Presents an analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek).
Leading technology scholars examine how networks powered by algorithms are transforming humanity, posing deep questions about power, freedom, and fairness.
Leading technology scholars examine how networks powered by algorithms are transforming humanity, posing deep questions about power, freedom, and fairness.
Presents an analysis and visualization of social networks integrating theory, applications, and professional software for performing network analysis (Pajek).
Segredos do Marketing na Internet Guia para iniciantes de como usar o marketing na Internet para promover online Espero que considere esta informação útil, lucrativa e que ajude.
Our book, Future of Tech Startups and Innovations in the Age of AI, mainly focuses on artificial intelligence (AI) tools, AI-based startups, AI-enabled innovations, Autonomous AI Agents (Auto-GPT), AI-based marketing startups, machine learning for organizations, AI-internet of things (IoT) for new tech companies, AI-enabled drones for agriculture industry, machine learning (ML)/deep learning (DL)-based drip farming, AI-based driverless cars, AI-based weather prediction startups, AI tools for personal branding, AI-based teaching, AI-based doctor/hospital startups, AI for game companies, AI-based finance tools, AI for human resource management, AI-powered management tools, AI tools for future pandemics, AI/ML-based transportation companies, AI for media, AI for carrier counseling, AI for customer care, AI for next generation businesses, and many more applications.
Difficult Heritage and Immersive Experiences examines the benefits involved in designing and employing immersive technologies to reconstruct difficult pasts at heritage sites around the world.
Difficult Heritage and Immersive Experiences examines the benefits involved in designing and employing immersive technologies to reconstruct difficult pasts at heritage sites around the world.
Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned the Index Thomisticus-a preeminent project of the incunabular digital humanities-and advanced the data-foundations of computing in the Humanities.
Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned the Index Thomisticus-a preeminent project of the incunabular digital humanities-and advanced the data-foundations of computing in the Humanities.
Real-Time Video Content for Virtual Production & Live Entertainment looks at the evolution of current software and hardware, how these tools are used, and how to plan for productions dependent on real-time content.
Real-Time Video Content for Virtual Production & Live Entertainment looks at the evolution of current software and hardware, how these tools are used, and how to plan for productions dependent on real-time content.
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology.
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology.
Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks.
Network traffic has fractal properties such as impulsiveness, selfsimilarity, and long-range dependence over several time scales, from milliseconds to minutes.
Network traffic has fractal properties such as impulsiveness, selfsimilarity, and long-range dependence over several time scales, from milliseconds to minutes.
Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks.
The Internet of things (IoT) is a network of connected physical objects or things that are working along with sensors, wireless transceiver modules, processors, and software required for connecting, processing, and exchanging data among the other devices over the Internet.
The Internet of things (IoT) is a network of connected physical objects or things that are working along with sensors, wireless transceiver modules, processors, and software required for connecting, processing, and exchanging data among the other devices over the Internet.
Why efforts to moderate harmful content on social media fail to stop extremistsContent moderation on social media has become one of the most daunting challenges of our time.
This comprehensive and timely book, New Age Analytics: Transforming the Internet through Machine Learning, IoT, and Trust Modeling, explores the importance of tools and techniques used in machine learning, big data mining, and more.