100% found this document useful (1 vote)
48 views53 pages

Instant Download Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2018 Volume 2 Ajith Abraham PDF All Chapters

Technologies

Uploaded by

aritageleni1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
48 views53 pages

Instant Download Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2018 Volume 2 Ajith Abraham PDF All Chapters

Technologies

Uploaded by

aritageleni1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 53

Download the Full Version of textbook for Fast Typing at textbookfull.

com

Emerging Technologies in Data Mining and


Information Security Proceedings of IEMIS 2018
Volume 2 Ajith Abraham

https://textbookfull.com/product/emerging-technologies-in-
data-mining-and-information-security-proceedings-of-
iemis-2018-volume-2-ajith-abraham/

OR CLICK BUTTON

DOWNLOAD NOW

Download More textbook Instantly Today - Get Yours Now at textbookfull.com


Recommended digital products (PDF, EPUB, MOBI) that
you can download immediately if you are interested.

Emerging Technologies in Data Mining and Information


Security Proceedings of IEMIS 2018 Volume 1 Ajith Abraham

https://textbookfull.com/product/emerging-technologies-in-data-mining-
and-information-security-proceedings-of-iemis-2018-volume-1-ajith-
abraham/
textboxfull.com

Proceedings of the Third International Scientific


Conference “Intelligent Information Technologies for
Industry” (IITI’18): Volume 2 Ajith Abraham
https://textbookfull.com/product/proceedings-of-the-third-
international-scientific-conference-intelligent-information-
technologies-for-industry-iiti18-volume-2-ajith-abraham/
textboxfull.com

Proceedings of the Third International Scientific


Conference “Intelligent Information Technologies for
Industry” (IITI’18): Volume 1 Ajith Abraham
https://textbookfull.com/product/proceedings-of-the-third-
international-scientific-conference-intelligent-information-
technologies-for-industry-iiti18-volume-1-ajith-abraham/
textboxfull.com

Intelligent Systems Design and Applications: 18th


International Conference on Intelligent Systems Design and
Applications (ISDA 2018) held in Vellore, India, December
6-8, 2018, Volume 2 Ajith Abraham
https://textbookfull.com/product/intelligent-systems-design-and-
applications-18th-international-conference-on-intelligent-systems-
design-and-applications-isda-2018-held-in-vellore-india-
december-6-8-2018-volume-2-ajith-abraham/
textboxfull.com
Proceedings of the Future Technologies Conference FTC 2018
Volume 2 Kohei Arai

https://textbookfull.com/product/proceedings-of-the-future-
technologies-conference-ftc-2018-volume-2-kohei-arai/

textboxfull.com

Hybrid Intelligent Systems Ajith Abraham

https://textbookfull.com/product/hybrid-intelligent-systems-ajith-
abraham/

textboxfull.com

Data Management Analytics and Innovation Proceedings of


ICDMAI 2018 Volume 2 Valentina Emilia Balas

https://textbookfull.com/product/data-management-analytics-and-
innovation-proceedings-of-icdmai-2018-volume-2-valentina-emilia-balas/

textboxfull.com

Innovations in Bio Inspired Computing and Applications


Ajith Abraham

https://textbookfull.com/product/innovations-in-bio-inspired-
computing-and-applications-ajith-abraham/

textboxfull.com

New Knowledge in Information Systems and Technologies


Volume 2 Álvaro Rocha

https://textbookfull.com/product/new-knowledge-in-information-systems-
and-technologies-volume-2-alvaro-rocha/

textboxfull.com
Advances in Intelligent Systems and Computing 813

Ajith Abraham · Paramartha Dutta


Jyotsna Kumar Mandal
Abhishek Bhattacharya · Soumi Dutta
Editors

Emerging
Technologies
in Data Mining
and Information
Security
Proceedings of IEMIS 2018, Volume 2
Advances in Intelligent Systems and Computing

Volume 813

Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
e-mail: [email protected]
The series “Advances in Intelligent Systems and Computing” contains publications on theory,
applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all
disciplines such as engineering, natural sciences, computer and information science, ICT, economics,
business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the
areas of modern intelligent systems and computing such as: computational intelligence, soft computing
including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms,
social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and
society, cognitive science and systems, Perception and Vision, DNA and immune based systems,
self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics including
human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent
data analysis, knowledge management, intelligent agents, intelligent decision making and support,
intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings
of important conferences, symposia and congresses. They cover significant recent developments in the
field, both of a foundational and applicable character. An important characteristic feature of the series is
the short publication time and world-wide distribution. This permits a rapid and broad dissemination of
research results.

Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
e-mail: [email protected]
Members
Rafael Bello Perez, Universidad Central “Marta Abreu” de Las Villas, Santa Clara, Cuba
e-mail: [email protected]
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
e-mail: [email protected]
Hani Hagras, University of Essex, Colchester, UK
e-mail: [email protected]
László T. Kóczy, Széchenyi István University, Győr, Hungary
e-mail: [email protected]
Vladik Kreinovich, University of Texas at El Paso, El Paso, USA
e-mail: [email protected]
Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwan
e-mail: [email protected]
Jie Lu, University of Technology, Sydney, Australia
e-mail: [email protected]
Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexico
e-mail: [email protected]
Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazil
e-mail: [email protected]
Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Poland
e-mail: [email protected]
Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong
e-mail: [email protected]

More information about this series at http://www.springer.com/series/11156


Ajith Abraham Paramartha Dutta

Jyotsna Kumar Mandal Abhishek Bhattacharya


Soumi Dutta
Editors

Emerging Technologies
in Data Mining
and Information Security
Proceedings of IEMIS 2018, Volume 2

123
Editors
Ajith Abraham Abhishek Bhattacharya
Machine Intelligence Research Labs Institute of Engineering and Management
Auburn, WA, USA Kolkata, West Bengal, India

Paramartha Dutta Soumi Dutta


Department of Computer and System Institute of Engineering and Management
Sciences Kolkata, West Bengal, India
Visva-Bharati University
Santiniketan, West Bengal, India

Jyotsna Kumar Mandal


Department of Computer Science
and Engineering
University of Kalyani
Kalyani, India

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-981-13-1497-1 ISBN 978-981-13-1498-8 (eBook)
https://doi.org/10.1007/978-981-13-1498-8

Library of Congress Control Number: 2018947481

© Springer Nature Singapore Pte Ltd. 2019


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained herein or
for any errors or omissions that may have been made. The publisher remains neutral with regard to
jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Foreword

Welcome to the Springer International Conference on Emerging Technologies in


Data Mining and Information Security (IEMIS 2018) held from February 23 to 25,
2018, in Kolkata, India. As a premier conference in the field, IEMIS 2018 provides
a highly competitive forum for reporting the latest developments in the research and
application of information security and data mining. We are pleased to present the
proceedings of the conference as its published record. The theme of this year is
Crossroad of Data Mining and Information Security, a topic that is quickly gaining
traction in both academic and industrial discussions because of the relevance of
privacy-preserving data mining model (PPDM).
IEMIS is a young conference for research in the areas of information and
network security, data sciences, big data, and data mining. Although 2018 is the
debut year for IEMIS, it has already witnessed a significant growth. As evidence of
that, IEMIS received a record of 532 submissions. The authors of submitted papers
come from 35 countries. The authors of accepted papers are from 11 countries.
We hope that this program will further stimulate research in information security
and data mining and provide the practitioners with better techniques, algorithms and
tools for deployment. We feel honored and privileged to serve the best recent
developments in the field of WSDM to the readers through this exciting program.

Kolkata, India Bimal Kumar Roy


General Chair, IEMIS 2018
Indian Statistical Institute

v
Preface

This volume presents the proceedings of the International Conference on Emerging


Technologies in Data Mining and Information Security, IEMIS 2018, which took
place at the University of Engineering and Management, Kolkata, India, from
February 23 to 25, 2018. The volume appears in the series “Advances in Intelligent
Systems and Computing” (AISC) published by Springer Nature, one of the largest
and most prestigious scientific publishers. It is one of the fastest growing book series
in their program. AISC series publication is meant to include various high-quality
and timely publications, primarily proceedings of relevant conferences, congresses,
and symposia but also monographs, on the theory, applications, and implementa-
tions of broadly perceived modern intelligent systems and intelligent computing, in
their modern understanding, i.e., including not only tools and techniques of artificial
intelligence (AI), and computational intelligence (CI)—which includes data mining,
information security, neural networks, fuzzy systems, evolutionary computing, as
well as hybrid approaches that synergistically combine these areas—but also topics
such as multiagent systems, social intelligence, ambient intelligence, Web intelli-
gence, computational neuroscience, artificial life, virtual worlds and societies,
cognitive science and systems, perception and vision, DNA- and immune-based
systems, self-organizing and adaptive systems, e-learning and teaching, human-
centered and human-centric computing, autonomous robotics, knowledge-based
paradigms, learning paradigms, machine ethics, intelligent data analysis, and various
issues related to “big data,” security, and trust management. These areas are at the
forefront of science and technology and have been found useful and powerful in a
wide variety of disciplines such as engineering, natural sciences, computer, com-
putation and information sciences, ICT, economics, business, e-commerce, envi-
ronment, health care, life science, and social sciences. The AISC book series is
submitted for indexing to ISI Conference Proceedings Citation Index (now run by
Clarivate), Ei Compendex, DBLP, SCOPUS, Google Scholar, and SpringerLink,
and many other indexing services around the world. IEMIS 2018 is a debut annual
conference series organized by the School of Information Technology, under the
aegis of Institute of Engineering and Management, India. Its idea came from the
heritage of the other two cycles of the events, IEMCON and UEMCON, which were

vii
viii Preface

organized by the Institute of Engineering and Management under the leadership of


Prof. (Dr.) Satyajit Chakrabarti.
In this volume of “Advances in Intelligent Systems and Computing,” we would
like to present the results of studies on the selected problems of data mining and
information security. Security implementation is the contemporary answer to the
new challenges in threat evaluation of complex systems. Security approach in
theory and engineering of complex systems (not only computer systems and net-
works) is based on multidisciplinary attitude to information theory, technology, and
maintenance of the systems working in real (and very often unfriendly) environ-
ments. Such a transformation has shaped the natural evolution in the topical range
of subsequent IEMIS conferences, which can be seen over the recent years. Human
factors likewise infest the best digital dangers. Workforce administration and digital
mindfulness are fundamental for accomplishing all-encompassing cybersecurity.
This book will be of an extraordinary incentive to a huge assortment of experts,
scientists, and understudies concentrating on the human part of the Internet, and for
the compelling assessment of safety efforts, interfaces, client-focused outline and
plan for unique populaces, especially the elderly. We trust this book is instructive
yet much more than it is provocative. We trust it moves, driving peruser to examine
different inquiries, applications and potential arrangements in making sheltered and
secure plans for all.
The Program Committee of IEMIS 2018, its organizers, and the editors of this
proceedings would like to gratefully acknowledge the participation of all the
reviewers who helped to refine the contents of this volume and evaluated the
conference submissions. Our thanks go to Prof. Bimal Kumar Roy, Dr. Ajith
Abraham, Dr. Sheng-Lung peng, Dr. Detlef Streitferdt, Dr. Shaikh Fattah, Dr. Celia
Shahnaz, Dr. Swagatam Das, Dr. Niloy Ganguly, Dr. K. K. Shukla, Dr. Nilanjan
Dey, Dr. Florin PopentiuVladicescu, Dr. Dewan Md. Farid, Dr. Saptarshi Ghosh,
Dr. Rita Choudhury, Dr. Asit Kumar Das, Prof. Tanupriya Choudhury, Prof. Arijit
Ghosal, Prof. Rahul Saxena, Prof. Monika Jain, Dr. Aakanksha Sharaff, Prof. Dr.
Sajal Dasgupta, Prof. Rajiv Ganguly, and Prof. Sukalyan Goswami.
Thanking all the authors who have chosen IEMIS 2018 as the publication
platform for their research, we would like to express our hope that their papers will
help in further developments in design and analysis of engineering aspects of
complex systems, being a valuable source material for scientists, researchers,
practitioners, and students who work in these areas.

Auburn, USA Ajith Abraham


Santiniketan, India Paramartha Dutta
Kalyani, India Jyotsna Kumar Mandal
Kolkata, India Abhishek Bhattacharya
Kolkata, India Soumi Dutta
Organizing Committee

Patron

Prof. (Dr.) Satyajit Chakrabarti, Institute of Engineering and Management, India

Conference General Chair

Dr. Bimal Kumar Roy, Indian Statistical Institute, Kolkata, India

Convener

Dr. Subrata Saha, Institute of Engineering and Management, India


Abhishek Bhattacharya, Institute of Engineering and Management, India

Co-convener

Sukalyan Goswami, University of Engineering and Management, India


Krishnendu Rarhi, Institute of Engineering and Management, India
Soumi Dutta, Institute of Engineering and Management, India
Sujata Ghatak, Institute of Engineering and Management, India
Dr. Abir Chatterjee, University of Engineering and Management, India

Keynote Speakers

Dr. Ajith Abraham, Machine Intelligence Research Labs (MIR Labs), USA
Dr. Fredric M. Ham, IEEE Life Fellow, SPIE Fellow, and INNS Fellow,
Melbourne, USA
Dr. Sheng-Lung Peng, National Dong Hwa University, Hualien, Taiwan

ix
x Organizing Committee

Dr. Shaikh Fattah, Editor, IEEE Access & CSSP (Springer), Bangladesh
Dr. Detlef Streitferdt, Technische Universität Ilmenau, Germany
Dr. Swagatam Das, Indian Statistical Institute, Kolkata, India
Dr. Niloy Ganguly, Indian Institute of Technology Kharagpur, India
Dr. K. K. Shukla, IIT (B.H.U.), Varanasi, India
Dr. Nilanjan Dey, Techno India College of Technology, Kolkata, India
Dr. Florin Popentiu Vladicescu, “UNESCO Chair in Information Technologies”,
University of Oradea, Romania
Dr. Celia Shahnaz, senior member of IEEE, fellow member of Institution of
Engineers, Bangladesh (IEB)

Technical Program Committee Chair

Dr. J. K. Mondal, University of Kalyani, India


Dr. Paramartha Dutta, Visva-Bharati University, India
Abhishek Bhattacharya, Institute of Engineering and Management, India

Technical Program Committee Co-chair

Dr. Satyajit Chakrabarti, Institute of Engineering and Management, India


Dr. Subrata Saha, Institute of Engineering and Management, India
Dr. Kamakhya Prasad Ghatak, University of Engineering and Management, India
Dr. Asit Kumar Das, IIEST, Shibpur, India

Editorial Board

Dr. Ajith Abraham, Machine Intelligence Research Labs (MIR Labs), USA
Dr. J. K. Mondal, University of Kalyani, India
Dr. Paramartha Dutta, Visva-Bharati University, India
Abhishek Bhattacharya, Institute of Engineering and Management, India
Soumi Dutta, Institute of Engineering and Management, India

Advisory Committee

Dr. Mahmoud Shafik, University of Derby


Dr. MohdNazri Ismail, National Defence University of Malaysia
Dr. Bhaba R. Sarker, Louisiana State University
Dr. Tushar Kanti Bera, University of Arizona, USA
Dr. Shirley Devapriya Dewasurendra, University of Peradeniya, Sri Lanka
Dr. Goutam Chakraborty, Professor and Head of the Intelligent Informatics Lab,
Iwate Prefectural University, Japan
Dr. Basabi Chakraborty, Iwate Prefectural University, Japan
Organizing Committee xi

Dr. Kalyanmoy Deb, Michigan State University, East Lansing, USA


Dr. Vincenzo Piuri, University of Milan, Italy
Dr. Biswajit Sarkar, Hanyang University, Korea
Dr. Raj Kumar Buyya, the University of Melbourne
Dr. Anurag Dasgupta, Valdosta State University, Georgia
Dr. Prasenjit Mitra, the Pennsylvania State University
Dr. Esteban Alfaro-Cortés, University of Castilla–La Mancha, Spain
Dr. Ilkyeong Moon, Seoul National University, South Korea
Dr. Izabela Nielsen, Aalborg University, Denmark
Dr. Prasanta K. Jana, IEEE Senior Member, Indian Institute of Technology (ISM),
Dhanbad
Dr. Gautam Paul, Indian Statistical Institute, Kolkata
Dr. Malay Bhattacharyya, IIEST, Shibpur
Dr. Sipra Das Bit, IIEST, Shibpur
Dr. Jaya Sil, IIEST, Shibpur
Dr. Asit Kumar Das, IIEST, Shibpur
Dr. Saptarshi Ghosh, IIEST, Shibpur, IIT KGP
Dr. Prof. Hafizur Rahman, IIEST, Shibpur
Dr. C. K. Chanda, IIEST, Shibpur
Dr. Asif Ekbal, Associate Dean, IIT Patna
Dr. Sitangshu Bhattacharya, IIIT Allahabad
Dr. Ujjwal Bhattacharya, CVPR Unit, Indian Statistical Institute
Dr. Prashant R.Nair, Amrita Vishwa Vidyapeetham (University), Coimbatore
Dr. Tanushyam Chattopadhyay, TCS Innovation Labs, Kolkata
Dr. A. K. Nayak, Fellow and Honorary Secretarý CSI
Dr. B. K. Tripathy, VIT University
Dr. K. Srujan Raju, CMR Technical Campus
Dr. Dakshina Ranjan Kisku, National Institute of Technology, Durgapur
Dr. A. K. Pujari, University of Hyderabad
Dr. Partha Pratim Sahu, Tezpur University
Dr. Anuradha Banerjee, Kalyani Government Engineering College
Dr. Amiya Kumar Rath, Veer Surendra Sai University of Technology
Dr. Kandarpa Kumar Sharma, Gauhati University
Dr. Amlan Chakrabarti, University of Calcutta
Dr. Sankhayan Choudhury, University of Calcutta
Dr. Anjana Kakoti Mahanta, Gauhati University
Dr. Subhankar Bandyopadhyay, Jadavpur University
Dr. Debabrata Ghosh, Calcutta University
Dr. Rajat Kr. Pal, University of Calcutta
Dr. Ujjwal Maulik, Jadavpur University
Dr. Himadri Dutta, Kalyani Government Engineering College, Kalyani
Dr. Brojo Kishore Mishra, C. V. Raman College of Engineering (Autonomous),
Bhubaneswar
Dr. S. VijayakumarBharathi, Symbiosis Centre for Information Technology (SCIT)
Dr. Govinda K., VIT University, Vellore
Dr. Ajanta Das, University of Engineering and Management, India
xii Organizing Committee

Technical Committee

Dr. Vincenzo Piuri, University of Milan, Italy


Dr. Mahmoud Shafik, University of Derby
Dr. Bhaba Sarker, Louisiana State University
Dr. Mohd Nazri Ismail, University Pertahanan National Malaysia
Dr. Tushar Kanti Bera, Yonsei University, Seoul
Dr. Birjodh Tiwana, LinkedIn, San Francisco, California
Dr. Saptarshi Ghosh, IIEST, Shibpur, IIT KGP
Dr. Srimanta Bhattacharya, Indian Statistical Institute, Kolkata
Dr. Loingtam Surajkumar Singh, NIT Manipur
Dr. Sitangshu Bhattacharya, IIIT Allahabad
Dr. Sudhakar Tripathi, NIT Patna
Dr. Chandan K. Chanda, IIEST, Shibpur
Dr. Dakshina Ranjan Kisku, NIT Durgapur
Dr. Asif Ekbal, IIT Patna
Dr. Prasant Bharadwaj, NIT Agartala
Dr. Somnath Mukhopadhyay, Hijli College, Kharagpur, India, and Regional
Student Coordinator, Region II, Computer Society of India
Dr. G. Suseendran, Vels University, Chennai, India
Dr. Sumanta Sarkar, Department of Computer Science, University of Calgary
Dr. Manik Sharma, Assistant Professor, DAV University, Jalandhar
Dr. Rita Choudhury, Gauhati University
Dr. Kuntala Patra, Gauhati University
Dr. Helen K. Saikia, Gauhati University
Dr. Debasish Bhattacharjee, Gauhati University
Dr. Somenath Sarkar, University of Calcutta
Dr. Sankhayan Choudhury, University of Calcutta
Dr. Debasish De, Maulana Abul Kalam Azad University of Technology
Dr. Buddha Deb Pradhan, National Institute of Technology, Durgapur
Dr. Shankar Chakraborty, Jadavpur University
Dr. Durgesh Kumar Mishra, Sri Aurobindo Institute of Technology, Indore,
Madhya Pradesh
Dr. Angsuman Sarkar, Secretary, IEEE EDS Kolkata Chapter, Kalyani Government
Engineering College
Dr. A. M. SUDHAKARA, University of Mysore
Dr. Indrajit Saha, National Institute of Technical Teachers’ Training and Research
Kolkata
Dr. Bikash Santra, Indian Statistical Institute (ISI)
Dr. Ram Sarkar, Jadavpur University
Dr. Priya Ranjan Sinha Mahapatra, Kalyani University
Dr. Avishek Adhikari, University of Calcutta
Organizing Committee xiii

Dr. Jyotsna Kumar Mandal, Kalyani University


Dr. Manas Kumar Sanyal, Kalyani University
Dr. Atanu Kundu, Chairman, IEEE EDS, Heritage Institute of Technology, Kolkata
Dr. Chintan Kumar Mandal, Jadavpur University
Dr. Kartick Chandra Mondal, Jadavpur University
Mr. Debraj Chatterjee, Manager, Capegemini
Mr. Gourav Dutta, Cognizant Technology Solutions
Dr. Soumya Sen, University of Calcutta
Dr. Soumen Kumar Pati, St. Thomas’ College of Engineering and Technology
Mrs. Sunanda Das, Neotia Institute of Technology Management and Science, India
Mrs. Shampa Sengupta, MCKV Institute of Engineering, India
Dr. Brojo Kishore Mishra, C. V. Raman College of Engineering (Autonomous),
Bhubaneswar
Dr. S. Vijayakumar Bharathi, Symbiosis Centre for Information Technology, Pune
Dr. Govinda K., Vellore Institute of technology
Dr. Prashant R. Nair, Amrita University
Dr. Hemanta Dey, IEEE Senior Member
Dr. Ajanta Das, University of Engineering and Management, India
Dr. Samir Malakar, MCKV Institute of Engineering, Howrah
Dr. Tanushyam Chattopadhyay, TCS Innovation Lab, Kolkata
Dr. A. K. Nayak, Indian Institute of Business Management, Patna
Dr. B. K. Tripathy, Vellore Institute of Technology, Vellore
Dr. K. Srujan Raju, CMR Technical Campus, Hyderabad
Dr. Partha Pratim Sahu, Tezpur University
Dr. Anuradha Banerjee, Kalyani Government Engineering College
Dr. Amiya Kumar Rath, Veer Surendra Sai University of Technology, Odisha
Dr. S. D. Dewasurendra
Dr. Arnab K. Laha, IIM Ahmedabad
Dr. Kandarpa Kumar Sarma, Gauhati University
Dr. Ambar Dutta, BIT Mesra and Treasurer—CSI Kolkata
Dr. Arindam Pal, TCS Innovation Labs, Kolkata
Dr. Himadri Dutta, Kalyani Government Engineering College, Kalyani
Dr. Tanupriya Choudhury, Amity University, Noida, India
Dr. Praveen Kumar, Amity University, Noida, India

Organizing Chairs

Krishnendu Rarhi, Institute of Engineering and Management, India


Sujata Ghatak, Institute of Engineering and Management, India
Dr. Apurba Sarkar, IIEST, Shibpur, India
xiv Organizing Committee

Organizing Co-chairs

Sukalyan Goswami, University of Engineering and Management, India


Rupam Bhattacharya, Institute of Engineering and Management, India

Organizing Committee Convener

Dr. Sajal Dasgupta, Vice-Chancellor, University of Engineering and Management

Organizing Committee

Subrata Basak, Institute of Engineering and Management, India


Anshuman Ray, Institute of Engineering and Management, India
Rupam Bhattacharya, Institute of Engineering and Management, India
Abhijit Sarkar, Institute of Engineering and Management, India
Ankan Bhowmik, Institute of Engineering and Management, India
Manjima Saha, Institute of Engineering and Management, India
Biswajit Maity, Institute of Engineering and Management, India
Soumik Das, Institute of Engineering and Management, India
Sreelekha Biswas, Institute of Engineering and Management, India
Nayantara Mitra, Institute of Engineering and Management, India
Amitava Chatterjee, Institute of Engineering and Management, India
Ankita Mondal, Institute of Engineering and Management, India

Registration Chairs

Abhijit Sarkar, Institute of Engineering and Management, India


Ankan Bhowmik, Institute of Engineering and Management, India
Ankita Mondal, Institute of Engineering and Management, India
Ratna Mondol, Institute of Engineering and Management, India

Publication Chairs

Dr. Debashis De, Maulana Abul Kalam Azad University of Technology, India
Dr. Kuntala Patra, Gauhati University, India
Organizing Committee xv

Publicity and Sponsorship Chair

Dr. J. K. Mondal, University of Kalyani, India


Dr. Paramartha Dutta, Visva-Bharati University, India
Abhishek Bhattacharya, Institute of Engineering and Management, India
Biswajit Maity, Institute of Engineering and Management, India
Soumik Das, Institute of Engineering and Management, India

Treasurer and Conference Secretary

Dr. Subrata Saha, Institute of Engineering and Management, India


Rupam Bhattacharya, Institute of Engineering and Management, India
Krishnendu Rarhi, Institute of Engineering and Management, India

Hospitality and Transport Chair

Soumik Das, Institute of Engineering and Management, India


Nayantara Mitra, Institute of Engineering and Management, India
Manjima Saha, Institute of Engineering and Management, India
Sreelekha Biswas, Institute of Engineering and Management, India
Amitava Chatterjee, Institute of Engineering and Management, India

Web Chair

Samrat Goswami
Samrat Dey
About this Book

This book features research papers presented at the International Conference on


Emerging Technologies in Data Mining and Information Security (IEMIS 2018)
held at the University of Engineering and Management, Kolkata, India, from
February 23 to 25, 2018.
Data mining is currently a well-known topic in mirroring the exertion of finding
learning from information. It gives the strategies that enable supervisors to acquire
administrative data from their heritage frameworks. Its goal is to distinguish
legitimate, novel, and possibly valuable and justifiable connection and examples in
information. Information mining is made conceivable by the very nearness of the
expansive databases.
Information security advancement is an essential part to ensure open and private
figuring structures. With the use of information development applications in all
cases, affiliations are ending up more aware of the security risks to their benefits.
Notwithstanding how strict the security techniques and parts are, more affiliations
are getting the chance to be weak to a broad assortment of security breaks against
their electronic resources. Network‐intrusion area is a key protect part against
security perils, which have been growing in rate generally.
This book comprises high-quality research work by academicians and industrial
experts in the field of computing and communication, including full-length papers,
research-in-progress papers and case studies related to all the areas of data mining,
machine learning, Internet of things (IoT) and information security.

xvii
Contents

Part I Data Analytics


Sentiment Analysis of Tweet Data: The Study of Sentimental State
of Human from Tweet Text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
S. M. Mazharul Hoque Chowdhury, Priyanka Ghosh, Sheikh Abujar,
Most. Arina Afrin and Syed Akhter Hossain
Data Analytic Techniques with Hardware-Based Encryption
for High-Profile Dataset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
M. Sharmila Begum and A. George
Exploring Student Migration in Rural Region of Bangladesh . . . . . . . . 25
Arafat Bin Hossain, Sakibul Mowla, Sheikh Nabil Mohammad
and Md. R. Amin
Analysis on Lightning News and Correlation with Lightning Imaging
Sensor (LIS) Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Sunny Chowdhury, K. M. Sajjadul Islam, Sheikh Nabil Mohammad,
Md. R. Amin and Choudhury Wahid
A Computational Approach for Project Work Performance Analysis
Based on Online Collaborative Data . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Nikitaben P. Shelke and Poonam Gupta
Design of Business Canvas Model for Social Media . . . . . . . . . . . . . . . . 63
Jan Hruska and Petra Maresova
Horticultural Approach for Detection, Categorization and
Enumeration of On Plant Oval Shaped Fruits . . . . . . . . . . . . . . . . . . . . 71
Santi Kumari Behera, Junali Jasmine Jena, Amiya Kumar Rath
and Prabira Kumar Sethy

xix
xx Contents

A Novel Deterministic Framework for Non-probabilistic


Recommender Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Avinash Bhat, Divya Madhav Kamath and C. Anitha
EEG Signal Analysis Using Different Clustering Techniques . . . . . . . . . 99
Chinmaya Kumar Pradhan, Shariar Rahaman, Md. Abdul Alim Sheikh,
Alok Kole and Tanmoy Maity
Automatic Geospatial Objects Classification from
Satellite Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Shariar Rahaman, Md. Abdul Alim Sheikh, Alok Kole, Tanmoy Maity
and Chinmaya Kumar Pradhan
RAiTA: Recommending Accepted Answer Using
Textual Metadata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Md. Mofijul Islam, Sk. Shariful Islam Arafat, Md. Shakil Hossain,
Md. Mahmudur Rahman, Md. Mahmudul Hasan, S. M. Al-Hossain Imam,
Swakkhar Shatabda and Tamanna Islam Juthi
LIUBoost: Locality Informed Under-Boosting for Imbalanced
Data Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Sajid Ahmed, Farshid Rayhan, Asif Mahbub, Md. Rafsan Jani,
Swakkhar Shatabda and Dewan Md. Farid
Comparative Study of Different Ensemble Compositions in EEG
Signal Classification Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Ankita Datta and Rajdeep Chatterjee
Improving Quality of Fruits Picked in Orchards Using Mahalanobis
Distance Based Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Kalaivanan Sandamurthy and Kalpana Ramanujam
Viable Crop Prediction Scenario in BigData Using a
Novel Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Shriya Sahu, Meenu Chawla and Nilay Khare
A Graph Based Approach on Extractive Summarization . . . . . . . . . . . . 179
Madhurima Dutta, Ajit Kumar Das, Chirantana Mallick, Apurba Sarkar
and Asit K. Das
Targeted Marketing and Market Share Analysis on POS Payment
Data Using DW and OLAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Giridhar Maji, Lalmohan Dutta and Soumya Sen
Promises and Challenges of Big Data in a Data-Driven World . . . . . . . 201
Sonali Mukherjee, Manoj Kumar Mishra and Bhabani Shankar
Prasad Mishra
Contents xxi

Accelerating Pairwise Sequence Alignment Algorithm by MapReduce


Technique for Next-Generation Sequencing (NGS) Data Analysis . . . . . 213
Sudip Mondal and Sunirmal Khatua
Entity Resolution in Online Multiple Social Networks
(@Facebook and LinkedIn) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Ravita Mishra
Big Data Approach for Epidemiology and Prevention
of HIV/AIDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Nivedita Das, Sandeep Agarwal, Siddharth Swarup Rautaray
and Manjusha Pandey
A Survey on Local Market Analysis for a Successful
Restaurant Yield . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Bidisha Das Baksi, Varsha Rao and C. Anitha
Context Dependency Relation Extraction Using Modified
Evolutionary Algorithm Based on Web Mining . . . . . . . . . . . . . . . . . . . 259
Parinda Prajapati and Premkumar Sivakumar
NoSQL Overview and Performance Testing of HBase Over
Multiple Nodes with MySQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Nabanita Das, Swagata Paul, Bidyut Biman Sarkar
and Satyajit Chakrabarti
NO SQL Approach for Handling Bioinformatics Data Using
MongoDB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Swaroop Chigurupati, Kiran Vegesna, L. V. Siva Rama Krishna Boddu,
Gopala Krishna Murthy Nookala and Suresh B. Mudunuri
Thunderstorm Characteristics Over the Northeastern Region (NER)
of India During the Pre-monsoon Season, 2011 Using Geosynchronous
Satellite Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Sandeep Thakur, Ismail Mondal, Phani Bhushan Ghosh
and Tarun Kumar De
A Novel Approach to Spam Filtering Using Semantic Based
Naive Bayesian Classifier in Text Analytics . . . . . . . . . . . . . . . . . . . . . . 301
Ritik Mallik and Abhaya Kumar Sahoo
A Proposed Approach for Improving Hadoop Performance
for Handling Small Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Arnab Karan, Siddharth Swarup Rautaray and Manjusha Pandey
To Ameliorate Classification Accuracy Using Ensemble
Vote Approach and Base Classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Mudasir Ashraf, Majid Zaman and Muheet Ahmed
xxii Contents

Big Data Ecosystem: Review on Architectural Evolution . . . . . . . . . . . . 335


Kamakhya Narain Singh, Rajat Kumar Behera and Jibendu Kumar Mantri
A Comparative Study of Local Outlier Factor Algorithms
for Outliers Detection in Data Streams . . . . . . . . . . . . . . . . . . . . . . . . . 347
Supriya Mishra and Meenu Chawla
Context Level Entity Extraction Using Text Analytics
with Big Data Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Papiya Das, Kashyap Barua, Manjusha Pandey
and Siddharth Swarup Routaray
A Novel Hybrid Approach for Time Series Data Forecasting
Using Moving Average Filter and ARIMA-SVM . . . . . . . . . . . . . . . . . . 369
Gurudev Aradhye, A. C. S. Rao and M. D. Mastan Mohammed
Social Network Analysis with Collaborative Learning: A Review . . . . . 383
Abhishek Kashyap and Sri Khetwat Saritha
Frequent Subpatterns Distribution in Social Network Analysis . . . . . . . 393
Rahul Rane
Big Data Real-Time Storytelling with Self-service Visualization . . . . . . . 405
Rajat Kumar Behera and Anil Kumar Swain
Informative Gene Selection Using Clustering and Gene Ontology . . . . . 417
Soumen K. Pati, Subhankar Mallick, Aruna Chakraborty and Ankur Das

Part II Data Mining


Identifying Categorical Terms Based on Latent Dirichlet Allocation
for Email Categorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
Aakanksha Sharaff and Naresh Kumar Nagwani
The Role of Social Media in Crisis Situation
Management: A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
Akanksha Goel, Manomita Chakraborty and Saroj Kumar Biswas
Subset Significance Threshold: An Effective Constraint Variable
for Mining Significant Closed Frequent Itemsets . . . . . . . . . . . . . . . . . . 449
S. Pavitra Bai and G. K. Ravi Kumar
An Automated Method for Power Line Points Detection from
Terrestrial LiDAR Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Arshad Husain and Rakesh Chandra Vaishya
Stochastic Petri Net Based Modeling for Analyzing Dependability
of Big Data Storage System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
Durbadal Chattaraj, Monalisa Sarma and Debasis Samanta
Contents xxiii

Sachetan: A Crowdsource-Based Personal Safety Application . . . . . . . . 485


Sheikh Nabil Mohammad, Sakhawat Hossain, Md. Mustafijur Rahman,
Mithun Das and Md. R. Amin
Cyberbullying and Self-harm in Adolescence, an Assessment
of Detection, Prevention, and Recovery from Forum . . . . . . . . . . . . . . . 497
A. Sandrine Pricilla, I. Anandhi and J. I. Sheeba
Visual Verification and Analysis of Outliers Using Optimal Outlier
Detection Result by Choosing Proper Algorithm and Parameter . . . . . . 507
Bilkis Jamal Ferdosi and Muhammad Masud Tarek
Identification of the Recurrence of Breast Cancer by Discriminant
Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
Avijit Kumar Chaudhuri, D. Sinha and K. S. Thyagaraj
Automatic Multi-class Classification of Beetle Pest Using Statistical
Feature Extraction and Support Vector Machine . . . . . . . . . . . . . . . . . . 533
Abhishek Dey, Debasmita Bhoumik and Kashi Nath Dey
Probabilistic Dimension Reduction Method for Privacy Preserving
Data Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
Hanumantha Rao Jalla and P. N. Girija
Spam Detection in SMS Based on Feature Selection Techniques . . . . . . 555
Aakanksha Sharaff
Recent Trends of Data Mining in Cloud Computing . . . . . . . . . . . . . . . 565
Abhijit Sarkar, Abhishek Bhattacharya, Soumi Dutta and Komal K. Parikh
Impact of Data Mining Techniques in Predictive Modeling:
A Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
Suparna DasGupta, Soumyabrata Saha and Suman Kumar Das
Distortion-Based Privacy-Preserved Association Rules Mining
Without Side Effects Using Closed Itemsets . . . . . . . . . . . . . . . . . . . . . . 591
H. Surendra and H. S. Mohan
A Data Warehouse Based Schema Design on Decision-Making
in Loan Disbursement for Indian Advance Sector . . . . . . . . . . . . . . . . . 603
Ishita Das, Santanu Roy, Amlan Chatterjee and Soumya Sen
Analysis and Design of an Efficient Temporal Data Mining Model
for the Indian Stock Market . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Cerene Mariam Abraham, M. Sudheep Elayidom and T. Santhanakrishnan
Shilling Attack Detection in Recommender System Using PCA
and SVM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
Noopur Samaiya, Sandeep K. Raghuwanshi and R. K. Pateriya
xxiv Contents

A Hybrid Clustering Algorithm Based on Kmeans and Ant Lion


Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
Santosh Kumar Majhi and Shubhra Biswal
Flight Arrival Delay Prediction Using Gradient
Boosting Classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
Navoneel Chakrabarty, Tuhin Kundu, Sudipta Dandapat, Apurba Sarkar
and Dipak Kumar Kole
The Prediction of Traffic Flow with Regression Analysis . . . . . . . . . . . . 661
Ishteaque Alam, Dewan Md. Farid and Rosaldo J. F. Rossetti
SBi-MSREimpute: A Sequential Biclustering Technique Based on
Mean Squared Residue and Euclidean Distance to Predict Missing
Values in Microarray Gene Expression Data . . . . . . . . . . . . . . . . . . . . . 673
Sourav Dutta, Mithila Hore, Faraz Ahmad, Anam Saba, Manuraj Kumar
and Chandra Das
FTD Tree Based Classification Model for Alzheimer’s Disease
Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
Bala Brahmeswara Kadaru, M. Uma Maheswara Rao and S. Narayana
Data Mining in Frequent Pattern Matching Using Improved
Apriori Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
Bhukya Krishna and Geetanjali Amarawat
A Model for Predicting Outfit Sales: Using Data
Mining Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711
Mohammad Aman Ullah
A Novel Feature Selection Technique for Text Classification . . . . . . . . . 721
D. S. Guru, Mostafa Ali and Mahamad Suhil
Prediction of Death Rate Using Regression Analysis . . . . . . . . . . . . . . . 735
Satya Ranjan Dash and Rekha Sahu
An Investigative Prolegomenon on Various Clustering Strategies,
Their Resolution, and Future Direction Towards Wireless Sensor
Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 747
Sushree Bibhuprada B. Priyadarshini, Amiya Bhusan Bagjadab,
Suvasini Panigrhi and Brojo Kishore Mishra
A Comparison Study of Temporal Signature Mining Over Traditional
Data Mining Techniques to Detect Network Intrusion . . . . . . . . . . . . . . 757
Sharmishtha Dutta, Tanjila Mawla and Md. Forhad Rabbi
An Optimized Random Forest Classifier for Diabetes Mellitus . . . . . . . 765
N. Komal Kumar, D. Vigneswari, M. Vamsi Krishna
and G. V. Phanindra Reddy
Contents xxv

Development of Cardiac Disease Classifier Using Rough


Set Decision System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 775
B. Halder, S. Mitra and M. Mitra
Decision Support System for Prediction of Occupational Accident:
A Case Study from a Steel Plant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 787
Sobhan Sarkar, Mainak Chain, Sohit Nayak and J. Maiti
Community Detection Based Tweet Summarization . . . . . . . . . . . . . . . . 797
Soumi Dutta, Asit Kumar Das, Abhishek Bhattacharya, Gourav Dutta,
Komal K. Parikh, Atin Das and Dipsa Ganguly
Heart Diseases Prediction System Using CHC-TSS Evolutionary,
KNN, and Decision Tree Classification Algorithm . . . . . . . . . . . . . . . . . 809
Rishabh Saxena, Aakriti Johri, Vikas Deep and Purushottam Sharma
Electrofacies Analysis of Well Log Data Using Data Mining
Algorithm: A Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
Sanjukta De, Gandhar Pramod Nigudkar and Debashish Sengupta
A Dynamic Spatial Fuzzy C-Means Clustering-Based Medical
Image Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829
Amiya Halder, Avranil Maity, Apurba Sarkar and Ananya Das
Text-Based Emotion Analysis: Feature Selection Techniques
and Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 837
Prathamesh Apte and Saritha Sri Khetwat
Community Detection Methods in Social Network Analysis . . . . . . . . . 849
Iliho and Sri Khetwat Saritha
Summarizing Microblogs During Emergency Events: A Comparison
of Extractive Summarization Algorithms . . . . . . . . . . . . . . . . . . . . . . . . 859
Soumi Dutta, Vibhash Chandra, Kanav Mehra, Sujata Ghatak,
Asit Kumar Das and Saptarshi Ghosh
A Comparative Study on Cluster Analysis of Microblogging Data . . . . . 873
Soumi Dutta, Asit Kumar Das, Gourav Dutta and Mannan Gupta
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 883
About the Editors

Dr. Ajith Abraham received his Ph.D. from Monash University, Melbourne,
Australia, and his M.Sc. from Nanyang Technological University, Singapore. His
research and development experience includes over 25 years in the industry and
academia, spanning different continents such as Australia, America, Asia, and
Europe. He works in a multidisciplinary environment involving computational
intelligence, network security, sensor networks, e-commerce, Web intelligence,
Web services, computational grids, and data mining, applied to various real-world
problems. He has authored/co-authored over 350 refereed journal/conference papers
and chapters, and some of the papers have also won the best paper awards at
international conferences and also received several citations. Some of the articles
are available in the ScienceDirect Top 25 hottest articles ! http://top25.
sciencedirect.com/index.php?cat_id=6&subject_area_id=7.
He has given more than 20 plenary lectures and conference tutorials in these
areas. He serves the editorial board of several reputed international journals and has
also guest-edited 26 special issues on various topics. He is actively involved in the
hybrid intelligent systems (HISs), intelligent systems design and applications
(ISDA), and information assurance and security (IAS) series of international
conferences. He is General Co-Chair of the Tenth International Conference on
Computer Modeling and Simulation (UKSIM’08), Cambridge, UK; Second Asia
International Conference on Modeling and Simulation (AMS 2008), Malaysia;
Eighth International Conference on Intelligent Systems Design and Applications
(ISDA’08), Taiwan; Fourth International Symposium on Information Assurance
and Security (IAS’07), Italy; Eighth International Conference on Hybrid Intelligent
Systems (HIS’08), Spain; Fifth IEEE International Conference on Soft Computing
as Transdisciplinary Science and Technology (CSTST’08), Cergy Pontoise, France;
and Program Chair/Co-chair of Third International Conference on Digital
Information Management (ICDIM’08), UK, and Second European Conference on
Data Mining (ECDM 2008), the Netherlands.

xxvii
xxviii About the Editors

He is Senior Member of IEEE, IEEE Computer Society, IEE (UK), ACM, etc.
More information is available at: http://www.softcomputing.net.

Dr. Paramartha Dutta was born in 1966. He completed his bachelor’s and mas-
ter’s degrees in statistics from the Indian Statistical Institute, Calcutta, in the years
1988 and 1990, respectively. He afterward completed his M.Tech. in computer
science from the same institute in 1993 and Ph.D. in Engineering from the Bengal
Engineering and Science University, Shibpur, in 2005. He has served in the capacity
of research personnel in various projects funded by Government of India, which are
done by Defence Research Development Organization, Council of Scientific and
Industrial Research, Indian Statistical Institute, etc. He is now Professor in the
Department of Computer and System Sciences of the Visva-Bharati University,
West Bengal, India. Prior to this, he served Kalyani Government Engineering
College and College of Engineering in West Bengal as Full-Time Faculty Member.
He remained associated as Visiting/Guest Faculty of several universities/institutes
such as West Bengal University of Technology, Kalyani University, Tripura
University.
He has co-authored eight books and has also seven edited books to his credit. He
has published more than two hundred technical papers in various peer-reviewed
journals and conference proceedings, both international and national, several
chapters in edited volumes of reputed international publishing houses like Elsevier,
Springer-Verlag, CRC Press, John Wiley. He has guided six scholars who had
already been awarded their Ph.D. apart from one who has submitted her thesis.
Presently, he is supervising six scholars for their Ph.D. program.
He is Co-Inventor of ten Indian patents and one international patent, which are all
published apart from five international patents which are filed but not yet published.
He, as investigator, could implement successfully the projects funded by All
India Council for Technical Education, Department of Science and Technology
of the Government of India. He has served/serves in the capacity of external
member of Board of Studies of relevant departments of various universities
encompassing West Bengal University of Technology, Kalyani University, Tripura
University, Assam University, Silchar. He had the opportunity to serve as the expert
of several interview boards organized by West Bengal Public Service Commission,
Assam University, Silchar; National Institute of Technology, Arunachal Pradesh;
Sambalpur University, etc.
He is Life Fellow of the Optical Society of India (FOSI), Institution of Electronics
and Telecommunication Engineers (IETE), Institute of Engineering (FIE), Life
Member of Computer Society of India (LMCSI), Indian Science Congress
Association (LMISCA), Indian Society for Technical Education (LMISTE), Indian
Unit of Pattern Recognition and Artificial Intelligence (LMIUPRAI)—the Indian
affiliate of the International Association for Pattern Recognition (IAPR), and Senior
Member of Associated Computing Machinery (SMACM), and Institution of
Electronics and Electrical Engineers (SMIEEE), USA.
About the Editors xxix

Dr. Jyotsna Kumar Mandal received his M.Tech. in computer science from
University of Calcutta in 1987. He was awarded Ph.D. in computer science and
engineering by Jadavpur University in 2000. Presently, he is working as Professor
of computer science and engineering and Former Dean, Faculty of Engineering,
Technology and Management, Kalyani University, Kalyani, Nadia, West Bengal,
for two consecutive terms since 2008. He is Ex-Director, IQAC, Kalyani
University, and Chairman, CIRM, Kalyani University. He was appointed as
Professor in Kalyani Government Engineering College through Public Service
Commission under the Government of West Bengal. He started his career as
Lecturer at NERIST, under MHRD, Government of India, Arunachal Pradesh, in
September 1988. He has teaching and research experience of 30 years. His areas of
research are coding theory, data and network security; remote sensing and
GIS-based applications, data compression, error correction, visual cryptography,
and steganography. He has guided 21 Ph.D. scholars, 2 scholars have submitted
their Ph.D. thesis, and 8 are pursuing. He has supervised 03 M.Phil. and more than
50 M.Tech. dissertations and more than 100 M.C.A. dissertations. He is Chief
Editor of CSI Journal of Computing and Guest Editor of MST Journal (SCI
indexed) of Springer Nature. He has published more than 400 research articles, out
of which 154 articles are in various international journals. He has published 5 books
from LAP Germany and one from IGI Global. He was awarded A. M. Bose
Memorial Silver Medal and Kali Prasanna Dasgupta Memorial Silver Medal in
M.Sc. by Jadavpur University. India International Friendship Society (IIFS), New
Delhi, conferred “Bharat Jyoti Award” for his meritorious service, outstanding
performance, and remarkable role in the field of computer science and engineering
on August 29, 2012. He received “Chief Patron” Award from CSI India in 2014.
International Society for Science, Technology and Management conferred
“Vidyasagar Award” in the Fifth International Conference on Computing,
Communication and Sensor Network on December 25, 2016. ISDA conferred
Rastriya Pratibha Award in 2017.

Abhishek Bhattacharya is Assistant Professor of computer application depart-


ment at the Institute of Engineering and Management, India. He did his Masters in
computer science from the Biju Patnaik University of Technology and completed
his M.Tech. in computer science from BIT, Mesra. He remained associated as
Visiting/Guest Faculty of several universities/institutes in India. He has three books
to his credit. He has published twenty technical papers in various peer-reviewed
journals and conference proceedings, both international and national, and chapters
in edited volumes of the reputed international publishing houses. He has teaching
and research experience of 13 years. His areas of research are data mining, network
security, mobile computing, and distributed computing. He is the reviewer of a
couple of journals of IGI Global, Inderscience Publications, and Journal of
Information Science Theory and Practice, South Korea.
He is Member of International Association of Computer Science and
Information Technology (IACSIT), Universal Association of Computer and
Electronics Engineers (UACEE), International Association of Engineers (IAENG),
xxx About the Editors

Internet Society as a Global Member (ISOC), the Society of Digital Information and
Wireless Communications (SDIWC) and International Computer Science and
Engineering Society (ICSES); Technical Committee Member of CICBA 2017,
52nd Annual Convention of Computer Society of India (CSI 2017), International
Conference on Futuristic Trends in Network and Communication Technologies
(FTNCT-2018), ICIoTCT 2018, ICCIDS 2018, and Innovative Computing and
Communication (ICICC-2018); Advisory Board Member of ISETIST 2017.

Soumi Dutta is Assistant Professor at the Institute of Engineering and


Management, India. She is also pursuing her Ph.D. in the Department of Computer
Science and Technology, Indian Institute of Engineering Science and Technology,
Shibpur. She received her B.Tech. in information technology and her M.Tech. in
computer science securing first position (gold medalist), both from Techno India
Group, India. His research interests include social network analysis, data mining,
and information retrieval. She is Member of several technical functional bodies
such as the Michigan Association for Computer Users in Learning (MACUL), the
Society of Digital Information and Wireless Communications (SDIWC), Internet
Society as a Global Member (ISOC), International Computer Science and
Engineering Society (ICSES). She has published several papers in reputed journals
and conferences.
Part I
Data Analytics
Sentiment Analysis of Tweet Data:
The Study of Sentimental State
of Human from Tweet Text

S. M. Mazharul Hoque Chowdhury, Priyanka Ghosh, Sheikh Abujar,


Most. Arina Afrin and Syed Akhter Hossain

Abstract Sentiment analysis is a hot topic today. The purpose of this research is
finding out sentimental state of a person or a group of people using data mining. The
target of this research is building a user friendly interface for general people, so that
they will be able to see the analysis report very easily. This analysis process contains
both supervised and unsupervised learning, which is a hybrid process. Analysis is
done based on keywords, which is defined by the user. User is able to set the number
of tweets he/she wants to analyze. We used web-based library for the system. The
system is tested and found satisfactory result.

Keywords Emotion · Polarity · R · Sentiment analysis · Scores · Social media


Twitter · Word cloud

1 Introduction

At present, social media or websites like Facebook, Twitter, Google + are top-visited
website and part and parcel of most of the people around all over the world. They
communicate to each other, post their opinion and reviews, share their likes and

S. M. M. H. Chowdhury (B) · P. Ghosh · S. Abujar · Most. Arina Afrin · S. Akhter Hossain


Department of Computer Science and Engineering, Daffodil International University,
Dhanmondi, Dhaka 1205, Bangladesh
e-mail: [email protected]
P. Ghosh
e-mail: [email protected]
S. Abujar
e-mail: [email protected]
Most. Arina Afrin
e-mail: [email protected]
S. Akhter Hossain
e-mail: [email protected]

© Springer Nature Singapore Pte Ltd. 2019 3


A. Abraham et al. (eds.), Emerging Technologies in Data Mining and Information
Security, Advances in Intelligent Systems and Computing 813,
https://doi.org/10.1007/978-981-13-1498-8_1
Exploring the Variety of Random
Documents with Different Content
of ‘Beauty and the Beast’ when I am with you. It is not that I wish you
less fair, my lady, or that until recently I have ever given much
thought to my own unhappy appearance.”
Nona laughed, having by this time entirely forgotten that she had
ever considered her companion less interesting and less good
looking than she did at present. For, of course, she had come to the
frequent feminine conclusion that she infinitely preferred a man to be
clever and well bred in his appearance than merely conventionally
handsome.
“Don’t stop walking, please, Philip,” she returned, not answering his
foolish speech. “We have only a little while together. I promised
Gene we would not be long. Surely you haven’t anything
uncomfortable to tell me tonight.”
Philip did not walk on, however, so that Nona stood still, but turned
her eyes up toward the sky. She had the impression one so often
has that assuredly she was seeing more stars tonight than ever
before.
“Would you mind looking at me for a moment, please, Nona?” Philip
Dawson suggested, and Nona realized that his voice was not
entirety steady, in spite of its humorous inflection.
“I hope you may not think that what I mean to tell you is
uncomfortable. You see, to me it is as big and as vastly important as
the sky over our heads. And this is not so absurd as it sounds. I love
you, Nona, and I am going to start to the United States tomorrow. I
have some information which the editor of my paper thinks I had best
not try to write over here, but must bring to him in person.”
“But you will be coming back,” Nona answered, with the feminine
impulse of putting off facing a situation.
“Only if you say you care for me and wish me to come, Nona. As far
as my work goes, I have no idea where I may be sent after my return
to the United States. But I shall try to come back to France.”
“You don’t mean you expect me to say just how I feel toward you
tonight, Philip, when you have never suggested you were in love with
me before,” Nona returned almost indignantly.
It struck her that Philip Dawson would not be like a good many other
men. If she told him she did not love him tonight, he would not offer
his love to her again. The idea made her indignant, and yet if she
were never to see him after this—yet how could she know her own
desire?
“I don’t think you are fair, Philip,” Nona answered.
“No, I suppose not,” he returned. “You see, Nona, I had not thought
of being fair. I only thought, when the news came so suddenly that I
must part from you, of how much I cared for you and hoped you felt
as I do.”
Crossing his hands behind him, Philip walked up and down with that
little trick of having his head slightly in front of him, which amused
Nona always and with which she had grown so familiar. It rather hurt
her now, as she stood watching him.
Surely in the three years of her war nursing she should have grown
accustomed to the everlasting partings for which, among its other
sorrows, war is responsible. Yet lately had she not allowed herself to
grow dependent upon her friendship with Philip Dawson, believing
that as his work was to report the news of the American camp, he
would remain in the same neighborhood as long as she remained?
But certainly she had not thought of him as her lover. Their friendship
had only been more interesting than any other.
“Won’t you marry me, Nona, when I can come back for you, and not
let us discuss being fair just at present?” Philip Dawson protested
with a kind of whimsical appeal which was also characteristic of him.
But Nona remained silent.
The moment before she had been surprised now she saw what was
at stake with almost painful clearness. Whether she was to lose her
friend and lover as well, Nona could not answer him tonight. She had
been right, Philip had not been fair.
Men are frequently not fair to girls in this self-same way They will
suddenly ask her for all she has to give, her love and the hazard of
her life as well, expecting her to have understood and made up her
mind before he has spoken. Yet now and then, following this plan,
girls have made a tragic mistake. Nona had come near this mistake
once, but in Philip Dawson’s case she had not repeated it.
“I am sorry to have you go, Philip, and I shall miss you dreadfully, I
don’t care to think how much. But I can’t make you any promise, I
can’t answer your question now. If you don’t care for me enough to
wait until we have been parted and I have time to think——”
Philip Dawson made an impatient movement.
“Nona, dear, of course I’ll wait if I must. You give me no choice. But I
do wish you would remember that I belong to the most impatient
profession in the world and that it is a great mistake to spend
valuable time in life in making decisions. Will you write me to Paris?”
Nona laughed and slipped her arm through her companion’s.
“Yes, I will write you to Paris and you need not inform me how
impatient you are. I don’t how a great deal about you, but I do know
that much.”
Then for the next ten minutes the girl and man walked up and down
in the garden, talking, perhaps, of other things, but thinking only of
their farewell. Nevertheless, Nona was obdurate in her decision and
it was, perhaps, as well for their future that Philip Dawson learned
tonight she could hold out against his wish. There were not many
people in his world who did this for long.
There was a gate before the hospital and she said good-bye to him
standing outside. Just for an instant as she saw his long, slender
figure disappearing, Nona had the impulse to call him back. The
United States seemed so uncomfortably far away. Nona resisted her
inclination.
Besides, almost at the same time an unexpected sound attracted her
attention.
Except for Philip who was moving rapidly out of sight, the road
before the hospital had appeared to be empty.
It was about ten o’clock and there were no carts or trucks filled with
provisions on their way to the camp. The movement back and forth
between the neighboring villages took place in the early morning and
during the day.
Yet Nona saw two figures coming from the village toward the hospital
and from the opposite direction to the one Philip Dawson had used.
Possibly someone had been taken suddenly ill and was being
brought to the hospital for care.
A moment later Nona recognized that the newcomers were women,
and then that they were Madame Bonnèt and Berthe.
With an exclamation of surprise she made a little rush forward, trying
to take hold of Madame Bonnèt’s hand.
But in her hand and pressed close against her Nona discovered that
she held something warm and soft, which fluttered and made gentle
noises.
“Why, Madame Bonnèt, is there anything the matter? Are either you
or Berthe ill? Won’t you come in and let me find Eugenia?”
Madame Bonnèt shook her head.
“No, my dear, my errand is to you and it is rather a surprising one.”
She held out the carrier pigeon, which she had been holding in her
hand.
“Do you remember one day you asked me to name one of my carrier
pigeons for you and tied a little coin about its throat so we could
know it? Well, I gave that particular pigeon to Captain Martin by his
request, when he went away. And tonight, dear, the pigeon came
winging back home. Berthe and I found her just reaching the dove
cote, after twilight, and bearing this letter addressed to you. We
brought it to you at once. Of course the message may be only a
personal one, but then none of us know where the American soldiers
have gone or what may have happened to them and the word may
bring news of importance. I confess I am frightened.”
And Madame Bonnèt paused, a little out of breath from nervousness
and her rapid walk.
Nona’s own hands shook as she opened the letter brought her by so
strange and gentle a messenger from an unknown place.
She had a flashlight, which she always carried, so that she could
read it quickly.
“No, Madame Bonnèt, the letter is only personal. I am sorry you
hurried to bring it to me,” Nona explained, wondering if Madame
Bonnèt and Berthe were as amazed as she was by Captain Martin’s
action, and also wondering how much she betrayed her own
confusion.
But, fortunately, Madame Bonnèt and Berthe insisted on returning
home immediately, so that Nona could go upstairs to her room alone.
If she had been surprised earlier in the evening, she was the more
so now. Captain Martin had written her a letter which one might have
believed a poet could have written, never a soldier. Certainly she had
misunderstood his character. But then do men and women ever
understand each other?
However, Nona’s last thought was that she would ask Philip Dawson
to call upon Sonya Valesky in New York—and then if Sonya liked him

However, Nona really knew that no one’s opinion would make a
great deal of difference now that she was infinitely surer of her own
mind than she would have believed possible an hour before.
Well, she had kept faith with herself after all, having always insisted
if she ever married she wished an American husband, and now she
had found him in France.
But France was to set her seal upon American lives and hearts in
many ways before this war ended. The American solders’ work in
France had only just begun.
THE END.
TRANSCRIBER’S NOTES:
Obvious typographical errors have been corrected.
Inconsistencies in hyphenation have been
standardized.
Archaic or variant spelling has been retained.
*** END OF THE PROJECT GUTENBERG EBOOK THE RED
CROSS GIRLS WITH THE STARS AND STRIPES ***

Updated editions will replace the previous one—the old editions


will be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright
in these works, so the Foundation (and you!) can copy and
distribute it in the United States without permission and without
paying copyright royalties. Special rules, set forth in the General
Terms of Use part of this license, apply to copying and
distributing Project Gutenberg™ electronic works to protect the
PROJECT GUTENBERG™ concept and trademark. Project
Gutenberg is a registered trademark, and may not be used if
you charge for an eBook, except by following the terms of the
trademark license, including paying royalties for use of the
Project Gutenberg trademark. If you do not charge anything for
copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such
as creation of derivative works, reports, performances and
research. Project Gutenberg eBooks may be modified and
printed and given away—you may do practically ANYTHING in
the United States with eBooks not protected by U.S. copyright
law. Redistribution is subject to the trademark license, especially
commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the


free distribution of electronic works, by using or distributing this
work (or any other work associated in any way with the phrase
“Project Gutenberg”), you agree to comply with all the terms of
the Full Project Gutenberg™ License available with this file or
online at www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand,
agree to and accept all the terms of this license and intellectual
property (trademark/copyright) agreement. If you do not agree to
abide by all the terms of this agreement, you must cease using
and return or destroy all copies of Project Gutenberg™
electronic works in your possession. If you paid a fee for
obtaining a copy of or access to a Project Gutenberg™
electronic work and you do not agree to be bound by the terms
of this agreement, you may obtain a refund from the person or
entity to whom you paid the fee as set forth in paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only


be used on or associated in any way with an electronic work by
people who agree to be bound by the terms of this agreement.
There are a few things that you can do with most Project
Gutenberg™ electronic works even without complying with the
full terms of this agreement. See paragraph 1.C below. There
are a lot of things you can do with Project Gutenberg™
electronic works if you follow the terms of this agreement and
help preserve free future access to Project Gutenberg™
electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright
law in the United States and you are located in the United
States, we do not claim a right to prevent you from copying,
distributing, performing, displaying or creating derivative works
based on the work as long as all references to Project
Gutenberg are removed. Of course, we hope that you will
support the Project Gutenberg™ mission of promoting free
access to electronic works by freely sharing Project
Gutenberg™ works in compliance with the terms of this
agreement for keeping the Project Gutenberg™ name
associated with the work. You can easily comply with the terms
of this agreement by keeping this work in the same format with
its attached full Project Gutenberg™ License when you share it
without charge with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside
the United States, check the laws of your country in addition to
the terms of this agreement before downloading, copying,
displaying, performing, distributing or creating derivative works
based on this work or any other Project Gutenberg™ work. The
Foundation makes no representations concerning the copyright
status of any work in any country other than the United States.

1.E. Unless you have removed all references to Project


Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project
Gutenberg™ work (any work on which the phrase “Project
Gutenberg” appears, or with which the phrase “Project
Gutenberg” is associated) is accessed, displayed, performed,
viewed, copied or distributed:

This eBook is for the use of anyone anywhere in the United


States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it
away or re-use it under the terms of the Project Gutenberg
License included with this eBook or online at
www.gutenberg.org. If you are not located in the United
States, you will have to check the laws of the country where
you are located before using this eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is


derived from texts not protected by U.S. copyright law (does not
contain a notice indicating that it is posted with permission of the
copyright holder), the work can be copied and distributed to
anyone in the United States without paying any fees or charges.
If you are redistributing or providing access to a work with the
phrase “Project Gutenberg” associated with or appearing on the
work, you must comply either with the requirements of
paragraphs 1.E.1 through 1.E.7 or obtain permission for the use
of the work and the Project Gutenberg™ trademark as set forth
in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is


posted with the permission of the copyright holder, your use and
distribution must comply with both paragraphs 1.E.1 through
1.E.7 and any additional terms imposed by the copyright holder.
Additional terms will be linked to the Project Gutenberg™
License for all works posted with the permission of the copyright
holder found at the beginning of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files
containing a part of this work or any other work associated with
Project Gutenberg™.
1.E.5. Do not copy, display, perform, distribute or redistribute
this electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the
Project Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if
you provide access to or distribute copies of a Project
Gutenberg™ work in a format other than “Plain Vanilla ASCII” or
other format used in the official version posted on the official
Project Gutenberg™ website (www.gutenberg.org), you must, at
no additional cost, fee or expense to the user, provide a copy, a
means of exporting a copy, or a means of obtaining a copy upon
request, of the work in its original “Plain Vanilla ASCII” or other
form. Any alternate format must include the full Project
Gutenberg™ License as specified in paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™
works unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or


providing access to or distributing Project Gutenberg™
electronic works provided that:

• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt that
s/he does not agree to the terms of the full Project Gutenberg™
License. You must require such a user to return or destroy all
copies of the works possessed in a physical medium and
discontinue all use of and all access to other copies of Project
Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project


Gutenberg™ electronic work or group of works on different
terms than are set forth in this agreement, you must obtain
permission in writing from the Project Gutenberg Literary
Archive Foundation, the manager of the Project Gutenberg™
trademark. Contact the Foundation as set forth in Section 3
below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on,
transcribe and proofread works not protected by U.S. copyright
law in creating the Project Gutenberg™ collection. Despite
these efforts, Project Gutenberg™ electronic works, and the
medium on which they may be stored, may contain “Defects,”
such as, but not limited to, incomplete, inaccurate or corrupt
data, transcription errors, a copyright or other intellectual
property infringement, a defective or damaged disk or other
medium, a computer virus, or computer codes that damage or
cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES -


Except for the “Right of Replacement or Refund” described in
paragraph 1.F.3, the Project Gutenberg Literary Archive
Foundation, the owner of the Project Gutenberg™ trademark,
and any other party distributing a Project Gutenberg™ electronic
work under this agreement, disclaim all liability to you for
damages, costs and expenses, including legal fees. YOU
AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE,
STRICT LIABILITY, BREACH OF WARRANTY OR BREACH
OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE
TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER
THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR
ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE
OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF
THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If


you discover a defect in this electronic work within 90 days of
receiving it, you can receive a refund of the money (if any) you
paid for it by sending a written explanation to the person you
received the work from. If you received the work on a physical
medium, you must return the medium with your written
explanation. The person or entity that provided you with the
defective work may elect to provide a replacement copy in lieu
of a refund. If you received the work electronically, the person or
entity providing it to you may choose to give you a second
opportunity to receive the work electronically in lieu of a refund.
If the second copy is also defective, you may demand a refund
in writing without further opportunities to fix the problem.

1.F.4. Except for the limited right of replacement or refund set


forth in paragraph 1.F.3, this work is provided to you ‘AS-IS’,
WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR
ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of
damages. If any disclaimer or limitation set forth in this
agreement violates the law of the state applicable to this
agreement, the agreement shall be interpreted to make the
maximum disclaimer or limitation permitted by the applicable
state law. The invalidity or unenforceability of any provision of
this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the


Foundation, the trademark owner, any agent or employee of the
Foundation, anyone providing copies of Project Gutenberg™
electronic works in accordance with this agreement, and any
volunteers associated with the production, promotion and
distribution of Project Gutenberg™ electronic works, harmless
from all liability, costs and expenses, including legal fees, that
arise directly or indirectly from any of the following which you do
or cause to occur: (a) distribution of this or any Project
Gutenberg™ work, (b) alteration, modification, or additions or
deletions to any Project Gutenberg™ work, and (c) any Defect
you cause.

Section 2. Information about the Mission of


Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new
computers. It exists because of the efforts of hundreds of
volunteers and donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project
Gutenberg™’s goals and ensuring that the Project Gutenberg™
collection will remain freely available for generations to come. In
2001, the Project Gutenberg Literary Archive Foundation was
created to provide a secure and permanent future for Project
Gutenberg™ and future generations. To learn more about the
Project Gutenberg Literary Archive Foundation and how your
efforts and donations can help, see Sections 3 and 4 and the
Foundation information page at www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-
profit 501(c)(3) educational corporation organized under the
laws of the state of Mississippi and granted tax exempt status by
the Internal Revenue Service. The Foundation’s EIN or federal
tax identification number is 64-6221541. Contributions to the
Project Gutenberg Literary Archive Foundation are tax
deductible to the full extent permitted by U.S. federal laws and
your state’s laws.

The Foundation’s business office is located at 809 North 1500


West, Salt Lake City, UT 84116, (801) 596-1887. Email contact
links and up to date contact information can be found at the
Foundation’s website and official page at
www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission
of increasing the number of public domain and licensed works
that can be freely distributed in machine-readable form
accessible by the widest array of equipment including outdated
equipment. Many small donations ($1 to $5,000) are particularly
important to maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws


regulating charities and charitable donations in all 50 states of
the United States. Compliance requirements are not uniform
and it takes a considerable effort, much paperwork and many
fees to meet and keep up with these requirements. We do not
solicit donations in locations where we have not received written
confirmation of compliance. To SEND DONATIONS or
determine the status of compliance for any particular state visit
www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states


where we have not met the solicitation requirements, we know
of no prohibition against accepting unsolicited donations from
donors in such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot


make any statements concerning tax treatment of donations
received from outside the United States. U.S. laws alone swamp
our small staff.

Please check the Project Gutenberg web pages for current


donation methods and addresses. Donations are accepted in a
number of other ways including checks, online payments and
credit card donations. To donate, please visit:
www.gutenberg.org/donate.

Section 5. General Information About Project


Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could
be freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose
network of volunteer support.

Project Gutenberg™ eBooks are often created from several


printed editions, all of which are confirmed as not protected by
copyright in the U.S. unless a copyright notice is included. Thus,
we do not necessarily keep eBooks in compliance with any
particular paper edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg
Literary Archive Foundation, how to help produce our new
eBooks, and how to subscribe to our email newsletter to hear
about new eBooks.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like