دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش: نویسندگان: Rajesh Kumar Shukla (editor), Jitendra Agrawal (editor), Sanjeev Sharma (editor), Narendra S. Chaudhari (editor), K. K. Shukla (editor) سری: ISBN (شابک) : 9811520704, 9789811520709 ناشر: Springer سال نشر: 2020 تعداد صفحات: 789 زبان: English فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود) حجم فایل: 26 مگابایت
در صورت تبدیل فایل کتاب Social Networking and Computational Intelligence: Proceedings of SCI-2018 (Lecture Notes in Networks and Systems, 100) به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب شبکه های اجتماعی و هوش محاسباتی: مجموعه مقالات SCI-2018 (یادداشت های سخنرانی در شبکه ها و سیستم ها، 100) نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
این کتاب مجموعهای از نسخههای اصلاحشده و توسعهیافته از بهترین مقالات اولین کنفرانس بینالمللی شبکههای اجتماعی و هوش محاسباتی (SCI-2018)، که در بوپال، هند، از 5 تا 6 اکتبر 2018 برگزار شد، ارائه میکند. پیشرفت های اخیر در پیشرفت های علمی و کاربردها در این زمینه ها.
This book presents a selection of revised and extended versions of the best papers from the First International Conference on Social Networking and Computational Intelligence (SCI-2018), held in Bhopal, India, from October 5 to 6, 2018. It discusses recent advances in scientific developments and applications in these areas.
Contents Editors and Contributors Cloud Computing An Efficient Honey Bee Approach for Load Adjusting in Cloud Environment 1 Introduction 2 Related Work 3 Proposed HBI-LA 3.1 Overview of Honey Bee Method 3.2 Description of Proposed HBI-LA Scheme with Concept of Aging 4 Performance Analysis 5 Conclusion 6 Future Work References A Novel Approach of Task Scheduling in Cloud Computing Environment 1 Introduction 2 Scheduling Model 2.1 Application Model 2.2 System Resource Model 2.3 Preliminaries of Task Scheduling 2.4 Task Scheduling Objective 3 Proposed Algorithm 3.1 Illustrative Examples 4 Conclusion References Development and Design Strategies of Evidence Collection Framework in Cloud Environment 1 Introduction 2 Comparative Research of Existing Data and Evidence Collection Tools, Techniques, Frameworks, Algorithm, and Approaches in Cloud Forensics 3 Noteworthy Contributions in the Field of Proposed Work 4 Expected Outcome of the Proposed Work 5 Conclusion References A Systematic Analysis of Task Scheduling Algorithms in Cloud Computing 1 Introduction 2 Task Scheduling Models Classification 3 Basic Task Scheduling Problem Definition 4 Scheduling Attributes 5 Study of Task Scheduling Algorithms: Review and Analysis 6 Conclusion References A Survey on Cloud Federation Architecture and Challenges 1 Introduction 2 Literature Review 3 The Basic Architecture 3.1 Frontend Module 3.2 Resource Broker Module 3.3 Cloud Interface Module 4 A Broker Based Framework 4.1 Resource Discovery 4.2 Resource Provisioning 4.3 Resource Scheduling 4.4 Monitoring 4.5 Cost Estimation and Billing 4.6 Resource Information Service 5 Federation of Hybrid Clouds 5.1 Hybrid Clouds 5.2 Hierarchical Structure of Cloud 5.3 Architecture 6 Challenges 6.1 Energy and Resource Utilization 6.2 Distributed Resource Finding and Allocation 6.3 Resource Provisioning 6.4 Network Monitoring in Federated Clouds 6.5 Security and Privacy in Federated Clouds 6.6 Inter-domain Communication 7 Conclusion References Multi-tier Authentication for Cloud Security 1 Introduction 2 Characteristics of Cloud Computing 2.1 On Demand Self Service 2.2 Broad Network Access 2.3 Resource Pooling 2.4 Rapid Elasticity 2.5 Measured Service 3 Cloud Delivery Models 3.1 SPI Model 3.2 Cloud Deployment Models 4 Security for Cloud Systems 4.1 Security Parameters 4.2 Security Threats 5 Security Measures 6 Literature Review 7 Proposed Algorithm 7.1 Modules of the Proposed System 8 Conclusion References Investigations of Microservices Architecture in Edge Computing Environment 1 Introduction 2 Review of Literature 2.1 Programming Model for Edge Computing Environment 2.2 Microservices Architecture 3 Objectives 4 Conclusion References Improving Reliability of Mobile Social Cloud Computing using Machine Learning in Content Addressable Network 1 Introduction 2 Related Work 2.1 Fault Tolerance in Computing Environment 2.2 Quality of Service in Computing Environment 2.3 Content Addressable Network 3 Mobile Social Cloud Computing (MSCC) 3.1 MSCC Architecture 3.2 Preamble 4 Proposed Work 4.1 Proposed Framework 4.2 Proposed Algorithm 5 Simulation Scenario, Experimental Setup, and Result Analysis 5.1 Simulation Configuration 5.2 Experiment Scenarios 5.3 Results and Analysis 6 Comparative Study 7 Conclusion and Prospects References Data De-duplication Scheme for File Checksum in Cloud 1 Introduction 2 Related Work 3 System Architecture 4 Results and Discussion 4.1 Snapshots 5 Conclusion References A Survey on Cloud Computing Security Issues and Cryptographic Techniques 1 Introduction 2 Security Issues of Deployment Models in Cloud 2.1 Security Concerns in Public Cloud 2.2 Security Concerns in Private Cloud 2.3 Security Concerns in Hybrid Cloud 3 Security Issues in Cloud Service Models 3.1 Security Concerns in Software as a Service (SaaS) 3.2 Security Concern in Platform as a Service (PaaS) 3.3 Security Concerns in Infrastructure as a Service (IaaS) 4 Cryptographic Techniques for Cloud 4.1 Asymmetric Key Algorithms 4.2 Symmetric Key Algorithms 4.3 Hash Function Algorithms 4.4 Authentication Schemes 5 Recent Trends and Algorithms for Cloud Security 5.1 Securing Cloud Computing Environment Based on DNA Cryptography 5.2 Quantum Cryptography for Secure Cloud Computing 5.3 Hybrid Cryptographic Algorithms 6 Conclusion References Machine Learning Features Identification for Filtering Credible Content on Twitter Using Machine Learning Techniques 1 Introduction 2 Background Study 2.1 User Specified Features for Finding the Credibility of Tweets 3 Explaining Credibility 3.1 Evaluating Credibility 4 Data Crawling and Labeling Credibility 5 Feature Analysis and Classification 6 Best Features Analysis 7 Conclusion and Future Work References Perspectives of Healthcare Sector with Artificial Intelligence 1 Introduction 1.1 What Is Artificial Intelligence? 1.2 The Need for Artificial Intelligence 1.3 How Is Artificial Intelligence Helping the Patients? 1.4 Using AI to Help Medical Professionals 1.5 Administrators Leverage AI to Plan Efficiently 1.6 Limitations of Artificial Intelligence 2 Applications of AI in the Healthcare Sector 3 Artificial Intelligence for Medical Professionals 4 Artificial Intelligence in the Healthcare Administrative Perspective 5 Conclusion References A Novel Approach for Stock Market Price Prediction Based on Polynomial Linear Regression 1 Introduction 2 Literature Review 3 Simple Linear Regression 4 Polynomial Linear Regression 5 Implementation Details 6 Performance Evaluation 7 Result Analysis 8 Conclusion References Real-Time Classification of Twitter Data Using Decision Tree Technique 1 Introduction 2 Literature Review 3 Problem Definition 4 Proposed Work 5 Experimental and Result Analysis 6 Conclusion References Dynamic Web Service Composition Using AI Planning Technique: Case Study on Blackbox Planner 1 Introduction 2 Related Work 3 AI Planning for Dynamic WSC 4 Experiments and Results 4.1 Travel Domain 4.2 Case I 4.3 Case II 5 Conclusion References A Study of Deep Learning in Text Analytics 1 Introduction 2 Text Preprocessing 3 Feature Extraction Using Deep Architectures 4 Applications of Deep Learning in Text Processing 4.1 Text Classification 4.2 Document Summarization 4.3 Question Answering 4.4 Machine Translation 4.5 Caption Generation 4.6 Speech Recognition 5 Conclusion References Image Segmentation of Breast Cancer Histopathology Images Using PSO-Based Clustering Technique 1 Introduction 2 Literature Survey 3 K-means Clustering 4 Genetic Algorithm (GA) 5 Particle Swarm Optimization (PSO) 6 Experimental Results 7 Conclusion References Survey of Methods Applying Deep Learning to Distinguish Between Computer Generated and Natural Images 1 Introduction 2 Problem Statement 3 Previous Work 4 Methods Implementing Deep Learning to Distinguish Between CG and NI 4.1 Method I: Rahmouni et al. [15] 4.2 Method II: Quan et al. [16] 4.3 Method III: Rezende et al. [17] 5 Theoretical Findings 5.1 Building of Standard Dataset 5.2 Increased Focus on Classifying Compressed Images 5.3 Testing of Combination of Features Generated from Various CNNs 6 Conclusion References SVM Hyper-Parameters Optimization using Multi-PSO for Intrusion Detection 1 Introduction 2 Support Vector Machine (SVM) 3 Particle Swarm Optimization (PSO) 4 Proposed Model 5 Result Analysis 5.1 Range of the Parameters C and γ 5.2 Results 6 Conclusion References A Survey on SVM Hyper-Parameters Optimization Techniques 1 Introduction 2 Various Selection Criterion 2.1 Leave-One-Out Bound 2.2 Support Vector Count 2.3 Radius-Margin Bound 3 Various Searching Techniques 3.1 Gradient Descent 3.2 Grid Search 3.3 Genetic Algorithms 3.4 Covariance Matrix Adaptation Evolution Strategies (CMA-ES) 3.5 Particle Swarm Optimization 3.6 Hybrid-Optimization Techniques 4 Conclusion References Review of F0 Estimation in the Context of Indian Classical Music Expression Detection 1 Motivation and Context 2 Different Types of Music Expressions 2.1 Glissando and Legato 2.2 Vibrato 2.3 Tremolo 2.4 Kobushi 3 Pitch Extraction Methods Used 3.1 Discrete Fourier Transform 3.2 Constant Q Transforms 3.3 YIN Algorithm 4 Dataset for Experimentation 4.1 Simulated Notes 4.2 Recorded Notes 5 Results and Discussion 6 Conclusion and Future Scope References Classification and Detection of Breast Cancer Using Machine Learning 1 Introduction 2 Related Work Heading 3 Methodology Used 3.1 Soft Computing Models 3.2 Model Diagram 3.3 Evaluation Measures 3.4 Dataset Details 4 Experimental Results 5 Conclusion References Data and Web Mining Couplets Translation from English to Hindi Language 1 Introduction 2 Literature Survey 3 Machine Translation 3.1 Machine Translation Process 3.2 Types of Machine Translation 4 Objectives 5 Problem Domain 6 Solution Domain 7 System Domain 8 Application Domain 9 Benefits of SMT 10 Expected Outcome References A Novel Approach for Predicting Customer Churn in Telecom Sector 1 Introduction 2 Related Work 3 Problem Definition 4 Proposed Work 5 Result Analysis 6 Conclusion References An Advance Approach for Spam Document Detection Using QAP Rabin-Karp Algorithm 1 Introduction 2 Literature Survey 3 Problem Formulation 4 Proposed Methodology 5 Experimental Setup and Parameters 6 Result Analysis 7 Conclusion and Future Work References A Review on Enhancement to Standard K-Means Clustering 1 Introduction 1.1 Hierarchical Clustering 1.2 Partitional Clustering 2 Related Work 3 Standard K-Means Algorithm 3.1 Application of Standard K-means 4 Objectives 5 Problem Statements 6 Enhancement to Standard K-Mean Algorithm 7 Conclusion 8 Research Scope References A Review on Benchmarking: Comparing the Static Analysis Tools (SATs) in Web Security 1 Introduction 2 Background Work of Benchmark 2.1 Benchmarks 2.2 Vulnerability Detection of SATs 2.3 SAT Benchmark 2.4 Quality of Software 3 Benchmarking Approach 3.1 Scenarios 3.2 Metrics 3.3 Workload 4 Conclusion References Farmer the Entrepreneur—An Android-Based Solution for Agriculture End Services 1 Introduction 2 Related Work 3 System Architecture 3.1 Proposed Algorithm 4 Results and Discussions 5 Conclusion References Face Recognition Algorithm for Low-Resolution Images 1 Introduction 2 Literature Survey 3 Face Descriptors 3.1 Local Binary Patterns 3.2 Local Ternary Patterns 3.3 Dual-Cross Patterns 4 Proposed Methodology 4.1 Image Resizing 4.2 Image Enhancement 4.3 Feature Extraction 4.4 Face Recognition 5 Experimental Results and Discussions 5.1 LFW Database 5.2 ORL Database 5.3 AR Database 5.4 EYB Database 6 Conclusion References A Cognition Scanning on Popularity Prediction of Videos 1 Introduction 2 Literature Review 3 Challenges in the Video Popularity Prediction 4 Major Recent Developments and Automated Tools 5 Conclusions References Review on High Utility Rare Itemset Mining 1 Introduction 2 Preliminaries 2.1 Data Mining 2.2 Association Rule Mining 2.3 Frequent Itemset Mining 3 Rare Itemset Mining 4 High Utility Rare Itemset Mining 5 Related Work 6 Open Research Issues and Applications 6.1 Open Research Issues 6.2 Applications in Future Prescriptive 7 Conclusion and Future Work 7.1 Conclusion 7.2 Future Work References A Study on Impact of Team Composition and Optimal Parameters Required to Predict Result of Cricket Match 1 Introduction 2 Research Direction in Cricket 3 Related Work 4 Conclusion References Using Analytic Hierarchal Processing in 26/11 Mumbai Terrorist Attack for Key Player Selection and Ranking 1 Introduction 2 Data Set 3 Measures of Social Network Analysis for TNM 3.1 Measure Based on Location (Influence, Prestige, or Control) 4 Results and Analysis 5 Conclusion References A Comprehensive Study of Clustering Algorithms for Big Data Mining with MapReduce Capability 1 Introduction 1.1 Big Data 1.2 Big Data Mining Technique 2 Clustering Algorithms Techniques for Big Data Mining 2.1 Partition-Based Algorithms 2.2 Hierarchical-Based Algorithms 2.3 Density-Based Algorithms 2.4 Grid-Based Algorithms 2.5 Model-Based Algorithms 3 Comparative Analysis of Clustering Algorithms Techniques for Big Data Mining 4 Scalable and Speed-up Clustering Framework for Big Data Mining 5 Conclusion References Parametric and Nonparametric Classification for Minimizing Misclassification Errors 1 Introduction 2 Related Work 3 Existing Methodology 3.1 Pattern Extraction and Analysis 3.2 Feature Extraction 3.3 Classification 4 Proposed Method 4.1 Proposed Approach Requirements 4.2 Wrapper Framework 5 Classification Techniques for Minimizing Errors 5.1 Bayes’s Classifier 5.2 K-NN Classifier 5.3 Neural Network Classifier 5.4 Figures and Tables 6 Conclusion References IoT A Review on IoT Security Architecture: Attacks, Protocols, Trust Management Issues, and Elliptic Curve Cryptography 1 Introduction 2 Security at IoT Architecture 2.1 Physical Layer 2.2 Network Layer 2.3 Application Layer 3 Trust Requirement and Techniques 3.1 Trust 3.2 Trust Issues and Requirement 4 Illustration of IoT Architecture Based on Realistic Application 4.1 Smart Surveillance System 4.2 Intrusion Detection 4.3 Access Control and Asset Tracking 5 Elliptic Curve Cryptography 6 Conclusion References A Comprehensive Review and Performance Evaluation of Recent Trends for Data Aggregation and Routing Techniques in IoT Networks 1 Introduction 2 Recent Trends in Data Aggregation Techniques 2.1 Cluster Head-Based Data Aggregation Schemes 2.2 Centralized Data Aggregation Schemes 2.3 Tree-Based Data Aggregation Schemes 3 Recent Trends in Routing Techniques 3.1 Cluster-Based Routing Schemes 3.2 Non-clustering-Based Routing Schemes 3.3 Secure Routing Schemes 4 Performance Metrics 4.1 Synchronization 4.2 Link Reliability 4.3 End-to-End Delay 4.4 Traffic 4.5 Power 4.6 Autonomy 4.7 Multi-user Interference (MUI) 4.8 Coexistence 5 AODV Routing Protocol Performance Evaluation 6 Conclusion References An Efficient Image Data Encryption Technique Based on RC4 and Blowfish Algorithm with Random Data Shuffling 1 Introduction 2 Literature Survey 3 Proposed Work 4 Results 5 Conclusion References IoT Devices for Monitoring Natural Environment—A Survey 1 Introduction 2 IoT Devices Used in Environment 3 IoT Devices for Monitoring Air Pollution 3.1 Electrochemical Ozone Sensors 3.2 Semiconductor-Based Ozone Sensors 4 IoT Devices for Monitoring Noise Pollution 5 IoT Devices for Monitoring Water Pollution 6 IoT Devices for Monitoring Soil Pollution 7 IoT Devices for Measuring Other Environmental Factors 8 Conclusion References Suspicious Event Detection in Real-Time Video Surveillance System 1 Introduction 2 Challenges in Real-Time Video Surveillance System 3 Related Work 4 Suspicious Event Detection Through Anomaly Detection 5 Conclusion and Future Enhancement References Time Moments and Its Extension for Reduction of MIMO Discrete Interval Systems 1 Introduction 2 Mathematical Formulation 2.1 For Continuous Interval Systems 2.2 For Discrete Interval Systems 3 Time Moments for Interval System 3.1 Continuous Interval Systems 3.2 Discrete Interval Systems 4 Clustering of Poles 5 Test System 6 Conclusion References Human Activity Recognition Using Smartphone Sensor Data 1 Introduction 1.1 Android Smartphones 2 Related Works 3 Feature Generation 3.1 Data Collection 3.2 Smoothing and Filtering 3.3 Generating Useful Features 4 Experiments 4.1 Training Set and Test Set 4.2 Data Normalization 4.3 Dimensionality Reduction 4.4 Training the Classifiers 5 Results 6 Conclusion 7 Future Work References Novel Software Modeling Technique for Surveillance System 1 Introduction 2 Literature Review 3 Methodology 4 Working 5 Results 6 Conclusion References An Investigation on Distributed Real-Time Embedded System 1 Introduction 2 Generic Architecture of Real-Time Embedded System 3 Task Scheduling and Resource Sharing in Distributed Embedded Systems 4 Conclusion References Real-Time Robust and Cost-Efficient Hand Tracking in Colored Video Using Simple Camera 1 Introduction 2 Proposed Algorithm Description 2.1 Defining ROI 2.2 Hand Localization and Tracking 3 Experimental Results 4 Conclusion References Communication and Networks A State of the Art on Network Security 1 Introduction 2 A State of the Art: Network Security 3 Network Security, Issues and Its Need 3.1 Security Issues 3.2 Need of Network Security 4 Types of Attacks 4.1 Active Attacks [11, 13] 4.2 Passive Attack [11] 5 Techniques for System Security and Data Security 5.1 Firewall Technology 5.2 Data Encryption Technology 5.3 Intrusion Detection Technology 5.4 Antivirus Technology [3] 5.5 Virtual Private Network (VPN) 6 Conclusion References A Survey on Wireless Network 1 Introduction 2 A Survey on Wireless Network 3 Short-Range Wireless Protocols 4 Issues and Challenges 5 Conclusion References Jaya Algorithm Based Optimal Design of LQR Controller for Load Frequency Control of Single Area Power System 1 Introduction 2 Load Frequency Control 2.1 Load Frequency Control Model of Single Area Power System 2.2 The Optimal Control Problem 3 Evolutionary Computing Techniques 3.1 Genetic Algorithm 3.2 Jaya Algorithm 4 Results and Discussions 5 Conclusion References A Review on Performance of Distributed Embedded System 1 Introduction 2 Analysis of Performance 2.1 Distributed Embedded System 2.2 Basic Terms 2.3 Requirements 3 Approaches to Performance Analysis 3.1 Method Based on Simulation 3.2 Holistic Scheduling Analysis 3.3 Compositional Method 4 Testing Technique Between Hardware and Software Interaction in Embedded System 4.1 Selection of Data Technique for Testing Embedded Systems 4.2 Analyzing Hardware–Software Modules in Embedded System 5 Safety Requirements of Hardware–Software Interactions in Complex System References A Comparative Study of DoS Attack Detection and Mitigation Techniques in MANET 1 Introduction 2 Phases for Launching DoS/DDoS Attacks 2.1 Acquiring Botnets 2.2 Propagation 2.3 Attack 3 Literature Review 4 Comparative Study 5 Conclusion References Prediction of Software Effort Using Design Metrics: An Empirical Investigation 1 Introduction 2 Related Work 3 Software Metrics 4 Research Hypothesis 5 Data Collection 6 Research Methodology 6.1 Simple Linear Regression 6.2 Multiple Regressions 7 Experimental Result 8 Performance Evaluation 9 Conclusion References Recent Advancements in Chaos-Based Image Encryption Techniques: A Review 1 Introduction 2 Background 2.1 Chaotic Image System 2.2 Literature Review 3 Statistical Test 3.1 Pixel Correlation Coefficients 3.2 Histogram Analysis 3.3 Entropy 4 Sensitivity Tests 4.1 Differential Attack Measures 5 Conclusion References Image Fusion Survey: A Comprehensive and Detailed Analysis of Image Fusion Techniques 1 Introduction 2 Overview of Literature Survey 2.1 Level-Based Comparison of Image Fusion 2.2 Spatial and Frequency Domain 2.3 Arithmetic Based Methods 2.4 Component Substitution Methods 2.5 Multi-scale Transform Methods 2.6 Wavelet Methods 2.7 Sparse Based 2.8 Hybrid Methods 3 Metrics for Performance Evaluation 3.1 Comparison Table 4 Conclusion References Some New Methods for Ready Queue Processing Time Estimation Problem in Multiprocessing Environment 1 Introduction 2 Concept of Ready Queue 2.1 Ready Queue Estimation Problem 3 Need of Estimation 3.1 Sampling 3.2 Confidence Intervals 3.3 Auxiliary Data and Ratio Estimation 4 Contribution of Methods 5 Method of Estimation of Ready Queue in Multiprocessing Environment 6 Scheduling Approaches 7 Summary/Conclusion References Review of Various Two-Phase Authentication Mechanisms on Ease of Use and Security Enhancement Parameters 1 Introduction 1.1 Types of Authentication Mechanisms [1] 2 Literature Review 3 Conclusion References An Efficient Network Coded Routing Protocol for Delay Tolerant Network 1 Introduction 2 Related Work 3 EDIF and EPIF 3.1 EDIF 3.2 EPIF 3.3 Encoding and Decoding Process 4 Performance Evaluation 5 Conclusion 6 Future Scope References Hybrid Text Illusion CAPTCHA Dealing with Partial Vision Certainty 1 Introduction 2 Related Works 3 Problem Identification 4 Proposed Work 5 Result Analysis 6 Conclusion and Future Scope References “By Using Image Inpainting Technique Restoring Occluded Images for Face Recognition” 1 Introduction 1.1 Challenges for Face Recognition 1.2 Overview of Occlusion 1.3 Causes of Occlusion 2 Objective 2.1 Objective 3 Literature Survey 4 Analysis of Existing Systems 5 Proposed Research Methodology 5.1 Flow of Project 6 Proposed Plan of Work 7 Conclusion References Social Networking Personality Prediction and Classification Using Twitter Data 1 Introduction 2 Related Work 3 Methodology 3.1 Random Forest 3.2 K-Nearest Neighbor 3.3 Multiclass Support Vector Machine 3.4 Logistic Regression 3.5 AdaBoost 4 System Model 5 Experimental Results 6 Conclusion References A Novel Adaptive Approach for Sentiment Analysis on Social Media Data 1 Introduction 2 Literature Review 3 Sentiment Analysis on Social Networking Platforms 4 Methodology and Implementation 4.1 Data Extraction (Datasets) 4.2 API Keys and Tokens Generation 4.3 API Used 4.4 GUI Design 4.5 Algorithm Process 5 Result Analysis 6 Conclusion References Sentiment Analysis and Prediction of Election Results 2018 1 Introduction 2 Big Data History and Current Considerations 3 Big Data Analytics and Overview 4 Sentiment Analysis 5 Analysis of Data Mining Techniques for Social Network—A Review 6 Case Study: Sentiment Analysis of Assembly Election Results 6.1 Methodology 6.2 Data Collection and Preprocessing 6.3 Data Analysis 7 Experimental Result 8 Conclusion References Toward the Semantic Data Inter-processing: A Semantic Web Approach and Its Services 1 Introduction 2 Semantic Web 3 Semantic Web Vision 4 Benefits of Semantic Web 4.1 Knowledge Integration 4.2 Knowledge Construction 4.3 Knowledge Searching 4.4 Knowledge Inferencing 4.5 Knowledge Perspective 5 Applications of Semantic Web 6 Semantic Web Services 6.1 OWL-S 6.2 WSMO 6.3 WSDL-S 6.4 SAWSDL 6.5 WSMO-Lite 6.6 MicroWSMO 6.7 SA-Rest 7 Conclusion References A Big Data Parameter Estimation Approach to Develop Big Social Data Analytics Framework for Sentiment Analysis 1 Introduction 2 Big Social Media Analytics 3 Big Data Parameter Estimation 4 The Concept of Social Big Data 5 The Proposed Framework 6 Conclusion References A Novel Approach of Vertex Coloring Algorithm to Solve the K-Colorability Problem 1 Introduction 2 Related Work 3 Proposed Implementation 3.1 Implementation Platform 3.2 Algorithm Flowchart 3.3 Algorithm Methodology 3.4 Data Set Used 4 Result 5 Conclusion and Future Enhancement References Predicting the Popularity of Rumors in Social Media Using Machine Learning 1 Introduction 2 Related Work 3 Dataset Used 3.1 Data Preprocessing 4 Methodology 5 Feature Representation 5.1 Content Features 5.2 User Features 5.3 Temporal Features 6 Machine Learning Models for Rumor Popularity 7 Data Splitting and Validation 8 Evaluation 9 Analysis of Results 10 Conclusions 11 Future Scope References Optimizing Memory Space by Removing Duplicate Files Using Similarity Digest Technique 1 Introduction 2 Related Work 3 Proposed Methodology 4 Result Analysis 4.1 Time Complexity 4.2 Space Complexity 5 Conclusion References Sentiment Analysis to Recognize Emotional Distress Through Facebook Status Updates 1 Introduction 1.1 Facebook Status Updates 1.2 Objectives 2 Present Research 3 Proposed Methodology 3.1 Key Features of Status Updates 3.2 Architecture 3.3 Seed Word Creation 3.4 Sentiment Polarity Detection 4 Experimental Setup 4.1 Calculation of Degree of Emotional Distress 4.2 Impact of Frequency 4.3 Impact of Time 4.4 Impact of Affect Expressed 5 Classification Algorithms 6 Results 7 Conclusion References