Network Meta-analysis White, Ian R.
The Stata journal,
12/2015, Volume:
15, Issue:
4
Journal Article
Peer reviewed
Open access
Network meta-analysis is a popular way to combine results from several studies (usually randomized trials) comparing several treatments or interventions. It has usually been performed in a Bayesian ...setting, but recently it has become possible in a frequentist setting using multivariate meta-analysis and meta-regression, implemented in Stata with mvmeta. I describe a suite of Stata programs for network meta-analysis that perform the necessary data manipulation, fit consistency and inconsistency models using mvmeta, and produce various graphics.
Computers have changed not just the way we work but the way we love. Falling in and out of love, flirting, cheating, even having sex online have all become part of the modern way of living and ...loving. Yet we know very little about these new types of relationship. How is an online affair where the two people involved may never see or meet each other different from an affair in the real world? Is online sex still cheating on your partner? Why do people tell complete strangers their most intimate secrets? What are the rules of engagement? Will online affairs change the monogamous nature of romantic relationships? These are just some of the questions Professor Aaron Ben Ze'ev, distinguished writer and academic, addresses in this 2004 book, a full-length study of love online. Accessible, shocking, entertaining, enlightening, this book will change the way you look at cyberspace and love forever.
Coming of Age in Second Life Boellstorff, Tom
2015, 2008., 20150825, 2005, 2008-12-31, 2015-08-25, 20080101
eBook
Millions of people around the world today spend portions of their lives in online virtual worlds. Second Life is one of the largest of these virtual worlds. The residents of Second Life create ...communities, buy property and build homes, go to concerts, meet in bars, attend weddings and religious services, buy and sell virtual goods and services, find friendship, fall in love—the possibilities are endless, and all encountered through a computer screen. Coming of Age in Second Life is the first book of anthropology to examine this thriving alternate universe. Tom Boellstorff conducted more than two years of fieldwork in Second Life, living among and observing its residents in exactly the same way anthropologists traditionally have done to learn about cultures and social groups in the so-called real world. He conducted his research as the avatar "Tom Bukowski," and applied the rigorous methods of anthropology to study many facets of this new frontier of human life, including issues of gender, race, sex, money, conflict and antisocial behavior, the construction of place and time, and the interplay of self and group.
The adoption of network traffic encryption is continually growing. Popular applications use encryption protocols to secure communications and protect the privacy of users. In addition, a large ...portion of malware is spread through the network traffic taking advantage of encryption protocols to hide its presence and activity. Entering into the era of completely encrypted communications over the Internet, we must rapidly start reviewing the state-of-the-art in the wide domain of network traffic analysis and inspection, to conclude if traditional traffic processing systems will be able to seamlessly adapt to the upcoming full adoption of network encryption. In this survey, we examine the literature that deals with network traffic analysis and inspection after the ascent of encryption in communication channels. We notice that the research community has already started proposing solutions on how to perform inspection even when the network traffic is encrypted and we demonstrate and review these works. In addition, we present the techniques and methods that these works use and their limitations. Finally, we examine the countermeasures that have been proposed in the literature in order to circumvent traffic analysis techniques that aim to harm user privacy.
Network coding (NC) is a technique used for effective and secure communication by improving the network capacity, throughput, efficiency, and robustness. In NC, data packets are encoded by ...intermediate nodes and are then decoded at the destination nodes. NC has been successfully applied in a variety of networks including relay networks, peer-to-peer networks, wireless networks, cognitive radio networks, and wireless sensor networks. Cognitive radio network (CRN) is an emerging field which exploits the utilization of unused spectrum or white spaces, effectively and efficiently. In CRNs, NC schemes are also applied to maximize the spectrum utilization, as well as to maintain the effective and secure transmission of data packets over the network. In this paper, we provide a comprehensive survey of NC schemes in cognitive radio networks, highlighting the motivations for and the applications of NC in CRNs. We provide typical case studies of NC schemes in CRNs, as well as the taxonomy of NC schemes in CRNs. Finally, we present open issues, challenges, and future research directions related with NC in cognitive radio networks.
This open access book constitutes the proceedings of the 8th International Joint Conference on Electronic Voting held in Luxemburg in October 2023. The conference collected the most relevant debates ...on the development of Electronic Voting, from aspects relating to security and usability through to practical experiences and applications of voting systems, also including legal, social, or political aspects, amongst others. The 9 full papers presented were carefully reviewed and selected from 38 submissions. The selected papers cover a wide range of topics connected with electronic voting, including experiences and revisions of the actual uses of E-voting systems and corresponding processes in elections.
Network analysis and tourism Scott, Noel; Baggio, Rodolfo; Cooper, Chris
2008., 2008, 2008-06-09, Volume:
35
eBook
Provides a comprehensive review of the contribution of network analysis to the understanding of tourism destinations and organizations. This work It discusses both the theoretical and methodological ...underpinnings of network analysis and then illustrates the relevance of this approach in a series of tourism applications.
Social Network Analysis (SNA) has been a popular field of research since the early 1990s. Law enforcement agencies have been utilizing it as a tool for intelligence gathering and criminal ...investigation for decades. However, the graph nature of social networks makes it highly restricted to intelligence analysis tasks, such as role prediction (node classification), social relation inference (link prediction), and criminal group discovery (community detection), etc. In the past few years, many studies have focused on Graph Neural Network (GNN), which utilizes deep learning methods to solve graph-related problems. However, we have rarely seen GNNs tackle time-evolving social network problems, especially in the criminology field. The existing studies have commonly over-looked the temporal-evolution characteristics of social networks. In this paper, we propose a graph neural network framework, namely Spatial-Temporal Graph Social Network (STGSN), which models social networks from both spatial and temporal perspectives. Using a novel approach, we leverage the temporal attention mechanism to capture social networks’ temporal features. We design a method analyzing temporal attention distribution to improve the interpretation ability of our method. In the end, we conduct extensive experiments on six public datasets to prove our methods’ effectiveness.
Joined-up healthcare makes information available when and where it is needed to improve safety, efficiency and effectiveness. Politicians may take interoperability between healthcare computer systems ...for granted, but it is non-trivial. Healthcare integration projects are notoriously under-estimated and come in over-budget and over-time. Joined-up healthcare depends on standards. The two leading standards are the SNOMED CT, which is a clinical terminology (semantics) and HL7 Version 3, which is a specialised healthcare interoperability language (syntax). Both are new, complex and fit for purpose.Tim Benson believes there is an unmet need for a book on Healthcare Integration. Some health informatics textbooks include chapters on HL7 and/or SNOMED, but these are usually quite short and cannot provide even an adequate introduction. There is little of much value on the Internet, or in journals or conference proceedings.
How does Google sell ad space and rank webpages? How does Netflix recommend movies and Amazon rank products? How can you influence people on Facebook and Twitter and can you really reach anyone in ...six steps? Why doesn't the Internet collapse under congestion and does it have an Achilles' heel? Why are you charged per gigabyte for mobile data and how can Skype and BitTorrent be free? How are cloud services so scalable and why is WiFi slower at hotspots than at home? Driven by twenty real-world questions about our networked lives, this book explores the technology behind the multi-trillion dollar Internet and wireless industries. Providing easily understandable answers for the casually curious, alongside detailed explanations for those looking for in-depth discussion, this thought-provoking book is essential reading for students in engineering, science and economics, for network industry professionals and anyone curious about how technological and social networks really work.