In the past years, the importance of a good health care system has gained new dimensions. As studies show, the number of elderly people in the world is increasing, which brings to the surface the need for an efficient system for the treatment of patients. Furthermore, the use of IT tools may have a positive effect on the implementation of these health care systems - through the use of remote homecare, for instance, which is the context of the present work. We propose, in this sense, a platform which consists of a social network directed to remote homecare patients. Inside this network, these patients may interact among themselves and share ideas through a contribution system, which can work as a source of information and motivation. Moreover, the usage of such social network aims on helping by diminishing the social reclusion which may be brought by a remote homecare system. Such social network has been designed, implemented, analysed and validated and details on all of the aforementioned processes is present in this document.
Mobile devices are considered to be the next logical step in social networking as they become more pervasive and are able to establish direct communication with each other. Mobile social networking is a new movement in social networking as people have membership of both a virtual community through an online social network environment, and a physical community where they are located. A move in mobile social networking is the decentralised exploration of friendships. Short-range wireless protocols like Bluetooth enable collaborative applications between mobile devices of users. Unlike conventional centralised social networks that rely upon a central authority to organise the opinions of each member of the social network and protect their personal information, members of a decentralised network are completely autonomous and responsible for their own individual behaviour. When people meet for the first time, they thus need help to determine if they can trust each other. This book presents BlueTrust, a trust model for use in decentralised mobile social networks. BlueTrust focuses on establishing trust between users in close proximity by computing trust levels to support user interaction.
Microcontroller has been a heart of all electronic products. In this book, a design and development work has been presented where microcontroller has been used to construct a large electronic display board. The designed board is also controlled from remote locations through LAN. This book contains all the algorithms needed to implement the project. Besides, fundamental of Microcontroller and Networking has been described elaborately. This book would be a best guide for them who is the beginner in the field of microcontroller based embedded system design as well as network based controlled system design.
In spite of various research efforts on World Wide Web as a social network few attentions have been given for a micro-level study and analysis of the structure of the Web graph from the perspective of social network analysis and graph theory.Apart from the structural properties of Web graph the study of the properties of its pages or nodes are necessary to provide content information that can yield valuable insights about the underlying social networks.However, in some Web-based social network applications, there can be a need for simultaneous retrieval of both structural and node-based information.So,it is necessary to design a data model for storage and retrieval of both structural and node-based information. Again,for evolutionary Web graph the data model should be temporal.In this monograph, the design of a new generic and comprehensive data model proposed to meet the mentioned requirements.The novel techniques associated with this design and processing for structural, node-based and composite queries discussed.This book can help social or information scientists,online marketing professionals or anyone associated with popular research on social networking for better analysis.
We focus on the trust relationships between the agents’ interactions. Agents make a trust decision before interacting, and this decision among other factors is based on an estimation of another agent’s reputation. A reputation management system collects and analyzes interactions experience between agents. We suggest evaluation criteria for a trust or reputation management systems’ evaluation. We implement a generic tool which can plug in a trust or reputation management algorithm and simulate the behaviour of the multiagent system where every agent follows the same algorithm. We illustrate the tool’s support for some of the suggested evaluation criteria. We provide some recommendations for further development of the generic tool for evaluating and comparing the above-mentioned behaviour characteristics of different trust and reputation management algorithms.
The book provides a synthesis of the very heterogeneous social network literature. In doing so, it proposes a research methodology for a systematic literature review: Content Analysis in conjunction with Multiple Correspondence Analysis and Cluster Analysis. The need for such a procedure emerges when literature in a particular area is characterized by an internal diversity of approaches and disagreements over the definitions of its fundamental concepts. This is the case of social network studies where such a diversity stimulates a question about the existence of a substantial network theory. The book represents an attempt to answer to such a question. After having investigated the lines of development of social network analysis and provided a sociological explanation of strategic and organizational phenomena in network terms, the work presents a systematic classification of the network effects as recognized by literature and a typology of network studies which identifies 5 different clusters. The results of the study seem to confirm the existence of a substantial, general concept beyond social network studies, the one of social capital.
In mobile ad hoc network (MANET) where security is a crucial issue, trust plays an important factor that could improve the number of successful data transmission process. The higher the numbers of nodes that trust each other in the network means higher successful communication process rate could be expected. To determine trust, there are several criteria need to be considered. These criteria can be used to represent each node's trust properties in the trust evaluation process prior to initiating certain packet forwarding task. By introducing a good trust calculation model, we can establish secure route between source and destination without any intruders or malicious nodes. The aim of this book is to emphasis on the use of trust concept to enhance the security by calculating proportion based trust in a global manner. It helps in computing the trust in neighbors and selecting the most secure route from the available ones for the data transfer. In the proposed model, trust is not calculated for any particular situation instead, it is computed based on a summary of behavior of the node for a specific amount of period.
Banks in India operate in a very different lending environment as compared to western banks. The government owns many banks in India and state intervention in bank lending is considerable in India. Conventional instrument based methods of risk evaluation have limited use for banks in India. This book uses a social risk evaluation process based on the notion of social capital and trust to examine the structure and working of Indian bank branches. The role of trust in the relationship between branch managers and loan officers is critically studied. A framework of trust between branch managers and loan officers is developed. According to this framework, a branch manager and a loan officer develop a trusting relationship because both branch manager and loan officer have incentive to trust each other due to risk in lending. Trust between branch managers and loan officers of bank branches depends on seven characteristics of trust. Trust contributes significantly to the improvement of lending performance of bank branches in India. The conclusions arrived in this study have important implications for the management of banks.
This book provides an introduction, discussion, and formal-based modelling of trust theory and its applications in agent-based systems This book gives an accessible explanation of the importance of trust in human interaction and, in general, in autonomous cognitive agents including autonomous technologies. The authors explain the concepts of trust, and describe a principled, general theory of trust grounded on cognitive, cultural, institutional, technical, and normative solutions. This provides a strong base for the author’s discussion of role of trust in agent-based systems supporting human-computer interaction and distributed and virtual organizations or markets (multi-agent systems). Key Features: Provides an accessible introduction to trust, and its importance and applications in agent-based systems Proposes a principled, general theory of trust grounding on cognitive, cultural, institutional, technical, and normative solutions. Offers a clear, intuitive approach, and systematic integration of relevant issues Explains the dynamics of trust, and the relationship between trust and security Offers operational definitions and models directly applicable both in technical and experimental domains Includes a critical examination of trust models in economics, philosophy, psychology, sociology, and AI This book will be a valuable reference for researchers and advanced students focused on information and communication technologies (computer science, artificial intelligence, organizational sciences, and knowledge management etc.), as well as Web-site and robotics designers, and for scholars working on human, social, and cultural aspects of technology. Professionals of ecommerce systems and peer-to-peer systems will also find this text of interest.
People initially used system like SCADA and PLC''s for home,industrial automation purposes and for security applications, but for today''s world when people want access and monitoring from remote location, mobile networks can be a good option. This work is for design a low cost system which use a mobile phone (particularly SMS service of GSM)to monitor temperature from a remote location. To achieve the objective a micro controller-based sms module is designed to interface a mobile phone via serial cable to form a wireless temperature monitor system. SMS is used to interact with the mobile phone which in turn interacts with the module. The module connected to a temperature sensor which is used to acquire temperature information, the module sends temperature information to remote user via SMS. Here the module GSM mobile- micro-controller interface system utilized the existing GSM''s SMS service with low-cost hardware equipment to create a system for remote monitoring. For communication between mobile and micro-controller here AT commands (specified by Standard GSM 07.05) are used. The system can be monitored via SMS from anywhere that is covered by GSM service.
A top social media guru shares the secrets to expanding your business through relationships People have always done business with people they know, like, and trust. That's the essence of «relationship marketing.» Today, the popularity of online social networking has caused a paradigm shift in relationship marketing. This book helps businesspeople and marketers master this crucial new skill set. Social marketing expert Mari Smith outlines a step-by-step plan for building a sizable, loyal network comprised of quality relationships that garner leads, publicity, sales,, and more. If you're a businessman or businesswoman feeling the pressure to shift your approach to using social media marketing, to better understand the new soft skills required for success on the social web, and to improve your own leadership and relationship skills through emotional and social intelligence, this book is for you. Outlines how to become a significant «center of influence» for your customers and prospects Explains the unspoken rules of online etiquette—and the common «turnoffs» that drive customers and potential partners away Details the unique cultures of Facebook, Twitter, and other popular online platforms Shows exactly what to automate and delegate to build your social media persona, yet still retain the personal touch Even if you currently have zero presence online, this book will help you see measurable results in a short time.
Programmable Logic Controllers (PLCs) are electronic devices which can be found everywhere nowdays. This reason motivates the creation of a system to allow the possibility to know the data stored in a PLC, not necessarily being next to it. This remote management system is based on a PC and a PLC, connected to Internet via Ethernet. The objective is that these two devices are able to exchange information by means of a communication protocol. For this purpose, a function-blocks (FBs) library has been created according to the IEC 61131-1 standard, which allows to archive the data in the memory of the PLC, among many other interesting functionalities. It has been also created a PC application, which will work as a human-machine interface (HMI). A TCP based communication protocol has also been implemented to allow transference the data between devices via Ethernet.
Here we are present the taxonomy that consists of the specification of an intruder. Taxonomy provides the mechanism for attacks on the system that is based on host or network. The process can understand the characteristics and nature of an intruder. For creating possibilities of attack, using the system attributes like port id, system log, and path taken over the network, etc. Provides the detection mechanism which is used the pattern and using threshold values. For all these things about creating an intrusion we design a best taxonomy
The Internet and, in particular, the web has enabled a communication revolution. Online social networks have emerged and become increasingly popular. It is a new concept and most of its aspects and elements have yet not been discussed. The preset book new discusses two concepts of Social network citizenship behavior and online social network service quality and their relationships with social network brand personality. This study presumes that there is a significant relationship between social network's citizen's attitude towards social network services and brand personality of them. Therefore, it applies LinkedIn as one of the largest social network and designs a proposed model to test hypotheses through SEM method. This book sheds light on the new and exciting social networks area and helps socialist, marketers, managers, and anyone else who may find the field of online social networks attractive.
MOHMED has done an excellent job. I would recommend his book to all students and researchers working with applied information technology as ready reference for a very intuitive under-standing of many basic information technology concepts . Asso.prof. DHANOON The University Putra Malaysia Updated to maintain the industry currency and academic relevance. social network tools for corporate business continues to provide an overview of social network form corporate business perspective .as will as a thorough understanding of the administration of social network .