LEADER 04328nam 22006975 450 001 9910299471803321 005 20220427162446.0 010 $a3-319-05164-4 024 7 $a10.1007/978-3-319-05164-2 035 $a(CKB)3710000000092735 035 $a(EBL)1782217 035 $a(OCoLC)902413437 035 $a(SSID)ssj0001186941 035 $a(PQKBManifestationID)11754664 035 $a(PQKBTitleCode)TC0001186941 035 $a(PQKBWorkID)11241652 035 $a(PQKB)11268892 035 $a(MiAaPQ)EBC1782217 035 $a(DE-He213)978-3-319-05164-2 035 $a(PPN)177825979 035 $a(EXLCZ)993710000000092735 100 $a20140304d2014 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aSocial Networking $eMining, Visualization, and Security /$fedited by Mrutyunjaya Panda, Satchidananda Dehuri, Gi-Nam Wang 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (313 p.) 225 1 $aIntelligent Systems Reference Library,$x1868-4394 ;$v65 300 $aDescription based upon print version of record. 311 $a3-319-05163-6 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aDiffusion of Information in Social Networks -- Structure and Evolution of Online Social Networks -- Machine Learning for Auspicious Social Network Mining -- Testing Community Detection Algorithms: A Closer Look at Datasets -- Societal Networks: The networks of Dynamics of Interpersonal Associations -- Methods of tracking online community in social network -- Social Network Analysis Approach for Studying Caste, Class and Social Support in Rural Jharkhand and West Bengal: An Empirical Attempt -- Evaluating the Propagation Strength of Malicious Metaphor in Social Network: Flow Through Inspiring Influence of Members -- Social Network Analysis: A methodology for studying Terrorism -- Privacy and Anonymization in Social Networks -- On the use of Brokerage Approach to discover Influencing Nodes in Terrorist Networks. 330 $aWith the proliferation of social media and on-line communities in networked world a large gamut of data has been collected and stored in databases. The rate at which such data is stored is growing at a phenomenal rate and pushing the classical methods of data analysis to their limits. This book presents an integrated framework of recent empirical and theoretical research on social network analysis based on a wide range of techniques from various disciplines like data mining, social sciences, mathematics, statistics, physics, network science, machine learning with visualization techniques, and security. The book illustrates the potential of multi-disciplinary techniques in various real life problems and intends to motivate researchers in social network analysis to design more effective tools by integrating swarm intelligence and data mining.  . 410 0$aIntelligent Systems Reference Library,$x1868-4394 ;$v65 606 $aComputational intelligence 606 $aArtificial intelligence 606 $aApplication software 606 $aComputational Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/T11014 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aInformation Systems Applications (incl. Internet)$3https://scigraph.springernature.com/ontologies/product-market-codes/I18040 615 0$aComputational intelligence. 615 0$aArtificial intelligence. 615 0$aApplication software. 615 14$aComputational Intelligence. 615 24$aArtificial Intelligence. 615 24$aInformation Systems Applications (incl. Internet). 676 $a004.68 702 $aPanda$b Mrutyunjaya$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDehuri$b Satchidananda$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWang$b Gi-Nam$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910299471803321 996 $aSocial Networking$91945046 997 $aUNINA