• Nenhum resultado encontrado

[PDF] Top 20 Knowledge based Social Network Applications to Disaster Event Analysis

Has 10000 "Knowledge based Social Network Applications to Disaster Event Analysis" found on our website. Below are the top 20 most common "Knowledge based Social Network Applications to Disaster Event Analysis".

Knowledge based Social Network Applications to Disaster Event Analysis

Knowledge based Social Network Applications to Disaster Event Analysis

... According to many research findings, the analysis of social media information has been played as essential and important role for measuring situational awareness with respect to time and space ... See full document

6

Tolerance-based interaction: a new model targeting opinion formation and diffusion in social networks

Tolerance-based interaction: a new model targeting opinion formation and diffusion in social networks

... behind social network analysis is the quest for un- derstanding opinion formation and ...mechanisms based on thresholds which are either fixed or evolve according to a random process ... See full document

33

Enterprise Information Portals: Potential for Evaluating Research For Knowledge Management and Human Capital Assets Using Social Network Analysis

Enterprise Information Portals: Potential for Evaluating Research For Knowledge Management and Human Capital Assets Using Social Network Analysis

... solution to support organizations in their knowledge management ...seeks to explore the hidden potential of enterprise information portals to support knowledge management initiatives ... See full document

12

SOME CONCEPTUAL PROPERTIES FOR KNOWLEDGE MANAGEMENT SYSTEMS DESIGN

SOME CONCEPTUAL PROPERTIES FOR KNOWLEDGE MANAGEMENT SYSTEMS DESIGN

... determining knowledge flows in organizations to facilitate the communication, collaboration and innovation of others is Social Network Analysis ...mapping knowledge flows between ... See full document

8

Social Network Analysis for Insurance Fraud Detection

Social Network Analysis for Insurance Fraud Detection

... of applications, from uncovering human traffic rings, finding exploited children and solving complex finan- cial ...transactions, network traffic, weblogs and other dense, low-signal, disparate data into a ... See full document

61

A Load Balancer for Bursting Hadoop-based Network Analysis Jobs

A Load Balancer for Bursting Hadoop-based Network Analysis Jobs

... need to be stored and ...used to process such large data sets and is used by the big players to extract crucial information needed to better suit their customers’ ...designed to work on ... See full document

97

Economic implications of nonlinear pricing kernels

Economic implications of nonlinear pricing kernels

... close to each other (skewness equals ...compared to 0.1088). According to our previous analysis of the Taylor expansion of the Cressie Read functions, higher values of kurtosis when compared ... See full document

41

Education for sustainable development and climate change education: the potential of social network analysis based on twitter data

Education for sustainable development and climate change education: the potential of social network analysis based on twitter data

... with network data. Dependencies of networks need to be included in the models because they might be the main interest of analysis ...used to make inferences from network data are ... See full document

17

A Strategy for Enhancing Ethical Systems for Open Science? :: Brapci ::

A Strategy for Enhancing Ethical Systems for Open Science? :: Brapci ::

... buracos estruturais, grupos coesos, intermediações, capital social, inluência e difusão, entre outros. Ao incorporar de forma incremental o arcabouço conceitual desses fenômenos citados, a bioética poderia ser ... See full document

5

Historical evolution of the concept and of its practical application

Historical evolution of the concept and of its practical application

... of knowledge within applied psychology, which is linked to studies carried out by researchers coming from other areas – architects, geographers, anthropologists and sociologists interested in the ... See full document

9

Emerging alternatives to leadership and governance in a digital ecosystem

Emerging alternatives to leadership and governance in a digital ecosystem

... information based skills. Not so clear, the same happens to soft skills and the need to address new challenges in how we deal with human ...need to discuss emerging alternatives in a digital ... See full document

43

CRONY CAPITALISM IN MOZAMBIQUE: EVIDENCE FROM NETWORKS OF POLITICIANS AND BUSINESSMEN

CRONY CAPITALISM IN MOZAMBIQUE: EVIDENCE FROM NETWORKS OF POLITICIANS AND BUSINESSMEN

... connections to Frelimo were either given, or bought enterprises, in areas ranging from tourism to finance, which meant that members of the party moved from politics into the business world, or, as in the ... See full document

25

PROPOSAL OF A NATURAL DISASTER TRAINING PROGRAM BY CONSIDERING THE PREVIOUS VICTIMS’ PROFILE

PROPOSAL OF A NATURAL DISASTER TRAINING PROGRAM BY CONSIDERING THE PREVIOUS VICTIMS’ PROFILE

... natural disaster victims provided by the CEDEC - State Coordination of Civil Defense to establish the victims’ profile, and aims to discuss and to recommend more effective and adequate ... See full document

24

Wireless Sensor Network for Medical Applications

Wireless Sensor Network for Medical Applications

... Then specifying the host name of the computer on which the destination VPN server is running , or the IP Address , port number and virtual hub name. The proxy type of VPN server is direct TCP/IP connection (no proxy) ... See full document

11

An event-based model for contracts

An event-based model for contracts

... others. Event structures [17] can provide a basic semantic model for assume/guarantee rules, by interpreting the enabling b ⊢ a as the contract clause: “I will do a after you have done ...However, event ... See full document

8

An event-triggered smart sensor network architecture

An event-triggered smart sensor network architecture

... technology to an essentially distributed ...communication network. Thus, the traditional sensors based in the 4-20mA standard are being replaced by digital ...a network interface ... See full document

6

An Intelligent Knowledge Management System from a Semantic Perspective

An Intelligent Knowledge Management System from a Semantic Perspective

... slow to respond to ...Individual Knowledge Worker (IKW) who, in today’s competitive knowledge-based society, has a constant need to capture, categorize and locate/distribute ... See full document

10

A Structured methodology for business network design

A Structured methodology for business network design

... up to 60% of the alliances fail to meet their initial objectives [Ellis, 1996], in a clear indication that there is still a lot of work to be done regarding the creation and management of these ... See full document

8

A rank-based sequence aligner with applications in phylogenetic analysis.

A rank-based sequence aligner with applications in phylogenetic analysis.

... positives and the average distance of false negatives is not very high. Basically, only a few more bases are different from the source substring for the false negatives compared to the true positives. The highest ... See full document

18

A LIGHT-WEIGHT CRYPTOGRAPHY ANALYSIS FOR WIRELESS BASED HEALTHCARE APPLICATIONS

A LIGHT-WEIGHT CRYPTOGRAPHY ANALYSIS FOR WIRELESS BASED HEALTHCARE APPLICATIONS

... algorithm based on false acceptance rate and false rejection rate ...transform to the ECG ...used to differentiate the measurement of one patient from other ...used to characterize the ... See full document

7

Show all 10000 documents...