• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 230
  • 96
  • 33
  • 24
  • 24
  • 21
  • 16
  • 10
  • 6
  • 5
  • 3
  • 3
  • 2
  • 2
  • 2
  • Tagged with
  • 586
  • 586
  • 586
  • 106
  • 96
  • 88
  • 79
  • 55
  • 51
  • 50
  • 50
  • 48
  • 46
  • 45
  • 43
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Využití sociálních sítí v Competitive Intelligence / Social networks and CI

Skoumal, David January 2010 (has links)
Main thesis objective is in social network analysis. Theoretic will describe their origin, development and circumstances under which certain social networks were built. Part with analysis will concern in how to compete with business rivals using CI and will search techniques for proper facebook usage as a company's CI tool by rating of chosen fan facebook pages.
42

The Impact of Healthcare Provider Collaborations on Patient Outcomes: A Social Network Analysis Approach

Mina Ostovari (6611648) 15 May 2019 (has links)
<p>Care of patients with chronic conditions is complicated and usually includes large number of healthcare providers. Understanding the team structure and networks of healthcare providers help to make informed decisions for health policy makers and design of wellness programs by identifying the influencers in the network. This work presents a novel approach to assess the collaboration of healthcare providers involved in the care of patients with chronic conditions and the impact on patient outcomes. </p> <p>In the first study, we assessed a patient population needs, preventive service utilization, and impact of an onsite clinic as an intervention on preventive service utilization patterns over a three-year period. Classification models were developed to identify groups of patients with similar characteristics and healthcare utilization. Logistic regression models identified patient factors that impacted their utilization of preventive health services in the onsite clinic vs. other providers. Females had higher utilizations compared to males. Type of insurance coverages, and presence of diabetes/hypertension were significant factors that impacted utilization. The first study framework helps to understand the patient population characteristics and role of specific providers (onsite clinic), however, it does not provide information about the teams of healthcare providers involved in the care process. </p> <p>Considering the high prevalence of diabetes in the patient cohort of study 1, in the second study, we followed the patient cohort with diabetes from study 1 and extracted their healthcare providers over a two-year period. A framework based on the social network analysis was presented to assess the healthcare providers’ networks and teams involved in the care of diabetes. The relations between healthcare providers were generated based on the patient sharing relations identified from the claims data. A multi-scale community detection algorithm was used to identify groups of healthcare providers more closely working together. Centrality measures of the social network identified the influencers in the overall network and each community. Mail-order and retail pharmacies were identified as central providers in the overall network and majority of communities. This study presented metrics and approach for assessment of provider collaboration. To study how these collaborative relations impact the patients, in the last study, we presented a framework to assess impacts of healthcare provider collaboration on patient outcomes. </p> <p>We focused on patients with diabetes, hypertension, and hyperlipidemia due to their similar healthcare needs and utilization. Similar to the second study, social network analysis and a multi-scale community detection algorithm were used to identify networks and communities of healthcare providers. We identified providers who were the majority source of care for patients over a three-year period. Regression models using generalized estimating equations were developed to assess the impact of majority source of care provider community-level centrality on patient outcomes. Higher connectedness (higher degree centrality) and higher access (higher closeness centrality) of the majority source of care provider were associated with reduced number of inpatient hospitalization and emergency department visits. </p> <p>This research proposed a framework based on the social network analysis that provides metrics for assessment of care team relations using large-scale health data. These metrics help implementation experts to identify influencers in the network for better design of care intervention programs. The framework is also useful for health services researchers to assess impact of care teams’ relations on patient outcomes. </p> <br> <p> </p>
43

Proactive Identification of Cybersecurity Threats Using Online Sources

January 2019 (has links)
abstract: Many existing applications of machine learning (ML) to cybersecurity are focused on detecting malicious activity already present in an enterprise. However, recent high-profile cyberattacks proved that certain threats could have been avoided. The speed of contemporary attacks along with the high costs of remediation incentivizes avoidance over response. Yet, avoidance implies the ability to predict - a notoriously difficult task due to high rates of false positives, difficulty in finding data that is indicative of future events, and the unexplainable results from machine learning algorithms. In this dissertation, these challenges are addressed by presenting three artificial intelligence (AI) approaches to support prioritizing defense measures. The first two approaches leverage ML on cyberthreat intelligence data to predict if exploits are going to be used in the wild. The first work focuses on what data feeds are generated after vulnerability disclosures. The developed ML models outperform the current industry-standard method with F1 score more than doubled. Then, an approach to derive features about who generated the said data feeds is developed. The addition of these features increase recall by over 19% while maintaining precision. Finally, frequent itemset mining is combined with a variant of a probabilistic temporal logic framework to predict when attacks are likely to occur. In this approach, rules correlating malicious activity in the hacking community platforms with real-world cyberattacks are mined. They are then used in a deductive reasoning approach to generate predictions. The developed approach predicted unseen real-world attacks with an average increase in the value of F1 score by over 45%, compared to a baseline approach. / Dissertation/Thesis / Doctoral Dissertation Computer Science 2019
44

A Social Network Analysis of Drunkorexia in A Sorority

Miljkovic, Kristina 15 April 2022 (has links)
No description available.
45

Analýza odvozených sociálních sítí / Analysis of Inferred Social Networks

Lehončák, Michal January 2021 (has links)
Analysis of Inferred Social Networks While the social network analysis (SNA) is not a new science branch, thanks to the boom of social media platforms in recent years new methods and approaches appear with increasing frequency. However, not all datasets have network structure visible at first glance. We believe that every reasonable interconnected system of data hides a social network, which can be inferred using specific methods. In this thesis we examine such social network, inferred from the real-world data of a smaller bank. We also review some of the most commonly used methods in SNA and then apply them on our complex network, expecting to find structures typical for traditional social networks.
46

Datamining sociálních sítí / Datamining of social networks

Kubelka, Martin January 2012 (has links)
This paper is about application of various data mining methods in social networks and social media area. It reveals basic principles of social media with the aim to high information potential of usage of the data from social networks. This is demonstrated on selected data mining methods, especially Social Network Analysis and Sentiment Analysis. Other opportunities of using social media data are shown in chapter about Social Media Monitoring tools. All these chapters are supplemented by practical examples and particular researches. Last chapter reveals visions and threats, which can bring data mining in the future. Keywords Data mining, social networks, social media, social network analysis, sentiment analysis, social media monitoring
47

Effective and Efficient Methodologies for Social Network Analysis

Pan, Long 16 January 2008 (has links)
Performing social network analysis (SNA) requires a set of powerful techniques to analyze structural information contained in interactions between social entities. Many SNA technologies and methodologies have been developed and have successfully provided significant insights for small-scale interactions. However, these techniques are not suitable for analyzing large social networks, which are very popular and important in various fields and have special structural properties that cannot be obtained from small networks or their analyses. There are a number of issues that need to be further studied in the design of current SNA techniques. A number of key issues can be embodied in three fundamental and critical challenges: long processing time, large computational resource requirements, and network dynamism. In order to address these challenges, we discuss an anytime-anywhere methodology based on a parallel/distributed computational framework to effectively and efficiently analyze large and dynamic social networks. In our methodology, large social networks are decomposed into intra-related smaller parts. A coarse-level of network analysis is built based on comprehensively analyzing each part. The partial analysis results are incrementally refined over time. Also, during the analyses process, network dynamic changes are effectively and efficiently adapted based on the obtained results. In order to evaluate and validate our methodology, we implement our methodology for a set of SNA metrics which are significant for SNA applications and cover a wide range of difficulties. Through rigorous theoretical and experimental analyses, we demonstrate that our anytime-anywhere methodology is / Ph. D.
48

THE EFFECTS OF COLLABORATION ON THE RESILIENCE OF THE ENTERPRISE: A NETWORK-ANALYTIC APPROACH

Randall, Christian Eric 21 May 2013 (has links)
No description available.
49

On a Potential New Measurement of the Self-Concept

Nahlik, Brady J. 04 October 2021 (has links)
No description available.
50

Why Can’t We Be Friends? Exploring Short-term Peer Selection and Peer Influence Dynamics Using Longitudinal Social Network Analysis

Peterson, Samuel 15 December 2017 (has links)
No description available.

Page generated in 0.1341 seconds