Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Social media data for conservation science: A methodological overview
Improved understanding of human-nature interactions is crucial to conservation science and
practice, but collecting relevant data remains challenging. Recently, social media have …
practice, but collecting relevant data remains challenging. Recently, social media have …
Human mobility: Models and applications
Recent years have witnessed an explosion of extensive geolocated datasets related to
human movement, enabling scientists to quantitatively study individual and collective …
human movement, enabling scientists to quantitatively study individual and collective …
Consumer privacy and the future of data-based innovation and marketing
Digitization makes it easier for firms to build their innovation and marketing efforts around
consumers' personal data. In this research, we employ a privacy perspective based on …
consumers' personal data. In this research, we employ a privacy perspective based on …
Friendship and mobility: user movement in location-based social networks
Even though human movement and mobility patterns have a high degree of freedom and
variation, they also exhibit structural patterns due to geographic and social constraints …
variation, they also exhibit structural patterns due to geographic and social constraints …
Bitcoin and blockchain: Security and privacy
Blockchain is a technology that was proposed to enable the decentralized digital currency,
Bitcoin. Since its inception, blockchain has been widely used in many other areas, including …
Bitcoin. Since its inception, blockchain has been widely used in many other areas, including …
An analysis of anonymity in the bitcoin system
F Reid, M Harrigan - Security and privacy in social networks, 2012 - Springer
Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue.
Within the system, users are identified only by public-keys. An attacker wishing to de …
Within the system, users are identified only by public-keys. An attacker wishing to de …
[LLIBRE][B] Data Science for Business: What you need to know about data mining and data-analytic thinking
F Provost, T Fawcett - 2013 - books.google.com
Written by renowned data science experts Foster Provost and Tom Fawcett, Data Science for
Business introduces the fundamental principles of data science, and walks you through the" …
Business introduces the fundamental principles of data science, and walks you through the" …
Structural diversity in social contagion
The concept of contagion has steadily expanded from its original grounding in epidemic
disease to describe a vast array of processes that spread across networks, notably social …
disease to describe a vast array of processes that spread across networks, notably social …
[HTML][HTML] Can co-location be used as a proxy for face-to-face contacts?
Technological advances have led to a strong increase in the number of data collection
efforts aimed at measuring co-presence of individuals at different spatial resolutions. It is …
efforts aimed at measuring co-presence of individuals at different spatial resolutions. It is …
A tale of many cities: universal patterns in human urban mobility
The advent of geographic online social networks such as Foursquare, where users
voluntarily signal their current location, opens the door to powerful studies on human …
voluntarily signal their current location, opens the door to powerful studies on human …