100% found this document useful (1 vote)
27 views58 pages

Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2018 Volume 2 Ajith Abraham instant download

The document details the proceedings of the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018), held in Kolkata, India, from February 23 to 25, 2018. It highlights the conference's focus on the intersection of data mining and information security, showcasing significant research contributions from various countries. The proceedings are part of the 'Advances in Intelligent Systems and Computing' series published by Springer Nature, aimed at disseminating recent developments in intelligent systems and computing.

Uploaded by

aguwahurtsdz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
27 views58 pages

Emerging Technologies in Data Mining and Information Security Proceedings of IEMIS 2018 Volume 2 Ajith Abraham instant download

The document details the proceedings of the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2018), held in Kolkata, India, from February 23 to 25, 2018. It highlights the conference's focus on the intersection of data mining and information security, showcasing significant research contributions from various countries. The proceedings are part of the 'Advances in Intelligent Systems and Computing' series published by Springer Nature, aimed at disseminating recent developments in intelligent systems and computing.

Uploaded by

aguwahurtsdz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 58

Emerging Technologies in Data Mining and

Information Security Proceedings of IEMIS 2018


Volume 2 Ajith Abraham download

https://textbookfull.com/product/emerging-technologies-in-data-
mining-and-information-security-proceedings-of-
iemis-2018-volume-2-ajith-abraham/

Download more ebook from https://textbookfull.com


We believe these products will be a great fit for you. Click
the link to download now, or visit textbookfull.com
to discover even more!

Emerging Technologies in Data Mining and Information


Security Proceedings of IEMIS 2018 Volume 1 Ajith
Abraham

https://textbookfull.com/product/emerging-technologies-in-data-
mining-and-information-security-proceedings-of-
iemis-2018-volume-1-ajith-abraham/

Proceedings of the Third International Scientific


Conference “Intelligent Information Technologies for
Industry” (IITI’18): Volume 2 Ajith Abraham

https://textbookfull.com/product/proceedings-of-the-third-
international-scientific-conference-intelligent-information-
technologies-for-industry-iiti18-volume-2-ajith-abraham/

Proceedings of the Third International Scientific


Conference “Intelligent Information Technologies for
Industry” (IITI’18): Volume 1 Ajith Abraham

https://textbookfull.com/product/proceedings-of-the-third-
international-scientific-conference-intelligent-information-
technologies-for-industry-iiti18-volume-1-ajith-abraham/

Intelligent Systems Design and Applications: 18th


International Conference on Intelligent Systems Design
and Applications (ISDA 2018) held in Vellore, India,
December 6-8, 2018, Volume 2 Ajith Abraham
https://textbookfull.com/product/intelligent-systems-design-and-
applications-18th-international-conference-on-intelligent-
systems-design-and-applications-isda-2018-held-in-vellore-india-
Proceedings of the Future Technologies Conference FTC
2018 Volume 2 Kohei Arai

https://textbookfull.com/product/proceedings-of-the-future-
technologies-conference-ftc-2018-volume-2-kohei-arai/

Hybrid Intelligent Systems Ajith Abraham

https://textbookfull.com/product/hybrid-intelligent-systems-
ajith-abraham/

Data Management Analytics and Innovation Proceedings of


ICDMAI 2018 Volume 2 Valentina Emilia Balas

https://textbookfull.com/product/data-management-analytics-and-
innovation-proceedings-of-icdmai-2018-volume-2-valentina-emilia-
balas/

Innovations in Bio Inspired Computing and Applications


Ajith Abraham

https://textbookfull.com/product/innovations-in-bio-inspired-
computing-and-applications-ajith-abraham/

New Knowledge in Information Systems and Technologies


Volume 2 Álvaro Rocha

https://textbookfull.com/product/new-knowledge-in-information-
systems-and-technologies-volume-2-alvaro-rocha/
Advances in Intelligent Systems and Computing 813

Ajith Abraham · Paramartha Dutta


Jyotsna Kumar Mandal
Abhishek Bhattacharya · Soumi Dutta
Editors

Emerging
Technologies
in Data Mining
and Information
Security
Proceedings of IEMIS 2018, Volume 2
Advances in Intelligent Systems and Computing

Volume 813

Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
e-mail: [email protected]
The series “Advances in Intelligent Systems and Computing” contains publications on theory,
applications, and design methods of Intelligent Systems and Intelligent Computing. Virtually all
disciplines such as engineering, natural sciences, computer and information science, ICT, economics,
business, e-commerce, environment, healthcare, life science are covered. The list of topics spans all the
areas of modern intelligent systems and computing such as: computational intelligence, soft computing
including neural networks, fuzzy systems, evolutionary computing and the fusion of these paradigms,
social intelligence, ambient intelligence, computational neuroscience, artificial life, virtual worlds and
society, cognitive science and systems, Perception and Vision, DNA and immune based systems,
self-organizing and adaptive systems, e-Learning and teaching, human-centered and human-centric
computing, recommender systems, intelligent control, robotics and mechatronics including
human-machine teaming, knowledge-based paradigms, learning paradigms, machine ethics, intelligent
data analysis, knowledge management, intelligent agents, intelligent decision making and support,
intelligent network security, trust management, interactive entertainment, Web intelligence and multimedia.
The publications within “Advances in Intelligent Systems and Computing” are primarily proceedings
of important conferences, symposia and congresses. They cover significant recent developments in the
field, both of a foundational and applicable character. An important characteristic feature of the series is
the short publication time and world-wide distribution. This permits a rapid and broad dissemination of
research results.

Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
e-mail: [email protected]
Members
Rafael Bello Perez, Universidad Central “Marta Abreu” de Las Villas, Santa Clara, Cuba
e-mail: [email protected]
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
e-mail: [email protected]
Hani Hagras, University of Essex, Colchester, UK
e-mail: [email protected]
László T. Kóczy, Széchenyi István University, Győr, Hungary
e-mail: [email protected]
Vladik Kreinovich, University of Texas at El Paso, El Paso, USA
e-mail: [email protected]
Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwan
e-mail: [email protected]
Jie Lu, University of Technology, Sydney, Australia
e-mail: [email protected]
Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexico
e-mail: [email protected]
Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazil
e-mail: [email protected]
Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Poland
e-mail: [email protected]
Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong
e-mail: [email protected]

More information about this series at http://www.springer.com/series/11156


Ajith Abraham Paramartha Dutta

Jyotsna Kumar Mandal Abhishek Bhattacharya


Soumi Dutta
Editors

Emerging Technologies
in Data Mining
and Information Security
Proceedings of IEMIS 2018, Volume 2

123
Editors
Ajith Abraham Abhishek Bhattacharya
Machine Intelligence Research Labs Institute of Engineering and Management
Auburn, WA, USA Kolkata, West Bengal, India

Paramartha Dutta Soumi Dutta


Department of Computer and System Institute of Engineering and Management
Sciences Kolkata, West Bengal, India
Visva-Bharati University
Santiniketan, West Bengal, India

Jyotsna Kumar Mandal


Department of Computer Science
and Engineering
University of Kalyani
Kalyani, India

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-981-13-1497-1 ISBN 978-981-13-1498-8 (eBook)
https://doi.org/10.1007/978-981-13-1498-8

Library of Congress Control Number: 2018947481

© Springer Nature Singapore Pte Ltd. 2019


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained herein or
for any errors or omissions that may have been made. The publisher remains neutral with regard to
jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721,
Singapore
Foreword

Welcome to the Springer International Conference on Emerging Technologies in


Data Mining and Information Security (IEMIS 2018) held from February 23 to 25,
2018, in Kolkata, India. As a premier conference in the field, IEMIS 2018 provides
a highly competitive forum for reporting the latest developments in the research and
application of information security and data mining. We are pleased to present the
proceedings of the conference as its published record. The theme of this year is
Crossroad of Data Mining and Information Security, a topic that is quickly gaining
traction in both academic and industrial discussions because of the relevance of
privacy-preserving data mining model (PPDM).
IEMIS is a young conference for research in the areas of information and
network security, data sciences, big data, and data mining. Although 2018 is the
debut year for IEMIS, it has already witnessed a significant growth. As evidence of
that, IEMIS received a record of 532 submissions. The authors of submitted papers
come from 35 countries. The authors of accepted papers are from 11 countries.
We hope that this program will further stimulate research in information security
and data mining and provide the practitioners with better techniques, algorithms and
tools for deployment. We feel honored and privileged to serve the best recent
developments in the field of WSDM to the readers through this exciting program.

Kolkata, India Bimal Kumar Roy


General Chair, IEMIS 2018
Indian Statistical Institute

v
Preface

This volume presents the proceedings of the International Conference on Emerging


Technologies in Data Mining and Information Security, IEMIS 2018, which took
place at the University of Engineering and Management, Kolkata, India, from
February 23 to 25, 2018. The volume appears in the series “Advances in Intelligent
Systems and Computing” (AISC) published by Springer Nature, one of the largest
and most prestigious scientific publishers. It is one of the fastest growing book series
in their program. AISC series publication is meant to include various high-quality
and timely publications, primarily proceedings of relevant conferences, congresses,
and symposia but also monographs, on the theory, applications, and implementa-
tions of broadly perceived modern intelligent systems and intelligent computing, in
their modern understanding, i.e., including not only tools and techniques of artificial
intelligence (AI), and computational intelligence (CI)—which includes data mining,
information security, neural networks, fuzzy systems, evolutionary computing, as
well as hybrid approaches that synergistically combine these areas—but also topics
such as multiagent systems, social intelligence, ambient intelligence, Web intelli-
gence, computational neuroscience, artificial life, virtual worlds and societies,
cognitive science and systems, perception and vision, DNA- and immune-based
systems, self-organizing and adaptive systems, e-learning and teaching, human-
centered and human-centric computing, autonomous robotics, knowledge-based
paradigms, learning paradigms, machine ethics, intelligent data analysis, and various
issues related to “big data,” security, and trust management. These areas are at the
forefront of science and technology and have been found useful and powerful in a
wide variety of disciplines such as engineering, natural sciences, computer, com-
putation and information sciences, ICT, economics, business, e-commerce, envi-
ronment, health care, life science, and social sciences. The AISC book series is
submitted for indexing to ISI Conference Proceedings Citation Index (now run by
Clarivate), Ei Compendex, DBLP, SCOPUS, Google Scholar, and SpringerLink,
and many other indexing services around the world. IEMIS 2018 is a debut annual
conference series organized by the School of Information Technology, under the
aegis of Institute of Engineering and Management, India. Its idea came from the
heritage of the other two cycles of the events, IEMCON and UEMCON, which were

vii
viii Preface

organized by the Institute of Engineering and Management under the leadership of


Prof. (Dr.) Satyajit Chakrabarti.
In this volume of “Advances in Intelligent Systems and Computing,” we would
like to present the results of studies on the selected problems of data mining and
information security. Security implementation is the contemporary answer to the
new challenges in threat evaluation of complex systems. Security approach in
theory and engineering of complex systems (not only computer systems and net-
works) is based on multidisciplinary attitude to information theory, technology, and
maintenance of the systems working in real (and very often unfriendly) environ-
ments. Such a transformation has shaped the natural evolution in the topical range
of subsequent IEMIS conferences, which can be seen over the recent years. Human
factors likewise infest the best digital dangers. Workforce administration and digital
mindfulness are fundamental for accomplishing all-encompassing cybersecurity.
This book will be of an extraordinary incentive to a huge assortment of experts,
scientists, and understudies concentrating on the human part of the Internet, and for
the compelling assessment of safety efforts, interfaces, client-focused outline and
plan for unique populaces, especially the elderly. We trust this book is instructive
yet much more than it is provocative. We trust it moves, driving peruser to examine
different inquiries, applications and potential arrangements in making sheltered and
secure plans for all.
The Program Committee of IEMIS 2018, its organizers, and the editors of this
proceedings would like to gratefully acknowledge the participation of all the
reviewers who helped to refine the contents of this volume and evaluated the
conference submissions. Our thanks go to Prof. Bimal Kumar Roy, Dr. Ajith
Abraham, Dr. Sheng-Lung peng, Dr. Detlef Streitferdt, Dr. Shaikh Fattah, Dr. Celia
Shahnaz, Dr. Swagatam Das, Dr. Niloy Ganguly, Dr. K. K. Shukla, Dr. Nilanjan
Dey, Dr. Florin PopentiuVladicescu, Dr. Dewan Md. Farid, Dr. Saptarshi Ghosh,
Dr. Rita Choudhury, Dr. Asit Kumar Das, Prof. Tanupriya Choudhury, Prof. Arijit
Ghosal, Prof. Rahul Saxena, Prof. Monika Jain, Dr. Aakanksha Sharaff, Prof. Dr.
Sajal Dasgupta, Prof. Rajiv Ganguly, and Prof. Sukalyan Goswami.
Thanking all the authors who have chosen IEMIS 2018 as the publication
platform for their research, we would like to express our hope that their papers will
help in further developments in design and analysis of engineering aspects of
complex systems, being a valuable source material for scientists, researchers,
practitioners, and students who work in these areas.

Auburn, USA Ajith Abraham


Santiniketan, India Paramartha Dutta
Kalyani, India Jyotsna Kumar Mandal
Kolkata, India Abhishek Bhattacharya
Kolkata, India Soumi Dutta
Organizing Committee

Patron

Prof. (Dr.) Satyajit Chakrabarti, Institute of Engineering and Management, India

Conference General Chair

Dr. Bimal Kumar Roy, Indian Statistical Institute, Kolkata, India

Convener

Dr. Subrata Saha, Institute of Engineering and Management, India


Abhishek Bhattacharya, Institute of Engineering and Management, India

Co-convener

Sukalyan Goswami, University of Engineering and Management, India


Krishnendu Rarhi, Institute of Engineering and Management, India
Soumi Dutta, Institute of Engineering and Management, India
Sujata Ghatak, Institute of Engineering and Management, India
Dr. Abir Chatterjee, University of Engineering and Management, India

Keynote Speakers

Dr. Ajith Abraham, Machine Intelligence Research Labs (MIR Labs), USA
Dr. Fredric M. Ham, IEEE Life Fellow, SPIE Fellow, and INNS Fellow,
Melbourne, USA
Dr. Sheng-Lung Peng, National Dong Hwa University, Hualien, Taiwan

ix
x Organizing Committee

Dr. Shaikh Fattah, Editor, IEEE Access & CSSP (Springer), Bangladesh
Dr. Detlef Streitferdt, Technische Universität Ilmenau, Germany
Dr. Swagatam Das, Indian Statistical Institute, Kolkata, India
Dr. Niloy Ganguly, Indian Institute of Technology Kharagpur, India
Dr. K. K. Shukla, IIT (B.H.U.), Varanasi, India
Dr. Nilanjan Dey, Techno India College of Technology, Kolkata, India
Dr. Florin Popentiu Vladicescu, “UNESCO Chair in Information Technologies”,
University of Oradea, Romania
Dr. Celia Shahnaz, senior member of IEEE, fellow member of Institution of
Engineers, Bangladesh (IEB)

Technical Program Committee Chair

Dr. J. K. Mondal, University of Kalyani, India


Dr. Paramartha Dutta, Visva-Bharati University, India
Abhishek Bhattacharya, Institute of Engineering and Management, India

Technical Program Committee Co-chair

Dr. Satyajit Chakrabarti, Institute of Engineering and Management, India


Dr. Subrata Saha, Institute of Engineering and Management, India
Dr. Kamakhya Prasad Ghatak, University of Engineering and Management, India
Dr. Asit Kumar Das, IIEST, Shibpur, India

Editorial Board

Dr. Ajith Abraham, Machine Intelligence Research Labs (MIR Labs), USA
Dr. J. K. Mondal, University of Kalyani, India
Dr. Paramartha Dutta, Visva-Bharati University, India
Abhishek Bhattacharya, Institute of Engineering and Management, India
Soumi Dutta, Institute of Engineering and Management, India

Advisory Committee

Dr. Mahmoud Shafik, University of Derby


Dr. MohdNazri Ismail, National Defence University of Malaysia
Dr. Bhaba R. Sarker, Louisiana State University
Dr. Tushar Kanti Bera, University of Arizona, USA
Dr. Shirley Devapriya Dewasurendra, University of Peradeniya, Sri Lanka
Dr. Goutam Chakraborty, Professor and Head of the Intelligent Informatics Lab,
Iwate Prefectural University, Japan
Dr. Basabi Chakraborty, Iwate Prefectural University, Japan
Organizing Committee xi

Dr. Kalyanmoy Deb, Michigan State University, East Lansing, USA


Dr. Vincenzo Piuri, University of Milan, Italy
Dr. Biswajit Sarkar, Hanyang University, Korea
Dr. Raj Kumar Buyya, the University of Melbourne
Dr. Anurag Dasgupta, Valdosta State University, Georgia
Dr. Prasenjit Mitra, the Pennsylvania State University
Dr. Esteban Alfaro-Cortés, University of Castilla–La Mancha, Spain
Dr. Ilkyeong Moon, Seoul National University, South Korea
Dr. Izabela Nielsen, Aalborg University, Denmark
Dr. Prasanta K. Jana, IEEE Senior Member, Indian Institute of Technology (ISM),
Dhanbad
Dr. Gautam Paul, Indian Statistical Institute, Kolkata
Dr. Malay Bhattacharyya, IIEST, Shibpur
Dr. Sipra Das Bit, IIEST, Shibpur
Dr. Jaya Sil, IIEST, Shibpur
Dr. Asit Kumar Das, IIEST, Shibpur
Dr. Saptarshi Ghosh, IIEST, Shibpur, IIT KGP
Dr. Prof. Hafizur Rahman, IIEST, Shibpur
Dr. C. K. Chanda, IIEST, Shibpur
Dr. Asif Ekbal, Associate Dean, IIT Patna
Dr. Sitangshu Bhattacharya, IIIT Allahabad
Dr. Ujjwal Bhattacharya, CVPR Unit, Indian Statistical Institute
Dr. Prashant R.Nair, Amrita Vishwa Vidyapeetham (University), Coimbatore
Dr. Tanushyam Chattopadhyay, TCS Innovation Labs, Kolkata
Dr. A. K. Nayak, Fellow and Honorary Secretarý CSI
Dr. B. K. Tripathy, VIT University
Dr. K. Srujan Raju, CMR Technical Campus
Dr. Dakshina Ranjan Kisku, National Institute of Technology, Durgapur
Dr. A. K. Pujari, University of Hyderabad
Dr. Partha Pratim Sahu, Tezpur University
Dr. Anuradha Banerjee, Kalyani Government Engineering College
Dr. Amiya Kumar Rath, Veer Surendra Sai University of Technology
Dr. Kandarpa Kumar Sharma, Gauhati University
Dr. Amlan Chakrabarti, University of Calcutta
Dr. Sankhayan Choudhury, University of Calcutta
Dr. Anjana Kakoti Mahanta, Gauhati University
Dr. Subhankar Bandyopadhyay, Jadavpur University
Dr. Debabrata Ghosh, Calcutta University
Dr. Rajat Kr. Pal, University of Calcutta
Dr. Ujjwal Maulik, Jadavpur University
Dr. Himadri Dutta, Kalyani Government Engineering College, Kalyani
Dr. Brojo Kishore Mishra, C. V. Raman College of Engineering (Autonomous),
Bhubaneswar
Dr. S. VijayakumarBharathi, Symbiosis Centre for Information Technology (SCIT)
Dr. Govinda K., VIT University, Vellore
Dr. Ajanta Das, University of Engineering and Management, India
xii Organizing Committee

Technical Committee

Dr. Vincenzo Piuri, University of Milan, Italy


Dr. Mahmoud Shafik, University of Derby
Dr. Bhaba Sarker, Louisiana State University
Dr. Mohd Nazri Ismail, University Pertahanan National Malaysia
Dr. Tushar Kanti Bera, Yonsei University, Seoul
Dr. Birjodh Tiwana, LinkedIn, San Francisco, California
Dr. Saptarshi Ghosh, IIEST, Shibpur, IIT KGP
Dr. Srimanta Bhattacharya, Indian Statistical Institute, Kolkata
Dr. Loingtam Surajkumar Singh, NIT Manipur
Dr. Sitangshu Bhattacharya, IIIT Allahabad
Dr. Sudhakar Tripathi, NIT Patna
Dr. Chandan K. Chanda, IIEST, Shibpur
Dr. Dakshina Ranjan Kisku, NIT Durgapur
Dr. Asif Ekbal, IIT Patna
Dr. Prasant Bharadwaj, NIT Agartala
Dr. Somnath Mukhopadhyay, Hijli College, Kharagpur, India, and Regional
Student Coordinator, Region II, Computer Society of India
Dr. G. Suseendran, Vels University, Chennai, India
Dr. Sumanta Sarkar, Department of Computer Science, University of Calgary
Dr. Manik Sharma, Assistant Professor, DAV University, Jalandhar
Dr. Rita Choudhury, Gauhati University
Dr. Kuntala Patra, Gauhati University
Dr. Helen K. Saikia, Gauhati University
Dr. Debasish Bhattacharjee, Gauhati University
Dr. Somenath Sarkar, University of Calcutta
Dr. Sankhayan Choudhury, University of Calcutta
Dr. Debasish De, Maulana Abul Kalam Azad University of Technology
Dr. Buddha Deb Pradhan, National Institute of Technology, Durgapur
Dr. Shankar Chakraborty, Jadavpur University
Dr. Durgesh Kumar Mishra, Sri Aurobindo Institute of Technology, Indore,
Madhya Pradesh
Dr. Angsuman Sarkar, Secretary, IEEE EDS Kolkata Chapter, Kalyani Government
Engineering College
Dr. A. M. SUDHAKARA, University of Mysore
Dr. Indrajit Saha, National Institute of Technical Teachers’ Training and Research
Kolkata
Dr. Bikash Santra, Indian Statistical Institute (ISI)
Dr. Ram Sarkar, Jadavpur University
Dr. Priya Ranjan Sinha Mahapatra, Kalyani University
Dr. Avishek Adhikari, University of Calcutta
Organizing Committee xiii

Dr. Jyotsna Kumar Mandal, Kalyani University


Dr. Manas Kumar Sanyal, Kalyani University
Dr. Atanu Kundu, Chairman, IEEE EDS, Heritage Institute of Technology, Kolkata
Dr. Chintan Kumar Mandal, Jadavpur University
Dr. Kartick Chandra Mondal, Jadavpur University
Mr. Debraj Chatterjee, Manager, Capegemini
Mr. Gourav Dutta, Cognizant Technology Solutions
Dr. Soumya Sen, University of Calcutta
Dr. Soumen Kumar Pati, St. Thomas’ College of Engineering and Technology
Mrs. Sunanda Das, Neotia Institute of Technology Management and Science, India
Mrs. Shampa Sengupta, MCKV Institute of Engineering, India
Dr. Brojo Kishore Mishra, C. V. Raman College of Engineering (Autonomous),
Bhubaneswar
Dr. S. Vijayakumar Bharathi, Symbiosis Centre for Information Technology, Pune
Dr. Govinda K., Vellore Institute of technology
Dr. Prashant R. Nair, Amrita University
Dr. Hemanta Dey, IEEE Senior Member
Dr. Ajanta Das, University of Engineering and Management, India
Dr. Samir Malakar, MCKV Institute of Engineering, Howrah
Dr. Tanushyam Chattopadhyay, TCS Innovation Lab, Kolkata
Dr. A. K. Nayak, Indian Institute of Business Management, Patna
Dr. B. K. Tripathy, Vellore Institute of Technology, Vellore
Dr. K. Srujan Raju, CMR Technical Campus, Hyderabad
Dr. Partha Pratim Sahu, Tezpur University
Dr. Anuradha Banerjee, Kalyani Government Engineering College
Dr. Amiya Kumar Rath, Veer Surendra Sai University of Technology, Odisha
Dr. S. D. Dewasurendra
Dr. Arnab K. Laha, IIM Ahmedabad
Dr. Kandarpa Kumar Sarma, Gauhati University
Dr. Ambar Dutta, BIT Mesra and Treasurer—CSI Kolkata
Dr. Arindam Pal, TCS Innovation Labs, Kolkata
Dr. Himadri Dutta, Kalyani Government Engineering College, Kalyani
Dr. Tanupriya Choudhury, Amity University, Noida, India
Dr. Praveen Kumar, Amity University, Noida, India

Organizing Chairs

Krishnendu Rarhi, Institute of Engineering and Management, India


Sujata Ghatak, Institute of Engineering and Management, India
Dr. Apurba Sarkar, IIEST, Shibpur, India
xiv Organizing Committee

Organizing Co-chairs

Sukalyan Goswami, University of Engineering and Management, India


Rupam Bhattacharya, Institute of Engineering and Management, India

Organizing Committee Convener

Dr. Sajal Dasgupta, Vice-Chancellor, University of Engineering and Management

Organizing Committee

Subrata Basak, Institute of Engineering and Management, India


Anshuman Ray, Institute of Engineering and Management, India
Rupam Bhattacharya, Institute of Engineering and Management, India
Abhijit Sarkar, Institute of Engineering and Management, India
Ankan Bhowmik, Institute of Engineering and Management, India
Manjima Saha, Institute of Engineering and Management, India
Biswajit Maity, Institute of Engineering and Management, India
Soumik Das, Institute of Engineering and Management, India
Sreelekha Biswas, Institute of Engineering and Management, India
Nayantara Mitra, Institute of Engineering and Management, India
Amitava Chatterjee, Institute of Engineering and Management, India
Ankita Mondal, Institute of Engineering and Management, India

Registration Chairs

Abhijit Sarkar, Institute of Engineering and Management, India


Ankan Bhowmik, Institute of Engineering and Management, India
Ankita Mondal, Institute of Engineering and Management, India
Ratna Mondol, Institute of Engineering and Management, India

Publication Chairs

Dr. Debashis De, Maulana Abul Kalam Azad University of Technology, India
Dr. Kuntala Patra, Gauhati University, India
Organizing Committee xv

Publicity and Sponsorship Chair

Dr. J. K. Mondal, University of Kalyani, India


Dr. Paramartha Dutta, Visva-Bharati University, India
Abhishek Bhattacharya, Institute of Engineering and Management, India
Biswajit Maity, Institute of Engineering and Management, India
Soumik Das, Institute of Engineering and Management, India

Treasurer and Conference Secretary

Dr. Subrata Saha, Institute of Engineering and Management, India


Rupam Bhattacharya, Institute of Engineering and Management, India
Krishnendu Rarhi, Institute of Engineering and Management, India

Hospitality and Transport Chair

Soumik Das, Institute of Engineering and Management, India


Nayantara Mitra, Institute of Engineering and Management, India
Manjima Saha, Institute of Engineering and Management, India
Sreelekha Biswas, Institute of Engineering and Management, India
Amitava Chatterjee, Institute of Engineering and Management, India

Web Chair

Samrat Goswami
Samrat Dey
About this Book

This book features research papers presented at the International Conference on


Emerging Technologies in Data Mining and Information Security (IEMIS 2018)
held at the University of Engineering and Management, Kolkata, India, from
February 23 to 25, 2018.
Data mining is currently a well-known topic in mirroring the exertion of finding
learning from information. It gives the strategies that enable supervisors to acquire
administrative data from their heritage frameworks. Its goal is to distinguish
legitimate, novel, and possibly valuable and justifiable connection and examples in
information. Information mining is made conceivable by the very nearness of the
expansive databases.
Information security advancement is an essential part to ensure open and private
figuring structures. With the use of information development applications in all
cases, affiliations are ending up more aware of the security risks to their benefits.
Notwithstanding how strict the security techniques and parts are, more affiliations
are getting the chance to be weak to a broad assortment of security breaks against
their electronic resources. Network‐intrusion area is a key protect part against
security perils, which have been growing in rate generally.
This book comprises high-quality research work by academicians and industrial
experts in the field of computing and communication, including full-length papers,
research-in-progress papers and case studies related to all the areas of data mining,
machine learning, Internet of things (IoT) and information security.

xvii
Contents

Part I Data Analytics


Sentiment Analysis of Tweet Data: The Study of Sentimental State
of Human from Tweet Text . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
S. M. Mazharul Hoque Chowdhury, Priyanka Ghosh, Sheikh Abujar,
Most. Arina Afrin and Syed Akhter Hossain
Data Analytic Techniques with Hardware-Based Encryption
for High-Profile Dataset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
M. Sharmila Begum and A. George
Exploring Student Migration in Rural Region of Bangladesh . . . . . . . . 25
Arafat Bin Hossain, Sakibul Mowla, Sheikh Nabil Mohammad
and Md. R. Amin
Analysis on Lightning News and Correlation with Lightning Imaging
Sensor (LIS) Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Sunny Chowdhury, K. M. Sajjadul Islam, Sheikh Nabil Mohammad,
Md. R. Amin and Choudhury Wahid
A Computational Approach for Project Work Performance Analysis
Based on Online Collaborative Data . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Nikitaben P. Shelke and Poonam Gupta
Design of Business Canvas Model for Social Media . . . . . . . . . . . . . . . . 63
Jan Hruska and Petra Maresova
Horticultural Approach for Detection, Categorization and
Enumeration of On Plant Oval Shaped Fruits . . . . . . . . . . . . . . . . . . . . 71
Santi Kumari Behera, Junali Jasmine Jena, Amiya Kumar Rath
and Prabira Kumar Sethy

xix
xx Contents

A Novel Deterministic Framework for Non-probabilistic


Recommender Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Avinash Bhat, Divya Madhav Kamath and C. Anitha
EEG Signal Analysis Using Different Clustering Techniques . . . . . . . . . 99
Chinmaya Kumar Pradhan, Shariar Rahaman, Md. Abdul Alim Sheikh,
Alok Kole and Tanmoy Maity
Automatic Geospatial Objects Classification from
Satellite Images . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Shariar Rahaman, Md. Abdul Alim Sheikh, Alok Kole, Tanmoy Maity
and Chinmaya Kumar Pradhan
RAiTA: Recommending Accepted Answer Using
Textual Metadata . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Md. Mofijul Islam, Sk. Shariful Islam Arafat, Md. Shakil Hossain,
Md. Mahmudur Rahman, Md. Mahmudul Hasan, S. M. Al-Hossain Imam,
Swakkhar Shatabda and Tamanna Islam Juthi
LIUBoost: Locality Informed Under-Boosting for Imbalanced
Data Classification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Sajid Ahmed, Farshid Rayhan, Asif Mahbub, Md. Rafsan Jani,
Swakkhar Shatabda and Dewan Md. Farid
Comparative Study of Different Ensemble Compositions in EEG
Signal Classification Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Ankita Datta and Rajdeep Chatterjee
Improving Quality of Fruits Picked in Orchards Using Mahalanobis
Distance Based Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Kalaivanan Sandamurthy and Kalpana Ramanujam
Viable Crop Prediction Scenario in BigData Using a
Novel Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Shriya Sahu, Meenu Chawla and Nilay Khare
A Graph Based Approach on Extractive Summarization . . . . . . . . . . . . 179
Madhurima Dutta, Ajit Kumar Das, Chirantana Mallick, Apurba Sarkar
and Asit K. Das
Targeted Marketing and Market Share Analysis on POS Payment
Data Using DW and OLAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
Giridhar Maji, Lalmohan Dutta and Soumya Sen
Promises and Challenges of Big Data in a Data-Driven World . . . . . . . 201
Sonali Mukherjee, Manoj Kumar Mishra and Bhabani Shankar
Prasad Mishra
Contents xxi

Accelerating Pairwise Sequence Alignment Algorithm by MapReduce


Technique for Next-Generation Sequencing (NGS) Data Analysis . . . . . 213
Sudip Mondal and Sunirmal Khatua
Entity Resolution in Online Multiple Social Networks
(@Facebook and LinkedIn) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
Ravita Mishra
Big Data Approach for Epidemiology and Prevention
of HIV/AIDS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Nivedita Das, Sandeep Agarwal, Siddharth Swarup Rautaray
and Manjusha Pandey
A Survey on Local Market Analysis for a Successful
Restaurant Yield . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Bidisha Das Baksi, Varsha Rao and C. Anitha
Context Dependency Relation Extraction Using Modified
Evolutionary Algorithm Based on Web Mining . . . . . . . . . . . . . . . . . . . 259
Parinda Prajapati and Premkumar Sivakumar
NoSQL Overview and Performance Testing of HBase Over
Multiple Nodes with MySQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Nabanita Das, Swagata Paul, Bidyut Biman Sarkar
and Satyajit Chakrabarti
NO SQL Approach for Handling Bioinformatics Data Using
MongoDB . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
Swaroop Chigurupati, Kiran Vegesna, L. V. Siva Rama Krishna Boddu,
Gopala Krishna Murthy Nookala and Suresh B. Mudunuri
Thunderstorm Characteristics Over the Northeastern Region (NER)
of India During the Pre-monsoon Season, 2011 Using Geosynchronous
Satellite Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289
Sandeep Thakur, Ismail Mondal, Phani Bhushan Ghosh
and Tarun Kumar De
A Novel Approach to Spam Filtering Using Semantic Based
Naive Bayesian Classifier in Text Analytics . . . . . . . . . . . . . . . . . . . . . . 301
Ritik Mallik and Abhaya Kumar Sahoo
A Proposed Approach for Improving Hadoop Performance
for Handling Small Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
Arnab Karan, Siddharth Swarup Rautaray and Manjusha Pandey
To Ameliorate Classification Accuracy Using Ensemble
Vote Approach and Base Classifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
Mudasir Ashraf, Majid Zaman and Muheet Ahmed
xxii Contents

Big Data Ecosystem: Review on Architectural Evolution . . . . . . . . . . . . 335


Kamakhya Narain Singh, Rajat Kumar Behera and Jibendu Kumar Mantri
A Comparative Study of Local Outlier Factor Algorithms
for Outliers Detection in Data Streams . . . . . . . . . . . . . . . . . . . . . . . . . 347
Supriya Mishra and Meenu Chawla
Context Level Entity Extraction Using Text Analytics
with Big Data Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
Papiya Das, Kashyap Barua, Manjusha Pandey
and Siddharth Swarup Routaray
A Novel Hybrid Approach for Time Series Data Forecasting
Using Moving Average Filter and ARIMA-SVM . . . . . . . . . . . . . . . . . . 369
Gurudev Aradhye, A. C. S. Rao and M. D. Mastan Mohammed
Social Network Analysis with Collaborative Learning: A Review . . . . . 383
Abhishek Kashyap and Sri Khetwat Saritha
Frequent Subpatterns Distribution in Social Network Analysis . . . . . . . 393
Rahul Rane
Big Data Real-Time Storytelling with Self-service Visualization . . . . . . . 405
Rajat Kumar Behera and Anil Kumar Swain
Informative Gene Selection Using Clustering and Gene Ontology . . . . . 417
Soumen K. Pati, Subhankar Mallick, Aruna Chakraborty and Ankur Das

Part II Data Mining


Identifying Categorical Terms Based on Latent Dirichlet Allocation
for Email Categorization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 431
Aakanksha Sharaff and Naresh Kumar Nagwani
The Role of Social Media in Crisis Situation
Management: A Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439
Akanksha Goel, Manomita Chakraborty and Saroj Kumar Biswas
Subset Significance Threshold: An Effective Constraint Variable
for Mining Significant Closed Frequent Itemsets . . . . . . . . . . . . . . . . . . 449
S. Pavitra Bai and G. K. Ravi Kumar
An Automated Method for Power Line Points Detection from
Terrestrial LiDAR Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 459
Arshad Husain and Rakesh Chandra Vaishya
Stochastic Petri Net Based Modeling for Analyzing Dependability
of Big Data Storage System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473
Durbadal Chattaraj, Monalisa Sarma and Debasis Samanta
Contents xxiii

Sachetan: A Crowdsource-Based Personal Safety Application . . . . . . . . 485


Sheikh Nabil Mohammad, Sakhawat Hossain, Md. Mustafijur Rahman,
Mithun Das and Md. R. Amin
Cyberbullying and Self-harm in Adolescence, an Assessment
of Detection, Prevention, and Recovery from Forum . . . . . . . . . . . . . . . 497
A. Sandrine Pricilla, I. Anandhi and J. I. Sheeba
Visual Verification and Analysis of Outliers Using Optimal Outlier
Detection Result by Choosing Proper Algorithm and Parameter . . . . . . 507
Bilkis Jamal Ferdosi and Muhammad Masud Tarek
Identification of the Recurrence of Breast Cancer by Discriminant
Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 519
Avijit Kumar Chaudhuri, D. Sinha and K. S. Thyagaraj
Automatic Multi-class Classification of Beetle Pest Using Statistical
Feature Extraction and Support Vector Machine . . . . . . . . . . . . . . . . . . 533
Abhishek Dey, Debasmita Bhoumik and Kashi Nath Dey
Probabilistic Dimension Reduction Method for Privacy Preserving
Data Clustering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
Hanumantha Rao Jalla and P. N. Girija
Spam Detection in SMS Based on Feature Selection Techniques . . . . . . 555
Aakanksha Sharaff
Recent Trends of Data Mining in Cloud Computing . . . . . . . . . . . . . . . 565
Abhijit Sarkar, Abhishek Bhattacharya, Soumi Dutta and Komal K. Parikh
Impact of Data Mining Techniques in Predictive Modeling:
A Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
Suparna DasGupta, Soumyabrata Saha and Suman Kumar Das
Distortion-Based Privacy-Preserved Association Rules Mining
Without Side Effects Using Closed Itemsets . . . . . . . . . . . . . . . . . . . . . . 591
H. Surendra and H. S. Mohan
A Data Warehouse Based Schema Design on Decision-Making
in Loan Disbursement for Indian Advance Sector . . . . . . . . . . . . . . . . . 603
Ishita Das, Santanu Roy, Amlan Chatterjee and Soumya Sen
Analysis and Design of an Efficient Temporal Data Mining Model
for the Indian Stock Market . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615
Cerene Mariam Abraham, M. Sudheep Elayidom and T. Santhanakrishnan
Shilling Attack Detection in Recommender System Using PCA
and SVM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629
Noopur Samaiya, Sandeep K. Raghuwanshi and R. K. Pateriya
xxiv Contents

A Hybrid Clustering Algorithm Based on Kmeans and Ant Lion


Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639
Santosh Kumar Majhi and Shubhra Biswal
Flight Arrival Delay Prediction Using Gradient
Boosting Classifier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 651
Navoneel Chakrabarty, Tuhin Kundu, Sudipta Dandapat, Apurba Sarkar
and Dipak Kumar Kole
The Prediction of Traffic Flow with Regression Analysis . . . . . . . . . . . . 661
Ishteaque Alam, Dewan Md. Farid and Rosaldo J. F. Rossetti
SBi-MSREimpute: A Sequential Biclustering Technique Based on
Mean Squared Residue and Euclidean Distance to Predict Missing
Values in Microarray Gene Expression Data . . . . . . . . . . . . . . . . . . . . . 673
Sourav Dutta, Mithila Hore, Faraz Ahmad, Anam Saba, Manuraj Kumar
and Chandra Das
FTD Tree Based Classification Model for Alzheimer’s Disease
Prediction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
Bala Brahmeswara Kadaru, M. Uma Maheswara Rao and S. Narayana
Data Mining in Frequent Pattern Matching Using Improved
Apriori Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 699
Bhukya Krishna and Geetanjali Amarawat
A Model for Predicting Outfit Sales: Using Data
Mining Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 711
Mohammad Aman Ullah
A Novel Feature Selection Technique for Text Classification . . . . . . . . . 721
D. S. Guru, Mostafa Ali and Mahamad Suhil
Prediction of Death Rate Using Regression Analysis . . . . . . . . . . . . . . . 735
Satya Ranjan Dash and Rekha Sahu
An Investigative Prolegomenon on Various Clustering Strategies,
Their Resolution, and Future Direction Towards Wireless Sensor
Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 747
Sushree Bibhuprada B. Priyadarshini, Amiya Bhusan Bagjadab,
Suvasini Panigrhi and Brojo Kishore Mishra
A Comparison Study of Temporal Signature Mining Over Traditional
Data Mining Techniques to Detect Network Intrusion . . . . . . . . . . . . . . 757
Sharmishtha Dutta, Tanjila Mawla and Md. Forhad Rabbi
An Optimized Random Forest Classifier for Diabetes Mellitus . . . . . . . 765
N. Komal Kumar, D. Vigneswari, M. Vamsi Krishna
and G. V. Phanindra Reddy
Contents xxv

Development of Cardiac Disease Classifier Using Rough


Set Decision System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 775
B. Halder, S. Mitra and M. Mitra
Decision Support System for Prediction of Occupational Accident:
A Case Study from a Steel Plant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 787
Sobhan Sarkar, Mainak Chain, Sohit Nayak and J. Maiti
Community Detection Based Tweet Summarization . . . . . . . . . . . . . . . . 797
Soumi Dutta, Asit Kumar Das, Abhishek Bhattacharya, Gourav Dutta,
Komal K. Parikh, Atin Das and Dipsa Ganguly
Heart Diseases Prediction System Using CHC-TSS Evolutionary,
KNN, and Decision Tree Classification Algorithm . . . . . . . . . . . . . . . . . 809
Rishabh Saxena, Aakriti Johri, Vikas Deep and Purushottam Sharma
Electrofacies Analysis of Well Log Data Using Data Mining
Algorithm: A Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821
Sanjukta De, Gandhar Pramod Nigudkar and Debashish Sengupta
A Dynamic Spatial Fuzzy C-Means Clustering-Based Medical
Image Segmentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829
Amiya Halder, Avranil Maity, Apurba Sarkar and Ananya Das
Text-Based Emotion Analysis: Feature Selection Techniques
and Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 837
Prathamesh Apte and Saritha Sri Khetwat
Community Detection Methods in Social Network Analysis . . . . . . . . . 849
Iliho and Sri Khetwat Saritha
Summarizing Microblogs During Emergency Events: A Comparison
of Extractive Summarization Algorithms . . . . . . . . . . . . . . . . . . . . . . . . 859
Soumi Dutta, Vibhash Chandra, Kanav Mehra, Sujata Ghatak,
Asit Kumar Das and Saptarshi Ghosh
A Comparative Study on Cluster Analysis of Microblogging Data . . . . . 873
Soumi Dutta, Asit Kumar Das, Gourav Dutta and Mannan Gupta
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 883
About the Editors

Dr. Ajith Abraham received his Ph.D. from Monash University, Melbourne,
Australia, and his M.Sc. from Nanyang Technological University, Singapore. His
research and development experience includes over 25 years in the industry and
academia, spanning different continents such as Australia, America, Asia, and
Europe. He works in a multidisciplinary environment involving computational
intelligence, network security, sensor networks, e-commerce, Web intelligence,
Web services, computational grids, and data mining, applied to various real-world
problems. He has authored/co-authored over 350 refereed journal/conference papers
and chapters, and some of the papers have also won the best paper awards at
international conferences and also received several citations. Some of the articles
are available in the ScienceDirect Top 25 hottest articles ! http://top25.
sciencedirect.com/index.php?cat_id=6&subject_area_id=7.
He has given more than 20 plenary lectures and conference tutorials in these
areas. He serves the editorial board of several reputed international journals and has
also guest-edited 26 special issues on various topics. He is actively involved in the
hybrid intelligent systems (HISs), intelligent systems design and applications
(ISDA), and information assurance and security (IAS) series of international
conferences. He is General Co-Chair of the Tenth International Conference on
Computer Modeling and Simulation (UKSIM’08), Cambridge, UK; Second Asia
International Conference on Modeling and Simulation (AMS 2008), Malaysia;
Eighth International Conference on Intelligent Systems Design and Applications
(ISDA’08), Taiwan; Fourth International Symposium on Information Assurance
and Security (IAS’07), Italy; Eighth International Conference on Hybrid Intelligent
Systems (HIS’08), Spain; Fifth IEEE International Conference on Soft Computing
as Transdisciplinary Science and Technology (CSTST’08), Cergy Pontoise, France;
and Program Chair/Co-chair of Third International Conference on Digital
Information Management (ICDIM’08), UK, and Second European Conference on
Data Mining (ECDM 2008), the Netherlands.

xxvii
xxviii About the Editors

He is Senior Member of IEEE, IEEE Computer Society, IEE (UK), ACM, etc.
More information is available at: http://www.softcomputing.net.

Dr. Paramartha Dutta was born in 1966. He completed his bachelor’s and mas-
ter’s degrees in statistics from the Indian Statistical Institute, Calcutta, in the years
1988 and 1990, respectively. He afterward completed his M.Tech. in computer
science from the same institute in 1993 and Ph.D. in Engineering from the Bengal
Engineering and Science University, Shibpur, in 2005. He has served in the capacity
of research personnel in various projects funded by Government of India, which are
done by Defence Research Development Organization, Council of Scientific and
Industrial Research, Indian Statistical Institute, etc. He is now Professor in the
Department of Computer and System Sciences of the Visva-Bharati University,
West Bengal, India. Prior to this, he served Kalyani Government Engineering
College and College of Engineering in West Bengal as Full-Time Faculty Member.
He remained associated as Visiting/Guest Faculty of several universities/institutes
such as West Bengal University of Technology, Kalyani University, Tripura
University.
He has co-authored eight books and has also seven edited books to his credit. He
has published more than two hundred technical papers in various peer-reviewed
journals and conference proceedings, both international and national, several
chapters in edited volumes of reputed international publishing houses like Elsevier,
Springer-Verlag, CRC Press, John Wiley. He has guided six scholars who had
already been awarded their Ph.D. apart from one who has submitted her thesis.
Presently, he is supervising six scholars for their Ph.D. program.
He is Co-Inventor of ten Indian patents and one international patent, which are all
published apart from five international patents which are filed but not yet published.
He, as investigator, could implement successfully the projects funded by All
India Council for Technical Education, Department of Science and Technology
of the Government of India. He has served/serves in the capacity of external
member of Board of Studies of relevant departments of various universities
encompassing West Bengal University of Technology, Kalyani University, Tripura
University, Assam University, Silchar. He had the opportunity to serve as the expert
of several interview boards organized by West Bengal Public Service Commission,
Assam University, Silchar; National Institute of Technology, Arunachal Pradesh;
Sambalpur University, etc.
He is Life Fellow of the Optical Society of India (FOSI), Institution of Electronics
and Telecommunication Engineers (IETE), Institute of Engineering (FIE), Life
Member of Computer Society of India (LMCSI), Indian Science Congress
Association (LMISCA), Indian Society for Technical Education (LMISTE), Indian
Unit of Pattern Recognition and Artificial Intelligence (LMIUPRAI)—the Indian
affiliate of the International Association for Pattern Recognition (IAPR), and Senior
Member of Associated Computing Machinery (SMACM), and Institution of
Electronics and Electrical Engineers (SMIEEE), USA.
About the Editors xxix

Dr. Jyotsna Kumar Mandal received his M.Tech. in computer science from
University of Calcutta in 1987. He was awarded Ph.D. in computer science and
engineering by Jadavpur University in 2000. Presently, he is working as Professor
of computer science and engineering and Former Dean, Faculty of Engineering,
Technology and Management, Kalyani University, Kalyani, Nadia, West Bengal,
for two consecutive terms since 2008. He is Ex-Director, IQAC, Kalyani
University, and Chairman, CIRM, Kalyani University. He was appointed as
Professor in Kalyani Government Engineering College through Public Service
Commission under the Government of West Bengal. He started his career as
Lecturer at NERIST, under MHRD, Government of India, Arunachal Pradesh, in
September 1988. He has teaching and research experience of 30 years. His areas of
research are coding theory, data and network security; remote sensing and
GIS-based applications, data compression, error correction, visual cryptography,
and steganography. He has guided 21 Ph.D. scholars, 2 scholars have submitted
their Ph.D. thesis, and 8 are pursuing. He has supervised 03 M.Phil. and more than
50 M.Tech. dissertations and more than 100 M.C.A. dissertations. He is Chief
Editor of CSI Journal of Computing and Guest Editor of MST Journal (SCI
indexed) of Springer Nature. He has published more than 400 research articles, out
of which 154 articles are in various international journals. He has published 5 books
from LAP Germany and one from IGI Global. He was awarded A. M. Bose
Memorial Silver Medal and Kali Prasanna Dasgupta Memorial Silver Medal in
M.Sc. by Jadavpur University. India International Friendship Society (IIFS), New
Delhi, conferred “Bharat Jyoti Award” for his meritorious service, outstanding
performance, and remarkable role in the field of computer science and engineering
on August 29, 2012. He received “Chief Patron” Award from CSI India in 2014.
International Society for Science, Technology and Management conferred
“Vidyasagar Award” in the Fifth International Conference on Computing,
Communication and Sensor Network on December 25, 2016. ISDA conferred
Rastriya Pratibha Award in 2017.

Abhishek Bhattacharya is Assistant Professor of computer application depart-


ment at the Institute of Engineering and Management, India. He did his Masters in
computer science from the Biju Patnaik University of Technology and completed
his M.Tech. in computer science from BIT, Mesra. He remained associated as
Visiting/Guest Faculty of several universities/institutes in India. He has three books
to his credit. He has published twenty technical papers in various peer-reviewed
journals and conference proceedings, both international and national, and chapters
in edited volumes of the reputed international publishing houses. He has teaching
and research experience of 13 years. His areas of research are data mining, network
security, mobile computing, and distributed computing. He is the reviewer of a
couple of journals of IGI Global, Inderscience Publications, and Journal of
Information Science Theory and Practice, South Korea.
He is Member of International Association of Computer Science and
Information Technology (IACSIT), Universal Association of Computer and
Electronics Engineers (UACEE), International Association of Engineers (IAENG),
xxx About the Editors

Internet Society as a Global Member (ISOC), the Society of Digital Information and
Wireless Communications (SDIWC) and International Computer Science and
Engineering Society (ICSES); Technical Committee Member of CICBA 2017,
52nd Annual Convention of Computer Society of India (CSI 2017), International
Conference on Futuristic Trends in Network and Communication Technologies
(FTNCT-2018), ICIoTCT 2018, ICCIDS 2018, and Innovative Computing and
Communication (ICICC-2018); Advisory Board Member of ISETIST 2017.

Soumi Dutta is Assistant Professor at the Institute of Engineering and


Management, India. She is also pursuing her Ph.D. in the Department of Computer
Science and Technology, Indian Institute of Engineering Science and Technology,
Shibpur. She received her B.Tech. in information technology and her M.Tech. in
computer science securing first position (gold medalist), both from Techno India
Group, India. His research interests include social network analysis, data mining,
and information retrieval. She is Member of several technical functional bodies
such as the Michigan Association for Computer Users in Learning (MACUL), the
Society of Digital Information and Wireless Communications (SDIWC), Internet
Society as a Global Member (ISOC), International Computer Science and
Engineering Society (ICSES). She has published several papers in reputed journals
and conferences.
Part I
Data Analytics
Sentiment Analysis of Tweet Data:
The Study of Sentimental State
of Human from Tweet Text

S. M. Mazharul Hoque Chowdhury, Priyanka Ghosh, Sheikh Abujar,


Most. Arina Afrin and Syed Akhter Hossain

Abstract Sentiment analysis is a hot topic today. The purpose of this research is
finding out sentimental state of a person or a group of people using data mining. The
target of this research is building a user friendly interface for general people, so that
they will be able to see the analysis report very easily. This analysis process contains
both supervised and unsupervised learning, which is a hybrid process. Analysis is
done based on keywords, which is defined by the user. User is able to set the number
of tweets he/she wants to analyze. We used web-based library for the system. The
system is tested and found satisfactory result.

Keywords Emotion · Polarity · R · Sentiment analysis · Scores · Social media


Twitter · Word cloud

1 Introduction

At present, social media or websites like Facebook, Twitter, Google + are top-visited
website and part and parcel of most of the people around all over the world. They
communicate to each other, post their opinion and reviews, share their likes and

S. M. M. H. Chowdhury (B) · P. Ghosh · S. Abujar · Most. Arina Afrin · S. Akhter Hossain


Department of Computer Science and Engineering, Daffodil International University,
Dhanmondi, Dhaka 1205, Bangladesh
e-mail: [email protected]
P. Ghosh
e-mail: [email protected]
S. Abujar
e-mail: [email protected]
Most. Arina Afrin
e-mail: [email protected]
S. Akhter Hossain
e-mail: [email protected]

© Springer Nature Singapore Pte Ltd. 2019 3


A. Abraham et al. (eds.), Emerging Technologies in Data Mining and Information
Security, Advances in Intelligent Systems and Computing 813,
https://doi.org/10.1007/978-981-13-1498-8_1
Other documents randomly have
different content
Fosheim, 63
France and the Jews, 202
France, Modern France, Contrasted with Russia, 198
French Fellow-travelers, Our, 90-97
Frydenlund, Night at, 58-60

Gammel Strand, The, Fish-market, 23


Geok Tepe, 210
German Bride, The Lovely, 43
German Fellow-travelers clamor for Bier, Our, 97
German Car, In a, 200
German Ogre Hungry for Denmark, 19
Germany, We Enter, 214
Germany, Journey to Hamburg, 218
Gors Vand, 92
Government Monopoly in Russia, 207
Graft, Mulcted for Passports, 150-159-195
Granheims Vand, 62
Gravens Vand, 84
Gribski, General, 210
Grungedals Vand, 106
Gudvangen, 78
Gulden at Den Haag, Two, 228

Hague, The, 228


Hamburg, 220
Hamlet’s Ghost and Grave, 35
Hangoe, We Make Port, 140
Hardanger Fjord, The, 85
Harvesting in Norway, 65
Harwich, Departure from, 1-3
Harwich, Return to, 228
Haukeli Fjeld, The, 97
Haukeli Fjeld, Descending from the, 107
Haymow Flying Through the Air, 71
Height of Land, Crossing above Nystuen, 69
Helsingborg, 41
Helsingfors, 143
Herring Catch at Elsinore, 38
Hoch der Kaiser, 189
Holger Danske, Legend of, 35
Holland, Passing Through, 225
Hollander of Today, The, 225
Hook of Holland, The, 227
Hotel Berlin, Moscow, 169
Hotel Breifond, Horre, 92
Hotel Continental, Stockholm, 122
Hotel Dagmar, Copenhagen, 13
Hotel de’l Europe, St. Petersburg, 149
Hotel Fleischer’s, Voss, Norway, 82
Hotel Haukelid, Norway, 97
Hotel Kristiania Missions, 46
Hotel Savoy, Berlin, 214
Hotel Sleibot, Elsinore, 38
Hotel Stalheim, Norway, 75
Hotel Twee Stadten, The Hague, 227
Hotel Victoria, Amsterdam, 223

Imperial Apartments, St. Petersburg, 155


Imperial Mail Train, Russia, 158
Ivan the Terrible, 176
Izvostchiks, 147-149-168

Jew, Cultivated Citizen of the World, 204


Jews’ Opportunity, The, 206
Jewess, Russian, 202
Jewish Synagogue, Moscow, 203
Jotunheim, 61
Jutland, to Funen and Zealand, 13
Juno, A Viking, 70

Kilefos, 78
King Oscar II, an Incident, 134
Kischineff, Massacres of, 210
Kremlin, The, 173
Kristiania, 46
Kristiania to Stockholm, 49
Kronborg, 34
Kronstadt, Fortress of, 145

Laera River, The, 72


Laerdalsoeren, 70
Lap Dish-wiper, A, 109
Life and Color of Swedish Capital, 129-132
Loeken Upon the Slidre Vand, 63
London, Departure, 1
London, Return to, 228
Lotefos and Skarsfos, 90
Lubin, The Eating Room at, 162

Maarken, Island of, 223


Maarken, In a Tight Place, 224
Maidens Milking Goats, 101
Maristuen, 69
Militarism, in Germany, 217
Military Guard, 160-163
Minsk, 199
Moscow, En Route to, 158-161
Moscow, Arrive at, 167
Moscow, 168
Moscow, Our Guide in, 169
Moscow, Street Life, 178
Moscow, We Leave, 195
Mujiks, Frightful Poverty of the, 197-208
Mujiks, Hatred of Bureaucrats, 187

Naeroe Fjord, 78
Nelson, U. S. Senator, 81
Neva, Entering the River, 146
Nordsjoe Vand, 110
North Sea, Crossing the, 3
Norwegian Bride, A, 119
Notes and Comments on Norse Life, 103
Notice to Police, 150
Novo Dievitchy, Monastery, 191
Novogorod, 125

Odda, The Voyage to, 87


Odda to Horre, 91
Odnaes, 55
Ole Mon, Our Driver, 56
Ole Mon, I Fall into Rhyme, 74
Opheims Vand, 80

Pageant of Russian Mass, 182


Palaces of St. Petersburg, 154
Passport System of Russia, 136-146
Peat Beds in Norway, 114
Peter the Great, 185
Petrovsky, Chateau, 193
Pixies and Sprites, 100
Poland and the Poles, 199
Police at St. Petersburg, 149
Problems of Russia Economic, 212

Raaben, General von, 210


Railroads—Danish, 10-31
English, 1
German, 218
Norwegian, 41-81
Russian, 160-163-195
Swedish, 118
Rand Fjord, Upon the, 55
Recruiting Farm Hands for America, 113
Red Square, Moscow, 174
Religious Feeling in Russia, 180
Rembrandt, 227
Revolution in Russia Inevitable, 199
Roldals Vand, 92
Roosevelt, Russians Admire, 166
Rubens, 227
Rundals Elv, 82
Rurik, House of, 125-176
Russians Barbarians, 179
Russian Dirt, 200
Russia, How We Entered, 136
Russia, Mediaeval and Pagan, 185
Sandven Vand, 89
Scandinavian State, United, 19-127
Scheveningen, 227
Schools, in Norway, 104
Schools, Lack of, in Russia, 156-165
Seljestad Hotel, Our Hostess, 91
Seljestad Juvet, 91
Serfs, in Russia, 206
Ships, on North Sea, 3
Ships, on Gulf of Finland, 138
Skansen Park, 131
Skien, 108
Skjervefos, The Roaring, 83
Skodshorn, The Legend of the, 65
Skogstad, The Night at, 67
Sleeping Car, Swedish, 118
Slidre Vand, 63
Smidal Fjord, 75
Smolensk, 195
Snow, The First, 191
Snows, Distant, 60
Sogne Fjord, On the, 75
South African Trooper, Incident, 2
Sparrow Hills, 177
Staa Vand, 97
Staavanger, 88
Stalheim to Vossvangen, 81
Stars, We are the, 105
Stockholm, 129
Stockholm and the Swede, 123
Stockholm, The Hotel at, 122
Stockholm, Life and Color of, 128
St. Peter and St. Paul, Church of, 156
St. Petersburg, 148
Stranda Vand, The, 60
Summary of Impressions, 229
Sund, The, 32
Sund, The, Crossing to Sweden, 41
Swede and Norsk, Differentiation of, 124
Swedish Coffee House, A, 133
Swedish Sleeping Car, A, 118

Telemarken Fjords, The, 108-110


Teutonic Kinship, 189
Thier Garten, Berlin, 216
Three Continents, 184
Tivoli Gardens, Copenhagen, 26
Tomlevolden, 56
Tonsaasen, Sanitorium of, 57
Trolls and Pixies, 65
Trolls and Witches, 98
Tver, City of, 163
Tvinde Elv, 81
Twilight, the Arctic, 115

Ulivaa Vand, 97
Utro Vand, 69

Vangs Vand, 81
Vangsmjoesen Vand, 60
Valdai Hills, 163
Volga River, 125-163
Voss or Vossvangen, 81
Voxli Vand, 106

Warships, Incident of American, 53


Wealth of Churches, St. Petersburg, 156-157
Wealth of Few, Poverty of Many, Russia, 148-152-157
Wealth of Few, Russia, 209
Wedding Party, A, 120
Wein Stube, Hamburg, 220
Western Alps of Norway, 88
Winter, Preparation for, 115
Workingmen’s Square, 187

Zuyder Zee, 223


MAP OF NORTH EUROPE.
MAP OF SCANDINAVIA AND BALTIC RUSSIA, IN PROFILE.
*** END OF THE PROJECT GUTENBERG EBOOK THROUGH
SCANDINAVIA TO MOSCOW ***

Updated editions will replace the previous one—the old editions will
be renamed.

Creating the works from print editions not protected by U.S.


copyright law means that no one owns a United States copyright in
these works, so the Foundation (and you!) can copy and distribute it
in the United States without permission and without paying
copyright royalties. Special rules, set forth in the General Terms of
Use part of this license, apply to copying and distributing Project
Gutenberg™ electronic works to protect the PROJECT GUTENBERG™
concept and trademark. Project Gutenberg is a registered trademark,
and may not be used if you charge for an eBook, except by following
the terms of the trademark license, including paying royalties for use
of the Project Gutenberg trademark. If you do not charge anything
for copies of this eBook, complying with the trademark license is
very easy. You may use this eBook for nearly any purpose such as
creation of derivative works, reports, performances and research.
Project Gutenberg eBooks may be modified and printed and given
away—you may do practically ANYTHING in the United States with
eBooks not protected by U.S. copyright law. Redistribution is subject
to the trademark license, especially commercial redistribution.

START: FULL LICENSE


THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK

To protect the Project Gutenberg™ mission of promoting the free


distribution of electronic works, by using or distributing this work (or
any other work associated in any way with the phrase “Project
Gutenberg”), you agree to comply with all the terms of the Full
Project Gutenberg™ License available with this file or online at
www.gutenberg.org/license.

Section 1. General Terms of Use and


Redistributing Project Gutenberg™
electronic works
1.A. By reading or using any part of this Project Gutenberg™
electronic work, you indicate that you have read, understand, agree
to and accept all the terms of this license and intellectual property
(trademark/copyright) agreement. If you do not agree to abide by all
the terms of this agreement, you must cease using and return or
destroy all copies of Project Gutenberg™ electronic works in your
possession. If you paid a fee for obtaining a copy of or access to a
Project Gutenberg™ electronic work and you do not agree to be
bound by the terms of this agreement, you may obtain a refund
from the person or entity to whom you paid the fee as set forth in
paragraph 1.E.8.

1.B. “Project Gutenberg” is a registered trademark. It may only be


used on or associated in any way with an electronic work by people
who agree to be bound by the terms of this agreement. There are a
few things that you can do with most Project Gutenberg™ electronic
works even without complying with the full terms of this agreement.
See paragraph 1.C below. There are a lot of things you can do with
Project Gutenberg™ electronic works if you follow the terms of this
agreement and help preserve free future access to Project
Gutenberg™ electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation (“the
Foundation” or PGLAF), owns a compilation copyright in the
collection of Project Gutenberg™ electronic works. Nearly all the
individual works in the collection are in the public domain in the
United States. If an individual work is unprotected by copyright law
in the United States and you are located in the United States, we do
not claim a right to prevent you from copying, distributing,
performing, displaying or creating derivative works based on the
work as long as all references to Project Gutenberg are removed. Of
course, we hope that you will support the Project Gutenberg™
mission of promoting free access to electronic works by freely
sharing Project Gutenberg™ works in compliance with the terms of
this agreement for keeping the Project Gutenberg™ name associated
with the work. You can easily comply with the terms of this
agreement by keeping this work in the same format with its attached
full Project Gutenberg™ License when you share it without charge
with others.

1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the
terms of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.

1.E. Unless you have removed all references to Project Gutenberg:

1.E.1. The following sentence, with active links to, or other


immediate access to, the full Project Gutenberg™ License must
appear prominently whenever any copy of a Project Gutenberg™
work (any work on which the phrase “Project Gutenberg” appears,
or with which the phrase “Project Gutenberg” is associated) is
accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere in the United
States and most other parts of the world at no cost and with
almost no restrictions whatsoever. You may copy it, give it away
or re-use it under the terms of the Project Gutenberg License
included with this eBook or online at www.gutenberg.org. If you
are not located in the United States, you will have to check the
laws of the country where you are located before using this
eBook.

1.E.2. If an individual Project Gutenberg™ electronic work is derived


from texts not protected by U.S. copyright law (does not contain a
notice indicating that it is posted with permission of the copyright
holder), the work can be copied and distributed to anyone in the
United States without paying any fees or charges. If you are
redistributing or providing access to a work with the phrase “Project
Gutenberg” associated with or appearing on the work, you must
comply either with the requirements of paragraphs 1.E.1 through
1.E.7 or obtain permission for the use of the work and the Project
Gutenberg™ trademark as set forth in paragraphs 1.E.8 or 1.E.9.

1.E.3. If an individual Project Gutenberg™ electronic work is posted


with the permission of the copyright holder, your use and distribution
must comply with both paragraphs 1.E.1 through 1.E.7 and any
additional terms imposed by the copyright holder. Additional terms
will be linked to the Project Gutenberg™ License for all works posted
with the permission of the copyright holder found at the beginning
of this work.

1.E.4. Do not unlink or detach or remove the full Project


Gutenberg™ License terms from this work, or any files containing a
part of this work or any other work associated with Project
Gutenberg™.

1.E.5. Do not copy, display, perform, distribute or redistribute this


electronic work, or any part of this electronic work, without
prominently displaying the sentence set forth in paragraph 1.E.1
with active links or immediate access to the full terms of the Project
Gutenberg™ License.

1.E.6. You may convert to and distribute this work in any binary,
compressed, marked up, nonproprietary or proprietary form,
including any word processing or hypertext form. However, if you
provide access to or distribute copies of a Project Gutenberg™ work
in a format other than “Plain Vanilla ASCII” or other format used in
the official version posted on the official Project Gutenberg™ website
(www.gutenberg.org), you must, at no additional cost, fee or
expense to the user, provide a copy, a means of exporting a copy, or
a means of obtaining a copy upon request, of the work in its original
“Plain Vanilla ASCII” or other form. Any alternate format must
include the full Project Gutenberg™ License as specified in
paragraph 1.E.1.

1.E.7. Do not charge a fee for access to, viewing, displaying,


performing, copying or distributing any Project Gutenberg™ works
unless you comply with paragraph 1.E.8 or 1.E.9.

1.E.8. You may charge a reasonable fee for copies of or providing


access to or distributing Project Gutenberg™ electronic works
provided that:

• You pay a royalty fee of 20% of the gross profits you derive
from the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”

• You provide a full refund of any money paid by a user who


notifies you in writing (or by e-mail) within 30 days of receipt
that s/he does not agree to the terms of the full Project
Gutenberg™ License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg™ works.

• You provide, in accordance with paragraph 1.F.3, a full refund of


any money paid for a work or a replacement copy, if a defect in
the electronic work is discovered and reported to you within 90
days of receipt of the work.

• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.

1.E.9. If you wish to charge a fee or distribute a Project Gutenberg™


electronic work or group of works on different terms than are set
forth in this agreement, you must obtain permission in writing from
the Project Gutenberg Literary Archive Foundation, the manager of
the Project Gutenberg™ trademark. Contact the Foundation as set
forth in Section 3 below.

1.F.

1.F.1. Project Gutenberg volunteers and employees expend


considerable effort to identify, do copyright research on, transcribe
and proofread works not protected by U.S. copyright law in creating
the Project Gutenberg™ collection. Despite these efforts, Project
Gutenberg™ electronic works, and the medium on which they may
be stored, may contain “Defects,” such as, but not limited to,
incomplete, inaccurate or corrupt data, transcription errors, a
copyright or other intellectual property infringement, a defective or
damaged disk or other medium, a computer virus, or computer
codes that damage or cannot be read by your equipment.

1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES - Except for


the “Right of Replacement or Refund” described in paragraph 1.F.3,
the Project Gutenberg Literary Archive Foundation, the owner of the
Project Gutenberg™ trademark, and any other party distributing a
Project Gutenberg™ electronic work under this agreement, disclaim
all liability to you for damages, costs and expenses, including legal
fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR
NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR
BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH
1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK
OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL
NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT,
CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF
YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.

1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND - If you


discover a defect in this electronic work within 90 days of receiving
it, you can receive a refund of the money (if any) you paid for it by
sending a written explanation to the person you received the work
from. If you received the work on a physical medium, you must
return the medium with your written explanation. The person or
entity that provided you with the defective work may elect to provide
a replacement copy in lieu of a refund. If you received the work
electronically, the person or entity providing it to you may choose to
give you a second opportunity to receive the work electronically in
lieu of a refund. If the second copy is also defective, you may
demand a refund in writing without further opportunities to fix the
problem.

1.F.4. Except for the limited right of replacement or refund set forth
in paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.

1.F.5. Some states do not allow disclaimers of certain implied


warranties or the exclusion or limitation of certain types of damages.
If any disclaimer or limitation set forth in this agreement violates the
law of the state applicable to this agreement, the agreement shall be
interpreted to make the maximum disclaimer or limitation permitted
by the applicable state law. The invalidity or unenforceability of any
provision of this agreement shall not void the remaining provisions.

1.F.6. INDEMNITY - You agree to indemnify and hold the Foundation,


the trademark owner, any agent or employee of the Foundation,
anyone providing copies of Project Gutenberg™ electronic works in
accordance with this agreement, and any volunteers associated with
the production, promotion and distribution of Project Gutenberg™
electronic works, harmless from all liability, costs and expenses,
including legal fees, that arise directly or indirectly from any of the
following which you do or cause to occur: (a) distribution of this or
any Project Gutenberg™ work, (b) alteration, modification, or
additions or deletions to any Project Gutenberg™ work, and (c) any
Defect you cause.

Section 2. Information about the Mission


of Project Gutenberg™
Project Gutenberg™ is synonymous with the free distribution of
electronic works in formats readable by the widest variety of
computers including obsolete, old, middle-aged and new computers.
It exists because of the efforts of hundreds of volunteers and
donations from people in all walks of life.

Volunteers and financial support to provide volunteers with the


assistance they need are critical to reaching Project Gutenberg™’s
goals and ensuring that the Project Gutenberg™ collection will
remain freely available for generations to come. In 2001, the Project
Gutenberg Literary Archive Foundation was created to provide a
secure and permanent future for Project Gutenberg™ and future
generations. To learn more about the Project Gutenberg Literary
Archive Foundation and how your efforts and donations can help,
see Sections 3 and 4 and the Foundation information page at
www.gutenberg.org.

Section 3. Information about the Project


Gutenberg Literary Archive Foundation
The Project Gutenberg Literary Archive Foundation is a non-profit
501(c)(3) educational corporation organized under the laws of the
state of Mississippi and granted tax exempt status by the Internal
Revenue Service. The Foundation’s EIN or federal tax identification
number is 64-6221541. Contributions to the Project Gutenberg
Literary Archive Foundation are tax deductible to the full extent
permitted by U.S. federal laws and your state’s laws.

The Foundation’s business office is located at 809 North 1500 West,


Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up
to date contact information can be found at the Foundation’s website
and official page at www.gutenberg.org/contact

Section 4. Information about Donations to


the Project Gutenberg Literary Archive
Foundation
Project Gutenberg™ depends upon and cannot survive without
widespread public support and donations to carry out its mission of
increasing the number of public domain and licensed works that can
be freely distributed in machine-readable form accessible by the
widest array of equipment including outdated equipment. Many
small donations ($1 to $5,000) are particularly important to
maintaining tax exempt status with the IRS.

The Foundation is committed to complying with the laws regulating


charities and charitable donations in all 50 states of the United
States. Compliance requirements are not uniform and it takes a
considerable effort, much paperwork and many fees to meet and
keep up with these requirements. We do not solicit donations in
locations where we have not received written confirmation of
compliance. To SEND DONATIONS or determine the status of
compliance for any particular state visit www.gutenberg.org/donate.

While we cannot and do not solicit contributions from states where


we have not met the solicitation requirements, we know of no
prohibition against accepting unsolicited donations from donors in
such states who approach us with offers to donate.

International donations are gratefully accepted, but we cannot make


any statements concerning tax treatment of donations received from
outside the United States. U.S. laws alone swamp our small staff.

Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.

Section 5. General Information About


Project Gutenberg™ electronic works
Professor Michael S. Hart was the originator of the Project
Gutenberg™ concept of a library of electronic works that could be
freely shared with anyone. For forty years, he produced and
distributed Project Gutenberg™ eBooks with only a loose network of
volunteer support.
Project Gutenberg™ eBooks are often created from several printed
editions, all of which are confirmed as not protected by copyright in
the U.S. unless a copyright notice is included. Thus, we do not
necessarily keep eBooks in compliance with any particular paper
edition.

Most people start at our website which has the main PG search
facility: www.gutenberg.org.

This website includes information about Project Gutenberg™,


including how to make donations to the Project Gutenberg Literary
Archive Foundation, how to help produce our new eBooks, and how
to subscribe to our email newsletter to hear about new eBooks.
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade

Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.

Let us accompany you on the journey of exploring knowledge and


personal growth!

textbookfull.com

You might also like