ورود به حساب

نام کاربری گذرواژه

گذرواژه را فراموش کردید؟ کلیک کنید

حساب کاربری ندارید؟ ساخت حساب

ساخت حساب کاربری

نام نام کاربری ایمیل شماره موبایل گذرواژه

برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید


09117307688
09117179751

در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید

دسترسی نامحدود

برای کاربرانی که ثبت نام کرده اند

ضمانت بازگشت وجه

درصورت عدم همخوانی توضیحات با کتاب

پشتیبانی

از ساعت 7 صبح تا 10 شب

دانلود کتاب Social Networking and Computational Intelligence: Proceedings of SCI-2018 (Lecture Notes in Networks and Systems, 100)

دانلود کتاب شبکه های اجتماعی و هوش محاسباتی: مجموعه مقالات SCI-2018 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 100)

Social Networking and Computational Intelligence: Proceedings of SCI-2018 (Lecture Notes in Networks and Systems, 100)

مشخصات کتاب

Social Networking and Computational Intelligence: Proceedings of SCI-2018 (Lecture Notes in Networks and Systems, 100)

ویرایش:  
نویسندگان: , , , ,   
سری:  
ISBN (شابک) : 9811520704, 9789811520709 
ناشر: Springer 
سال نشر: 2020 
تعداد صفحات: 789 
زبان: English 
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) 
حجم فایل: 26 مگابایت 

قیمت کتاب (تومان) : 55,000



ثبت امتیاز به این کتاب

میانگین امتیاز به این کتاب :
       تعداد امتیاز دهندگان : 10


در صورت تبدیل فایل کتاب Social Networking and Computational Intelligence: Proceedings of SCI-2018 (Lecture Notes in Networks and Systems, 100) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.

توجه داشته باشید کتاب شبکه های اجتماعی و هوش محاسباتی: مجموعه مقالات SCI-2018 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 100) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.


توضیحاتی در مورد کتاب شبکه های اجتماعی و هوش محاسباتی: مجموعه مقالات SCI-2018 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 100)

این کتاب مجموعه‌ای از نسخه‌های اصلاح‌شده و توسعه‌یافته از بهترین مقالات اولین کنفرانس بین‌المللی شبکه‌های اجتماعی و هوش محاسباتی (SCI-2018)، که در بوپال، هند، از 5 تا 6 اکتبر 2018 برگزار شد، ارائه می‌کند. پیشرفت های اخیر در پیشرفت های علمی و کاربردها در این زمینه ها.


توضیحاتی درمورد کتاب به خارجی

This book presents a selection of revised and extended versions of the best papers from the First International Conference on Social Networking and Computational Intelligence (SCI-2018), held in Bhopal, India, from October 5 to 6, 2018. It discusses recent advances in scientific developments and applications in these areas.



فهرست مطالب

Contents
Editors and Contributors
Cloud Computing
An Efficient Honey Bee Approach for Load Adjusting in Cloud Environment
	1 Introduction
	2 Related Work
	3 Proposed HBI-LA
		3.1 Overview of Honey Bee Method
		3.2 Description of Proposed HBI-LA Scheme with Concept of Aging
	4 Performance Analysis
	5 Conclusion
	6 Future Work
	References
A Novel Approach of Task Scheduling in Cloud Computing Environment
	1 Introduction
	2 Scheduling Model
		2.1 Application Model
		2.2 System Resource Model
		2.3 Preliminaries of Task Scheduling
		2.4 Task Scheduling Objective
	3 Proposed Algorithm
		3.1 Illustrative Examples
	4 Conclusion
	References
Development and Design Strategies of Evidence Collection Framework in Cloud Environment
	1 Introduction
	2 Comparative Research of Existing Data and Evidence Collection Tools, Techniques, Frameworks, Algorithm, and Approaches in Cloud Forensics
	3 Noteworthy Contributions in the Field of Proposed Work
	4 Expected Outcome of the Proposed Work
	5 Conclusion
	References
A Systematic Analysis of Task Scheduling Algorithms in Cloud Computing
	1 Introduction
	2 Task Scheduling Models Classification
	3 Basic Task Scheduling Problem Definition
	4 Scheduling Attributes
	5 Study of Task Scheduling Algorithms: Review and Analysis
	6 Conclusion
	References
A Survey on Cloud Federation Architecture and Challenges
	1 Introduction
	2 Literature Review
	3 The Basic Architecture
		3.1 Frontend Module
		3.2 Resource Broker Module
		3.3 Cloud Interface Module
	4 A Broker Based Framework
		4.1 Resource Discovery
		4.2 Resource Provisioning
		4.3 Resource Scheduling
		4.4 Monitoring
		4.5 Cost Estimation and Billing
		4.6 Resource Information Service
	5 Federation of Hybrid Clouds
		5.1 Hybrid Clouds
		5.2 Hierarchical Structure of Cloud
		5.3 Architecture
	6 Challenges
		6.1 Energy and Resource Utilization
		6.2 Distributed Resource Finding and Allocation
		6.3 Resource Provisioning
		6.4 Network Monitoring in Federated Clouds
		6.5 Security and Privacy in Federated Clouds
		6.6 Inter-domain Communication
	7 Conclusion
	References
Multi-tier Authentication for Cloud Security
	1 Introduction
	2 Characteristics of Cloud Computing
		2.1 On Demand Self Service
		2.2 Broad Network Access
		2.3 Resource Pooling
		2.4 Rapid Elasticity
		2.5 Measured Service
	3 Cloud Delivery Models
		3.1 SPI Model
		3.2 Cloud Deployment Models
	4 Security for Cloud Systems
		4.1 Security Parameters
		4.2 Security Threats
	5 Security Measures
	6 Literature Review
	7 Proposed Algorithm
		7.1 Modules of the Proposed System
	8 Conclusion
	References
Investigations of Microservices Architecture in Edge Computing Environment
	1 Introduction
	2 Review of Literature
		2.1 Programming Model for Edge Computing Environment
		2.2 Microservices Architecture
	3 Objectives
	4 Conclusion
	References
Improving Reliability of Mobile Social Cloud Computing using Machine Learning in Content Addressable Network
	1 Introduction
	2 Related Work
		2.1 Fault Tolerance in Computing Environment
		2.2 Quality of Service in Computing Environment
		2.3 Content Addressable Network
	3 Mobile Social Cloud Computing (MSCC)
		3.1 MSCC Architecture
		3.2 Preamble
	4 Proposed Work
		4.1 Proposed Framework
		4.2 Proposed Algorithm
	5 Simulation Scenario, Experimental Setup, and Result Analysis
		5.1 Simulation Configuration
		5.2 Experiment Scenarios
		5.3 Results and Analysis
	6 Comparative Study
	7 Conclusion and Prospects
	References
Data De-duplication Scheme for File Checksum in Cloud
	1 Introduction
	2 Related Work
	3 System Architecture
	4 Results and Discussion
		4.1 Snapshots
	5 Conclusion
	References
A Survey on Cloud Computing Security Issues and Cryptographic Techniques
	1 Introduction
	2 Security Issues of Deployment Models in Cloud
		2.1 Security Concerns in Public Cloud
		2.2 Security Concerns in Private Cloud
		2.3 Security Concerns in Hybrid Cloud
	3 Security Issues in Cloud Service Models
		3.1 Security Concerns in Software as a Service (SaaS)
		3.2 Security Concern in Platform as a Service (PaaS)
		3.3 Security Concerns in Infrastructure as a Service (IaaS)
	4 Cryptographic Techniques for Cloud
		4.1 Asymmetric Key Algorithms
		4.2 Symmetric Key Algorithms
		4.3 Hash Function Algorithms
		4.4 Authentication Schemes
	5 Recent Trends and Algorithms for Cloud Security
		5.1 Securing Cloud Computing Environment Based on DNA Cryptography
		5.2 Quantum Cryptography for Secure Cloud Computing
		5.3 Hybrid Cryptographic Algorithms
	6 Conclusion
	References
Machine Learning
Features Identification for Filtering Credible Content on Twitter Using Machine Learning Techniques
	1 Introduction
	2 Background Study
		2.1 User Specified Features for Finding the Credibility of Tweets
	3 Explaining Credibility
		3.1 Evaluating Credibility
	4 Data Crawling and Labeling Credibility
	5 Feature Analysis and Classification
	6 Best Features Analysis
	7 Conclusion and Future Work
	References
Perspectives of Healthcare Sector with Artificial Intelligence
	1 Introduction
		1.1 What Is Artificial Intelligence?
		1.2 The Need for Artificial Intelligence
		1.3 How Is Artificial Intelligence Helping the Patients?
		1.4 Using AI to Help Medical Professionals
		1.5 Administrators Leverage AI to Plan Efficiently
		1.6 Limitations of Artificial Intelligence
	2 Applications of AI in the Healthcare Sector
	3 Artificial Intelligence for Medical Professionals
	4 Artificial Intelligence in the Healthcare Administrative Perspective
	5 Conclusion
	References
A Novel Approach for Stock Market Price Prediction Based on Polynomial Linear Regression
	1 Introduction
	2 Literature Review
	3 Simple Linear Regression
	4 Polynomial Linear Regression
	5 Implementation Details
	6 Performance Evaluation
	7 Result Analysis
	8 Conclusion
	References
Real-Time Classification of Twitter Data Using Decision Tree Technique
	1 Introduction
	2 Literature Review
	3 Problem Definition
	4 Proposed Work
	5 Experimental and Result Analysis
	6 Conclusion
	References
Dynamic Web Service Composition Using AI Planning Technique: Case Study on Blackbox Planner
	1 Introduction
	2 Related Work
	3 AI Planning for Dynamic WSC
	4 Experiments and Results
		4.1 Travel Domain
		4.2 Case I
		4.3 Case II
	5 Conclusion
	References
A Study of Deep Learning in Text Analytics
	1 Introduction
	2 Text Preprocessing
	3 Feature Extraction Using Deep Architectures
	4 Applications of Deep Learning in Text Processing
		4.1 Text Classification
		4.2 Document Summarization
		4.3 Question Answering
		4.4 Machine Translation
		4.5 Caption Generation
		4.6 Speech Recognition
	5 Conclusion
	References
Image Segmentation of Breast Cancer Histopathology Images Using PSO-Based Clustering Technique
	1 Introduction
	2 Literature Survey
	3 K-means Clustering
	4 Genetic Algorithm (GA)
	5 Particle Swarm Optimization (PSO)
	6 Experimental Results
	7 Conclusion
	References
Survey of Methods Applying Deep Learning to Distinguish Between Computer Generated and Natural Images
	1 Introduction
	2 Problem Statement
	3 Previous Work
	4 Methods Implementing Deep Learning to Distinguish Between CG and NI
		4.1 Method I: Rahmouni et al. [15]
		4.2 Method II: Quan et al. [16]
		4.3 Method III: Rezende et al. [17]
	5 Theoretical Findings
		5.1 Building of Standard Dataset
		5.2 Increased Focus on Classifying Compressed Images
		5.3 Testing of Combination of Features Generated from Various CNNs
	6 Conclusion
	References
SVM Hyper-Parameters Optimization using Multi-PSO for Intrusion Detection
	1 Introduction
	2 Support Vector Machine (SVM)
	3 Particle Swarm Optimization (PSO)
	4 Proposed Model
	5 Result Analysis
		5.1 Range of the Parameters C and γ
		5.2 Results
	6 Conclusion
	References
A Survey on SVM Hyper-Parameters Optimization Techniques
	1 Introduction
	2 Various Selection Criterion
		2.1 Leave-One-Out Bound
		2.2 Support Vector Count
		2.3 Radius-Margin Bound
	3 Various Searching Techniques
		3.1 Gradient Descent
		3.2 Grid Search
		3.3 Genetic Algorithms
		3.4 Covariance Matrix Adaptation Evolution Strategies (CMA-ES)
		3.5 Particle Swarm Optimization
		3.6 Hybrid-Optimization Techniques
	4 Conclusion
	References
Review of F0 Estimation in the Context of Indian Classical Music Expression Detection
	1 Motivation and Context
	2 Different Types of Music Expressions
		2.1 Glissando and Legato
		2.2 Vibrato
		2.3 Tremolo
		2.4 Kobushi
	3 Pitch Extraction Methods Used
		3.1 Discrete Fourier Transform
		3.2 Constant Q Transforms
		3.3 YIN Algorithm
	4 Dataset for Experimentation
		4.1 Simulated Notes
		4.2 Recorded Notes
	5 Results and Discussion
	6 Conclusion and Future Scope
	References
Classification and Detection of Breast Cancer Using Machine Learning
	1 Introduction
	2 Related Work Heading
	3 Methodology Used
		3.1 Soft Computing Models
		3.2 Model Diagram
		3.3 Evaluation Measures
		3.4 Dataset Details
	4 Experimental Results
	5 Conclusion
	References
Data and Web Mining
Couplets Translation from English to Hindi Language
	1 Introduction
	2 Literature Survey
	3 Machine Translation
		3.1 Machine Translation Process
		3.2 Types of Machine Translation
	4 Objectives
	5 Problem Domain
	6 Solution Domain
	7 System Domain
	8 Application Domain
	9 Benefits of SMT
	10 Expected Outcome
	References
A Novel Approach for Predicting Customer Churn in Telecom Sector
	1 Introduction
	2 Related Work
	3 Problem Definition
	4 Proposed Work
	5 Result Analysis
	6 Conclusion
	References
An Advance Approach for Spam Document Detection Using QAP Rabin-Karp Algorithm
	1 Introduction
	2 Literature Survey
	3 Problem Formulation
	4 Proposed Methodology
	5 Experimental Setup and Parameters
	6 Result Analysis
	7 Conclusion and Future Work
	References
A Review on Enhancement to Standard K-Means Clustering
	1 Introduction
		1.1 Hierarchical Clustering
		1.2 Partitional Clustering
	2 Related Work
	3 Standard K-Means Algorithm
		3.1 Application of Standard K-means
	4 Objectives
	5 Problem Statements
	6 Enhancement to Standard K-Mean Algorithm
	7 Conclusion
	8 Research Scope
	References
A Review on Benchmarking: Comparing the Static Analysis Tools (SATs) in Web Security
	1 Introduction
	2 Background Work of Benchmark
		2.1 Benchmarks
		2.2 Vulnerability Detection of SATs
		2.3 SAT Benchmark
		2.4 Quality of Software
	3 Benchmarking Approach
		3.1 Scenarios
		3.2 Metrics
		3.3 Workload
	4 Conclusion
	References
Farmer the Entrepreneur—An Android-Based Solution for Agriculture End Services
	1 Introduction
	2 Related Work
	3 System Architecture
		3.1 Proposed Algorithm
	4 Results and Discussions
	5 Conclusion
	References
Face Recognition Algorithm for Low-Resolution Images
	1 Introduction
	2 Literature Survey
	3 Face Descriptors
		3.1 Local Binary Patterns
		3.2 Local Ternary Patterns
		3.3 Dual-Cross Patterns
	4 Proposed Methodology
		4.1 Image Resizing
		4.2 Image Enhancement
		4.3 Feature Extraction
		4.4 Face Recognition
	5 Experimental Results and Discussions
		5.1 LFW Database
		5.2 ORL Database
		5.3 AR Database
		5.4 EYB Database
	6 Conclusion
	References
A Cognition Scanning on Popularity Prediction of Videos
	1 Introduction
	2 Literature Review
	3 Challenges in the Video Popularity Prediction
	4 Major Recent Developments and Automated Tools
	5 Conclusions
	References
Review on High Utility Rare Itemset Mining
	1 Introduction
	2 Preliminaries
		2.1 Data Mining
		2.2 Association Rule Mining
		2.3 Frequent Itemset Mining
	3 Rare Itemset Mining
	4 High Utility Rare Itemset Mining
	5 Related Work
	6 Open Research Issues and Applications
		6.1 Open Research Issues
		6.2 Applications in Future Prescriptive
	7 Conclusion and Future Work
		7.1 Conclusion
		7.2 Future Work
	References
A Study on Impact of Team Composition and Optimal Parameters Required to Predict Result of Cricket Match
	1 Introduction
	2 Research Direction in Cricket
	3 Related Work
	4 Conclusion
	References
Using Analytic Hierarchal Processing in 26/11 Mumbai Terrorist Attack for Key Player Selection and Ranking
	1 Introduction
	2 Data Set
	3 Measures of Social Network Analysis for TNM
		3.1 Measure Based on Location (Influence, Prestige, or Control)
	4 Results and Analysis
	5 Conclusion
	References
A Comprehensive Study of Clustering Algorithms for Big Data Mining with MapReduce Capability
	1 Introduction
		1.1 Big Data
		1.2 Big Data Mining Technique
	2 Clustering Algorithms Techniques for Big Data Mining
		2.1 Partition-Based Algorithms
		2.2 Hierarchical-Based Algorithms
		2.3 Density-Based Algorithms
		2.4 Grid-Based Algorithms
		2.5 Model-Based Algorithms
	3 Comparative Analysis of Clustering Algorithms Techniques for Big Data Mining
	4 Scalable and Speed-up Clustering Framework for Big Data Mining
	5 Conclusion
	References
Parametric and Nonparametric Classification for Minimizing Misclassification Errors
	1 Introduction
	2 Related Work
	3 Existing Methodology
		3.1 Pattern Extraction and Analysis
		3.2 Feature Extraction
		3.3 Classification
	4 Proposed Method
		4.1 Proposed Approach Requirements
		4.2 Wrapper Framework
	5 Classification Techniques for Minimizing Errors
		5.1 Bayes’s Classifier
		5.2 K-NN Classifier
		5.3 Neural Network Classifier
		5.4 Figures and Tables
	6 Conclusion
	References
IoT
A Review on IoT Security Architecture: Attacks, Protocols, Trust Management Issues, and Elliptic Curve Cryptography
	1 Introduction
	2 Security at IoT Architecture
		2.1 Physical Layer
		2.2 Network Layer
		2.3 Application Layer
	3 Trust Requirement and Techniques
		3.1 Trust
		3.2 Trust Issues and Requirement
	4 Illustration of IoT Architecture Based on Realistic Application
		4.1 Smart Surveillance System
		4.2 Intrusion Detection
		4.3 Access Control and Asset Tracking
	5 Elliptic Curve Cryptography
	6 Conclusion
	References
A Comprehensive Review and Performance Evaluation of Recent Trends for Data Aggregation and Routing Techniques in IoT Networks
	1 Introduction
	2 Recent Trends in Data Aggregation Techniques
		2.1 Cluster Head-Based Data Aggregation Schemes
		2.2 Centralized Data Aggregation Schemes
		2.3 Tree-Based Data Aggregation Schemes
	3 Recent Trends in Routing Techniques
		3.1 Cluster-Based Routing Schemes
		3.2 Non-clustering-Based Routing Schemes
		3.3 Secure Routing Schemes
	4 Performance Metrics
		4.1 Synchronization
		4.2 Link Reliability
		4.3 End-to-End Delay
		4.4 Traffic
		4.5 Power
		4.6 Autonomy
		4.7 Multi-user Interference (MUI)
		4.8 Coexistence
	5 AODV Routing Protocol Performance Evaluation
	6 Conclusion
	References
An Efficient Image Data Encryption Technique Based on RC4 and Blowfish Algorithm with Random Data Shuffling
	1 Introduction
	2 Literature Survey
	3 Proposed Work
	4 Results
	5 Conclusion
	References
IoT Devices for Monitoring Natural Environment—A Survey
	1 Introduction
	2 IoT Devices Used in Environment
	3 IoT Devices for Monitoring Air Pollution
		3.1 Electrochemical Ozone Sensors
		3.2 Semiconductor-Based Ozone Sensors
	4 IoT Devices for Monitoring Noise Pollution
	5 IoT Devices for Monitoring Water Pollution
	6 IoT Devices for Monitoring Soil Pollution
	7 IoT Devices for Measuring Other Environmental Factors
	8 Conclusion
	References
Suspicious Event Detection in Real-Time Video Surveillance System
	1 Introduction
	2 Challenges in Real-Time Video Surveillance System
	3 Related Work
	4 Suspicious Event Detection Through Anomaly Detection
	5 Conclusion and Future Enhancement
	References
Time Moments and Its Extension for Reduction of MIMO Discrete Interval Systems
	1 Introduction
	2 Mathematical Formulation
		2.1 For Continuous Interval Systems
		2.2 For Discrete Interval Systems
	3 Time Moments for Interval System
		3.1 Continuous Interval Systems
		3.2 Discrete Interval Systems
	4 Clustering of Poles
	5 Test System
	6 Conclusion
	References
Human Activity Recognition Using Smartphone Sensor Data
	1 Introduction
		1.1 Android Smartphones
	2 Related Works
	3 Feature Generation
		3.1 Data Collection
		3.2 Smoothing and Filtering
		3.3 Generating Useful Features
	4 Experiments
		4.1 Training Set and Test Set
		4.2 Data Normalization
		4.3 Dimensionality Reduction
		4.4 Training the Classifiers
	5 Results
	6 Conclusion
	7 Future Work
	References
Novel Software Modeling Technique for Surveillance System
	1 Introduction
	2 Literature Review
	3 Methodology
	4 Working
	5 Results
	6 Conclusion
	References
An Investigation on Distributed Real-Time Embedded System
	1 Introduction
	2 Generic Architecture of Real-Time Embedded System
	3 Task Scheduling and Resource Sharing in Distributed Embedded Systems
	4 Conclusion
	References
Real-Time Robust and Cost-Efficient Hand Tracking in Colored Video Using Simple Camera
	1 Introduction
	2 Proposed Algorithm Description
		2.1 Defining ROI
		2.2 Hand Localization and Tracking
	3 Experimental Results
	4 Conclusion
	References
Communication and Networks
A State of the Art on Network Security
	1 Introduction
	2 A State of the Art: Network Security
	3 Network Security, Issues and Its Need
		3.1 Security Issues
		3.2 Need of Network Security
	4 Types of Attacks
		4.1 Active Attacks [11, 13]
		4.2 Passive Attack [11]
	5 Techniques for System Security and Data Security
		5.1 Firewall Technology
		5.2 Data Encryption Technology
		5.3 Intrusion Detection Technology
		5.4 Antivirus Technology [3]
		5.5 Virtual Private Network (VPN)
	6 Conclusion
	References
A Survey on Wireless Network
	1 Introduction
	2 A Survey on Wireless Network
	3 Short-Range Wireless Protocols
	4 Issues and Challenges
	5 Conclusion
	References
Jaya Algorithm Based Optimal Design of LQR Controller for Load Frequency Control of Single Area Power System
	1 Introduction
	2 Load Frequency Control
		2.1 Load Frequency Control Model of Single Area Power System
		2.2 The Optimal Control Problem
	3 Evolutionary Computing Techniques
		3.1 Genetic Algorithm
		3.2 Jaya Algorithm
	4 Results and Discussions
	5 Conclusion
	References
A Review on Performance of Distributed Embedded System
	1 Introduction
	2 Analysis of Performance
		2.1 Distributed Embedded System
		2.2 Basic Terms
		2.3 Requirements
	3 Approaches to Performance Analysis
		3.1 Method Based on Simulation
		3.2 Holistic Scheduling Analysis
		3.3 Compositional Method
	4 Testing Technique Between Hardware and Software Interaction in Embedded System
		4.1 Selection of Data Technique for Testing Embedded Systems
		4.2 Analyzing Hardware–Software Modules in Embedded System
	5 Safety Requirements of Hardware–Software Interactions in Complex System
	References
A Comparative Study of DoS Attack Detection and Mitigation Techniques in MANET
	1 Introduction
	2 Phases for Launching DoS/DDoS Attacks
		2.1 Acquiring Botnets
		2.2 Propagation
		2.3 Attack
	3 Literature Review
	4 Comparative Study
	5 Conclusion
	References
Prediction of Software Effort Using Design Metrics: An Empirical Investigation
	1 Introduction
	2 Related Work
	3 Software Metrics
	4 Research Hypothesis
	5 Data Collection
	6 Research Methodology
		6.1 Simple Linear Regression
		6.2 Multiple Regressions
	7 Experimental Result
	8 Performance Evaluation
	9 Conclusion
	References
Recent Advancements in Chaos-Based Image Encryption Techniques: A Review
	1 Introduction
	2 Background
		2.1 Chaotic Image System
		2.2 Literature Review
	3 Statistical Test
		3.1 Pixel Correlation Coefficients
		3.2 Histogram Analysis
		3.3 Entropy
	4 Sensitivity Tests
		4.1 Differential Attack Measures
	5 Conclusion
	References
Image Fusion Survey: A Comprehensive and Detailed Analysis of Image Fusion Techniques
	1 Introduction
	2 Overview of Literature Survey
		2.1 Level-Based Comparison of Image Fusion
		2.2 Spatial and Frequency Domain
		2.3 Arithmetic Based Methods
		2.4 Component Substitution Methods
		2.5 Multi-scale Transform Methods
		2.6 Wavelet Methods
		2.7 Sparse Based
		2.8 Hybrid Methods
	3 Metrics for Performance Evaluation
		3.1 Comparison Table
	4 Conclusion
	References
Some New Methods for Ready Queue Processing Time Estimation Problem in Multiprocessing Environment
	1 Introduction
	2 Concept of Ready Queue
		2.1 Ready Queue Estimation Problem
	3 Need of Estimation
		3.1 Sampling
		3.2 Confidence Intervals
		3.3 Auxiliary Data and Ratio Estimation
	4 Contribution of Methods
	5 Method of Estimation of Ready Queue in Multiprocessing Environment
	6 Scheduling Approaches
	7 Summary/Conclusion
	References
Review of Various Two-Phase Authentication Mechanisms on Ease of Use and Security Enhancement Parameters
	1 Introduction
		1.1 Types of Authentication Mechanisms [1]
	2 Literature Review
	3 Conclusion
	References
An Efficient Network Coded Routing Protocol for Delay Tolerant Network
	1 Introduction
	2 Related Work
	3 EDIF and EPIF
		3.1 EDIF
		3.2 EPIF
		3.3 Encoding and Decoding Process
	4 Performance Evaluation
	5 Conclusion
	6 Future Scope
	References
Hybrid Text Illusion CAPTCHA Dealing with Partial Vision Certainty
	1 Introduction
	2 Related Works
	3 Problem Identification
	4 Proposed Work
	5 Result Analysis
	6 Conclusion and Future Scope
	References
“By Using Image Inpainting Technique Restoring Occluded Images for Face Recognition”
	1 Introduction
		1.1 Challenges for Face Recognition
		1.2 Overview of Occlusion
		1.3 Causes of Occlusion
	2 Objective
		2.1 Objective
	3 Literature Survey
	4 Analysis of Existing Systems
	5 Proposed Research Methodology
		5.1 Flow of Project
	6 Proposed Plan of Work
	7 Conclusion
	References
Social Networking
Personality Prediction and Classification Using Twitter Data
	1 Introduction
	2 Related Work
	3 Methodology
		3.1 Random Forest
		3.2 K-Nearest Neighbor
		3.3 Multiclass Support Vector Machine
		3.4 Logistic Regression
		3.5 AdaBoost
	4 System Model
	5 Experimental Results
	6 Conclusion
	References
A Novel Adaptive Approach for Sentiment Analysis on Social Media Data
	1 Introduction
	2 Literature Review
	3 Sentiment Analysis on Social Networking Platforms
	4 Methodology and Implementation
		4.1 Data Extraction (Datasets)
		4.2 API Keys and Tokens Generation
		4.3 API Used
		4.4 GUI Design
		4.5 Algorithm Process
	5 Result Analysis
	6 Conclusion
	References
Sentiment Analysis and Prediction of Election Results 2018
	1 Introduction
	2 Big Data History and Current Considerations
	3 Big Data Analytics and Overview
	4 Sentiment Analysis
	5 Analysis of Data Mining Techniques for Social Network—A Review
	6 Case Study: Sentiment Analysis of Assembly Election Results
		6.1 Methodology
		6.2 Data Collection and Preprocessing
		6.3 Data Analysis
	7 Experimental Result
	8 Conclusion
	References
Toward the Semantic Data Inter-processing: A Semantic Web Approach and Its Services
	1 Introduction
	2 Semantic Web
	3 Semantic Web Vision
	4 Benefits of Semantic Web
		4.1 Knowledge Integration
		4.2 Knowledge Construction
		4.3 Knowledge Searching
		4.4 Knowledge Inferencing
		4.5 Knowledge Perspective
	5 Applications of Semantic Web
	6 Semantic Web Services
		6.1 OWL-S
		6.2 WSMO
		6.3 WSDL-S
		6.4 SAWSDL
		6.5 WSMO-Lite
		6.6 MicroWSMO
		6.7 SA-Rest
	7 Conclusion
	References
A Big Data Parameter Estimation Approach to Develop Big Social Data Analytics Framework for Sentiment Analysis
	1 Introduction
	2 Big Social Media Analytics
	3 Big Data Parameter Estimation
	4 The Concept of Social Big Data
	5 The Proposed Framework
	6 Conclusion
	References
A Novel Approach of Vertex Coloring Algorithm to Solve the K-Colorability Problem
	1 Introduction
	2 Related Work
	3 Proposed Implementation
		3.1 Implementation Platform
		3.2 Algorithm Flowchart
		3.3 Algorithm Methodology
		3.4 Data Set Used
	4 Result
	5 Conclusion and Future Enhancement
	References
Predicting the Popularity of Rumors in Social Media Using Machine Learning
	1 Introduction
	2 Related Work
	3 Dataset Used
		3.1 Data Preprocessing
	4 Methodology
	5 Feature Representation
		5.1 Content Features
		5.2 User Features
		5.3 Temporal Features
	6 Machine Learning Models for Rumor Popularity
	7 Data Splitting and Validation
	8 Evaluation
	9 Analysis of Results
	10 Conclusions
	11 Future Scope
	References
Optimizing Memory Space by Removing Duplicate Files Using Similarity Digest Technique
	1 Introduction
	2 Related Work
	3 Proposed Methodology
	4 Result Analysis
		4.1 Time Complexity
		4.2 Space Complexity
	5 Conclusion
	References
Sentiment Analysis to Recognize Emotional Distress Through Facebook Status Updates
	1 Introduction
		1.1 Facebook Status Updates
		1.2 Objectives
	2 Present Research
	3 Proposed Methodology
		3.1 Key Features of Status Updates
		3.2 Architecture
		3.3 Seed Word Creation
		3.4 Sentiment Polarity Detection
	4 Experimental Setup
		4.1 Calculation of Degree of Emotional Distress
		4.2 Impact of Frequency
		4.3 Impact of Time
		4.4 Impact of Affect Expressed
	5 Classification Algorithms
	6 Results
	7 Conclusion
	References




نظرات کاربران