Detecting changes in context using time series analysis of social network
Researchers are getting great benefits of big data as information gathered from social media like Facebook, Twitter and being used to perceive the lot from family planning to predicting postpartum depression. Detecting behavioral changes in social networks represents an exciting new area of this pr...
| Main Authors: | Nusratullah , Kajal, Shah , Asadullah, Ahmad Khan, Shoab, Haider Butt, Wasi |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2015
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/49209/ http://irep.iium.edu.my/49209/2/kajal-paper-2015.pdf |
Similar Items
Detecting change from social networks using temporal analysis of email data
by: Nusratullah, Kajal, et al.
Published: (2018)
by: Nusratullah, Kajal, et al.
Published: (2018)
Contribution of cloud computing in the reduction of carbon dioxide emission
by: Khan, Nusratullah, et al.
Published: (2014)
by: Khan, Nusratullah, et al.
Published: (2014)
Identification of valued users to generate more telecom filigence
by: Khan, N., et al.
Published: (2018)
by: Khan, N., et al.
Published: (2018)
Important attributes of customer satisfaction in telecom industry: a survey based study
by: Khan, Nusratullah, et al.
Published: (2017)
by: Khan, Nusratullah, et al.
Published: (2017)
Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes
by: Khan, Nusratullah, et al.
Published: (2018)
by: Khan, Nusratullah, et al.
Published: (2018)
Relation mining using cross correlation of multi domain social networks
by: Noor, Fozia, et al.
Published: (2015)
by: Noor, Fozia, et al.
Published: (2015)
Visualization: a tool to study nodes in multi-dimensional networks
by: Noor, Fozia, et al.
Published: (2019)
by: Noor, Fozia, et al.
Published: (2019)
Key individual identification using dimensional relevance in the stratum of networks
by: Shah, Asadullah, et al.
Published: (2019)
by: Shah, Asadullah, et al.
Published: (2019)
Deployment of social nets in multi-layer model to identify Key individuals using majority voting
by: Shah, Asadullah
Published: (2019)
by: Shah, Asadullah
Published: (2019)
Modeling user’s trust in M-commerce acceptance: A conceptual framework in context of Pakistan
by: Rind, M Malook, et al.
Published: (2016)
by: Rind, M Malook, et al.
Published: (2016)
A model for real-time recognition and textual representation of Malaysian sign language through image processing
by: Karabasi, Mostafa, et al.
Published: (2013)
by: Karabasi, Mostafa, et al.
Published: (2013)
Artifact evaluation in information systems design science research: social constructivism environment
by: Ataie, Farib, et al.
Published: (2017)
by: Ataie, Farib, et al.
Published: (2017)
The effect of web-based social networking on consultancy
by: Shaikh, Humaiz, et al.
Published: (2019)
by: Shaikh, Humaiz, et al.
Published: (2019)
Prediction-based resource allocation model for real time tasks
by: Qureshi, Muhammad Shuaib, et al.
Published: (2018)
by: Qureshi, Muhammad Shuaib, et al.
Published: (2018)
Analysis determinants of social media acceptance in higher educational institution of Pakistan
by: Raza, Ali, et al.
Published: (2018)
by: Raza, Ali, et al.
Published: (2018)
Real-Time personalized stress detection from physiological signals
by: Syazani, Muhammad, et al.
Published: (2015)
by: Syazani, Muhammad, et al.
Published: (2015)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
A comparative analysis of resource allocation schemes for real-time services in high-performance computing systems
by: Qureshi, Muhammad Shuaib, et al.
Published: (2020)
by: Qureshi, Muhammad Shuaib, et al.
Published: (2020)
A methodology for modelling and analysis of secure systems using security patterns and mitigation use cases
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
by: Maher, Zulfikar Ahmad, et al.
Published: (2018)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Pervasive learning using cloud computing
by: Shah, Asadullah
Published: (2015)
by: Shah, Asadullah
Published: (2015)
Metrics for computing performance of data center for instigating Energy Efficient Data center
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
A framework for for the analysis of determinants of social media acceptance in higher educational institutions of Pakistan
by: Soomro, Ali Raza, et al.
Published: (2015)
by: Soomro, Ali Raza, et al.
Published: (2015)
Energy efficiency in virtualized data center
by: Karamat Khan, Tehmina, et al.
Published: (2018)
by: Karamat Khan, Tehmina, et al.
Published: (2018)
Differential image compression for telemedicine: a novel approach
by: Khan, Adnan Alam, et al.
Published: (2011)
by: Khan, Adnan Alam, et al.
Published: (2011)
An appraisal of off-line signature verification techniques
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
A computer vision-based alarming system for
real-time detection of driver sleep
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
An empirical investigation of factors influencing user satisfaction with online services of mobile communication providers: study of Kuwait
by: Alzabi, Tami, et al.
Published: (2015)
by: Alzabi, Tami, et al.
Published: (2015)
Mobile online services and measuring user satisfaction: study of Kuwait
by: Shah, Asadullah, et al.
Published: (2015)
by: Shah, Asadullah, et al.
Published: (2015)
Predicting the fraud volume in personal computer using different web browsers
by: Z, Nuha, et al.
Published: (2017)
by: Z, Nuha, et al.
Published: (2017)
A Web 2.0-based collaborative learning to promote the practices of Islam as a way of life
by: Ataie, Fariba, et al.
Published: (2019)
by: Ataie, Fariba, et al.
Published: (2019)
Gender and mobile payment system adoption among students of tertiary institutions in Nigeria
by: Hamza, Aminu, et al.
Published: (2014)
by: Hamza, Aminu, et al.
Published: (2014)
Managing flood in the context of education, research and partnership in Malaysia
by: Maidin, Siti Sarah, et al.
Published: (2019)
by: Maidin, Siti Sarah, et al.
Published: (2019)
Forensic analysis of offline signature using multi-layer perception and random forest
by: Shah, Abdul Salam, et al.
Published: (2017)
by: Shah, Abdul Salam, et al.
Published: (2017)
Predicting the fraud volume in the advent of internet enabled handheld devices
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
by: Zammarah, Nuha Abdullah, et al.
Published: (2015)
An applications development for record keeping of police stations in Pakistan
by: Shah, Abdul Salam, et al.
Published: (2015)
by: Shah, Abdul Salam, et al.
Published: (2015)
Risk management policies of telecommunication and engineering laboratories
by: Shah, Abdul Salam, et al.
Published: (2016)
by: Shah, Abdul Salam, et al.
Published: (2016)
Critical insight for MAPReduce optimization in Hadoop
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
Manifestation and mitigation of node misbehaviour in adhoc networks
by: Khan, Burhan ul Islam, et al.
Published: (2014)
by: Khan, Burhan ul Islam, et al.
Published: (2014)
User experience in mobile application design: utility defined context of use
by: Lubis, Muharman, et al.
Published: (2019)
by: Lubis, Muharman, et al.
Published: (2019)
Similar Items
-
Detecting change from social networks using temporal analysis of email data
by: Nusratullah, Kajal, et al.
Published: (2018) -
Contribution of cloud computing in the reduction of carbon dioxide emission
by: Khan, Nusratullah, et al.
Published: (2014) -
Identification of valued users to generate more telecom filigence
by: Khan, N., et al.
Published: (2018) -
Important attributes of customer satisfaction in telecom industry: a survey based study
by: Khan, Nusratullah, et al.
Published: (2017) -
Calculating customer experience management index for telecommunication service using genetic algorithm based weighted attributes
by: Khan, Nusratullah, et al.
Published: (2018)