhang, Jian Lin
wiley   +1 more source

Ajalon: Simplifying the authoring of wearable cognitive assistants

open access: yesSoftware: Practice and Experience, Volume 51, Issue 8, Page 1773-1797, August 2021., 2021
Summary Wearable Cognitive Assistance (WCA) amplifies human cognition in real time through a wearable device and low‐latency wireless access to edge computing infrastructure. It is inspired by, and broadens, the metaphor of GPS navigation tools that provide real‐time step‐by‐step guidance, with prompt error detection and correction.
Truong An Pham   +6 more
wiley   +1 more source

A weighted graph‐based method for detection of data integrity attacks in electricity markets

open access: yesIET Generation, Transmission &Distribution, Volume 15, Issue 16, Page 2298-2308, August 2021., 2021
Abstract The negative impacts of data integrity attacks against multi‐settlement electricity markets have been recently studied. It has been shown that adversaries could launch profitable cyber attacks by casting an incorrect image of transmission lines' congestion pattern while simultaneously submitting bogus bids in electricity markets.
Ramin Moslemi   +2 more
wiley   +1 more source

Optimal block designs for experiments on networks

open access: yesJournal of the Royal Statistical Society: Series C (Applied Statistics), Volume 70, Issue 3, Page 596-618, June 2021., 2021
Abstract We propose a method for constructing optimal block designs for experiments on networks. The response model for a given network interference structure extends the linear network effects model to incorporate blocks. The optimality criteria are chosen to reflect the experimental objectives and an exchange algorithm is used to search across the ...
Vasiliki Koutra   +2 more
wiley   +1 more source

Detecting Abnormal Social Network Accounts with Hurst of Interest Distribution

open access: yesSecurity and Communication Networks, Volume 2021, Issue 1, 2021., 2021
With the rapid development of the Internet since the beginning of the 21st century, social networks have provided a significant amount of convenience for work, study, and entertainment. Specifically, because of the irreplaceable superiority of social platforms in disseminating information, criminals have thus updated the main methods of social ...
Xiujuan Wang   +5 more
wiley   +1 more source

Exhaustive Exploitation of Local Seeding Algorithms for Community Detection in a Unified Manner

open access: yesMathematics, 2022
Community detection is an essential task in network analysis and is challenging due to the rapid growth of network scales. Recently, discovering communities from the local perspective of some specified nodes called seeds, rather than requiring the global
Yanmei Hu, Bo Yang, Bin Duo, Xing Zhu
doaj   +1 more source

[Retracted] An Effective Approach for Modular Community Detection in Bipartite Network Based on Integrating Rider with Harris Hawks Optimization Algorithms

open access: yesJournal of Mathematics, Volume 2021, Issue 1, 2021., 2021
The strenuous mining and arduous discovery of the concealed community structure in complex networks has received tremendous attention by the research community and is a trending domain in the multifaceted network as it not only reveals details about the hierarchical structure of multifaceted network but also assists in better understanding of the core ...
Bader Fahad Alkhamees   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy