This book presents a vital method for companies to connect with potential clients and consumers in the digital era of Online Social Networks (OSNs), utilizing the strength of well known social networks and AI to achieve success through fostering brand supporters, generating leads, and enhancing customer interactions.
Table of ContentsPreface
1. Unmasking Social Media Crimes: Types, Trends, and Impact Rijvan Beg, Vivek Bhardwaj, Mukesh Kumar, Prathamesh Muzumdar, Aman Rajput and Kamal Borana
1.1 Introduction
1.2 Related Work
1.3 Social Media
1.4 Types of Social Media Crimes
1.4.1 Overview of Social Media Crimes
1.4.2 Key Characteristics
1.4.3 Cyberbullying and Online Harassment
1.4.3.1 Impact on Victims
1.4.4 Identity Theft and Scams
1.4.4.1 Consequences for Victims
1.4.5 Hate Speech and Incitement to Violence
1.4.5.1 Link to Real-World Violence
1.5 Trends in Social Media Crimes
1.5.1 Case Studies
1.6 Law Enforcements’s Use of Social Media Surveillance
1.6.1 The Evolution of Social Media Surveillance
1.6.2 Key Motivations
1.6.3 Methods Employed
1.6.4 Legal and Ethical Considerations
1.7 Challenges in Social Media Surveillance
1.7.1 Accuracy and Interpretation
1.7.2 Social Media Evidence and Accuracy
1.7.3 Legal Questions and Implications
1.7.4 The Intersection of Social Media and Criminal Justice
1.8 Impact of Social Media Crimes
1.9 Conclusion
References
2. Study on Vulnerability in Online Social Networking: Impact on an Individual, CommunitySukrati Agrawal and Hare Ram Sah
2.1 Introduction
2.2 Statistics of Online Social Media Network
2.3 Existing Research on Social Media Vulnerabilities
2.4 Vulnerability
2.4.1 How Vulnerability is Related to Online Social Networking
2.4.2 Classification of Vulnerability
2.4.2.1 Individual Vulnerabilities
2.4.2.2 Community Vulnerabilities
2.4.2.3 Government Vulnerabilities
2.4.3 State of the Art: Techniques to Prevent Yourself from Social Media Vulnerabilities
2.4.4 Some Popular Case Study
2.5 Future Trends
2.6 Conclusion
Acknowledgement
References
3. Application of Google Lens Clone Using Image Recognition in Enterprise EnvironmentSonam Gour
3.1 Introduction
3.2 Requirement and Application
3.2.1 Issue-Wise Solution Approaches
3.2.2 Related Work
3.3 Strengths and Weaknesses
3.4 Limitations
3.5 Approach
3.5.1 Region Proposal Network and Knowledge Graph
3.5.2 Convolutional Neural Networks (CNNs)
3.5.3 Fixing the Image Capture Lag
3.5.4 Machine Translation Neural Networks
3.5.5 DeepMind’s Wavenet
3.5.6 World Through the Looking Glass
3.6 Design and Implementation
3.6.1 Architecture Design of the Application
3.6.2 Details of Inputs/Data Used
3.6.3 Discuss Input/Output Requirements, Variables, Assumptions Related to System
3.6.4 Performance Evaluation
3.7 Experimental Results and Analysis
3.8 Conclusion
References
4. An Artificial Intelligence Risk Assessment of a Material Handling System Using a Cost–Safety MatrixRandhir Singh Baghel and Sudhir Kumar Rathi
Introduction
References
5. Sustainable Futures: Navigating Blockchain’s Energy DilemmaAnand Rajavat, Vivek Bhardwaj, Navjeet Kaur, Romil Rawat, Anjali Rawat and Gautam Singh Jadon
5.1 Introduction
5.2 Related Work
5.3 Understanding Blockchain Technology
5.4 Energy Dilemma in Blockchain Technology
5.4.1 Consensus Mechanisms and Energy Consumption
5.5 Environmental Implications
5.6 Sustainable Solutions in Blockchain
5.7 Scalability and Efficiency Issues in Greener Consensus Mechanisms
5.8 Blockchain’s Role in Sustainable Development Goals (SDGS)
5.9 Industry Applications and Best Practices
5.9.1 Sustainable Supply Chains and Ethical Sourcing
5.9.2 Renewable Energy Trading and Peer-to-Peer Transactions
5.10 Conclusion
References
6. Role of Online Social Networking in Smart HealthcareShabnam Kumari and Amit Kumar Tyagi
6.1 Introduction
6.1.2 Organization of the Work
6.2 Evolution of Online Social Network and Smart Healthcare
6.2.1 Background
6.2.2 Benefits of Online Social Networking in Healthcare
6.3 Issues and Challenges Towards Online Social Networking in Smart Healthcare
6.4 Popular Case Study 1: Online Social Networking in Smart Healthcare
6.5 Integrating Social Networking into Healthcare Policies for Better and Reliable Services
6.6 Future Opportunities and Innovation Towards Online Social Networking in Healthcare
6.7 An Open Discussion on OSN for Healthcare with Cutting Edge Technologies for Modern People
6.8 Conclusion
References
7. Application and Future Trends in Online Social Networking for the Next GenerationAmit Kumar Tyagi, Richa and Smita Manohar Gaikwad
7.1 Introduction to Online Social Networking, and Next Generation Society: Fundamentals, and Key Component and Features
7.1.1 Background
7.1.2 Scope and Importance of Online Social Networking in the Next Decade
7.1.3 Organization of the Work
7.2 Current Applications of Online Social Networking
7.3 Role of Emerging Applications in Making Effective Online Social Networking
7.3.1 Blockchain–Internet of Things (IoT) Integration in OSN
7.3.2 Quantum Computing in OSN
7.4 Next-Generation Social Networking Technologies for Modern Generation
7.4.1 Advanced Communication Tools for Next Generation Society
7.5 Future Research Opportunities Towards Online Social Networking for the Next Generation
7.6 Open Issues and Challenges in Next-Generation Machine-Based Social Networking
7.7 User Perspectives and Expectations Today by OSN and Its Effect on Modern Society/Generation
7.8 Conclusion
References
8. Security and Possible Threats in Today’s Online Social Networking PlatformsAmit Kumar Tyagi, Kanchan Naithani and Shrikant Tiwari
8.1 Introduction
8.1.1 Background
8.1.2 Importance of Security in Online Social Networking
8.2 Existing Security Architecture in Social Networking Platforms
8.3 Common Security Threats on Network and Websites
8.4 Security and Privacy Issues in Online Social Networking in Today’s Smart Era
8.5 Emerging Threats for Next Generation Based Online Social Networking
8.5.1 Deepfake Technology: A Threat to Modern OSN
8.5.2 AI-Driven Attacks on Modern OSNs
8.6 Security Measures and Tools Available for Protecting Network/OSNs
8.7 Regulatory Framework and Compliance for Reliable/Safe/Secure OSNs for Next Generation
8.8 Incident Response and Recovery Towards OSNs
8.9 Detection and Notification Towards OSNs
8.9.1 Mitigation Strategies Towards OSNs
8.10 Conclusion
References
9. The Future of Artificial Intelligence and Machine Learning in Online Social NetworkingAmit Kumar Tyagi, Ajanthaa Lakkshmanan and Sayed Sayeed Ahmad
9.1 Introduction
9.2 Current Landscape of Online Social Networking
9.2.1 Role of Algorithms in Social Networking
9.3 Open Issues and Challenges Towards AI and ML in Social Networking
9.4 Future Research Opportunities Towards AI and ML in Social Networking
9.5 Applications of AI in Online Social Networking
9.5.1 Enhancing User Experience with AI for Better Social Connection
9.5.2 AI and ML for Advertising and Monetization via OSNs
9.5.3 Anticipated Impact of the Social Networking Industry Over Modern Generation
9.6 Future Research Opportunities Towards AI and ML in Social Networking Using Emerging Technologies
9.7 Conclusion
References
10. Future Opportunities Towards Online Social Networking in the Era of Industry 4.0/5.0Amit Kumar Tyagi and Shabnam Kumari
10.1 Introduction
10.1.1 Relevance of Online Social Networking in the Industry 4.0/5.0 Era
10.1.2 Organization of Work
10.2 Evolution of Online Social Networking in Industry 4.0/5.0
10.3 Emerging Opportunities with Emerging Technologies for Social Networking in Industry 4.0/5.0
10.4 Interconnectivity and Integration of Emerging Technology with Industry 4.0/5.0 for Effective Online Social Networking
10.4.1 IoT-Enabled Social Networking
10.4.2 AI-Driven Insights for Industrial Networking
10.4.3 Blockchain Applications in Social and Industrial Networks
10.5 Smart Manufacturing and Social Networking Towards Industry 4.0/5.0
10.5.1 Role of Social Platforms in Smart Factories
10.5.2 Data-Driven Decision Making in Manufacturing Processes
10.6 Open Issues and Challenges Towards Industry 4.0/5.0 for Effective Online Social Networking
10.7 Future Research Opportunities Towards Industry 4.0/5.0 for an Effective Online Social Networking
10.8 Conclusion
References
11. Online Social Networking: Power of Industry 6.0 and BeyondShabnam Kumari and Amit Kumar Tyagi
11.1 Introduction
11.1.1 Online Social Networking
11.1.2 Industry 6.0: Definition
11.1.3 Evolution from Industry 4.0/5.0 to Industry 6.0
11.1.4 Organization of the Work
11.2 Background
11.3 Transformative Shifts in Industrial Paradigms for Industry 6.0
11.4 The Role of Online Social Networking in Industry 6.0
11.4.1 Collaborative Innovation Through Social Platforms
11.4.2 Human-Centric Approaches in Industrial Networking
11.5 Integration of Emerging Technologies for Social Networking in the Era of Industry 6.0
11.5.1 Integration with Artificial Intelligence (AI)/ ML for Social Networking in the Era of Industry 6.0
11.5.2 Synergy of Blockchain and Internet of Things (IoT) for Social Networking in the Era of Industry 6.0
11.5.3 Quantum Computing for Social Networking in the Era of Industry 6.0
11.5.4 AR/VR for Social Networking in the Era of Industry 6.0
11.6 Smart Factories and Social Collaboration
11.6.1 Enhanced Communication in Smart Manufacturing
11.6.2 Social Networks for Adaptive and Agile Production
11.6.3 Worker Empowerment Through Digital Social Platforms
11.7 Future Research Opportunities for Social Networking in the Era of Industry 6.0
11.7.1 Beyond Industry 6.0: Emerging Concepts and Paradigms
11.7.2 Business Opportunities for Social Networking Platforms
11.8 Popular Issue and Challenges Towards Online Social Networking in the Era of Industry 6.0
11.9 Conclusion
References
12. An Investigation on Detection of Botnets in Online Social NetworksP. Nancy, A. Devipriya, K. Anitha, D. Vinod and R. Anto Arockia Rosaline
12.1 Introduction
12.1.1 Socialbots
12.2 Literature Survey
12.2.1 Vulnerabilities in Online Social Network
12.3 Challenges in Social Chatbot Detection
12.4 Socialbots Detection
12.5 Conclusion
References
13. Design and Development of Techniques for Fake Profile Detection in Online Social NetworksR. Anto Arockia Rosaline, D. Vinod, P. Nancy, K. Anitha and A. Devipriya
13.1 Introduction
13.2 Literature Survey
13.2.1 Community Detection in Online Social Network
13.2.2 Spam Detection in Online Social Network
13.3 Methods and Results
13.4 Conclusion
References
14. Spammer Detection in Online Social NetworksRahin Batcha R., D. Saravanan, Vijay Ramalingam, T. Ragupathi, Arul Prakash A., S. Vignesh, Belsam Jeba Ananth M. and K. Arumugam
14.1 Introduction
14.2 Challenges in Online Social Network Spammer Detection
14.3 Literature Review
14.3.1 Spammer Detection in Twitter
14.3.2 Spammer Detection in Facebook
14.3.3 Review of Feature Selection and Classification Techniques
14.4 Machine Learning for Spammer Detection
14.5 Conclusion
References
15. A Review of Various Applications of Internet of Things with Related Security Issues and ChallengesT. Ragupathi, Arul Prakash A., S. Vignesh, Rahin Batcha R., D. Saravanan, Vijay Ramalingam and K. P. Yuvaraj
15.1 Introduction
15.2 Literature Survey
15.3 IoT Applications and Related Security Issues
15.3.1 Smart Homes
15.3.2 Wearable Devices
15.3.3 Smart Cities
15.3.4 Smart Healthcare
15.3.5 Smart Agriculture
15.3.6 Energy Management
15.3.7 Smart Transportation
15.4 Security Issues and Challenges
15.4.1 Heterogeneous Devices in IoT Network
15.4.2 Integration with Physical Devices and Objects
15.4.3 Devices with Limited Computing Capability
15.4.4 Large Size of IoT Network
15.4.5 Privacy
15.5 Conclusion
References
16. AGRO-Cloud Model and Smart Algorithm to Increase Crop Yield Prediction to Improve Agriculture QualityAvdesh Kumar Sharma and Abhishek Singh Rathore
16.1 Introduction
16.2 Related Work
16.3 AGRO-Cloud Model
16.4 Deep Learning for Smart Agriculture
16.4.1 Classification and Combination
16.4.2 Results Analysis
16.5 Conclusion and Future Work
References
17. OSN in Healthcare Performance View Through IntegrationSudhir Kumar Rathi, Nitin Soni and Naresh Mathur
17.1 Introduction
17.2 The Role of OSNs in Patient Care
17.2.1 Enhancing Doctor-Patient Communication
17.2.2 Remote Patient Monitoring and Telemedicine
17.2.3 Patient Support Groups and Health Education
17.3 OSNs and Public Health Initiatives
17.3.1 Health Promotion and Disease Prevention Campaigns
17.3.1.1 Some Examples of Fitness Merchandising and Sickness Prevention
Campaigns That Have Been Conducted on OSNs Include
17.3.2 Monitoring Public Health Trends Through OSN Data
17.3.3 Engaging Communities in Public Health Interventions
17.4 OSNs in Medical Research and Data Sharing
17.4.1 Collaborative Research and Knowledge Sharing
17.4.1.1 There are a Number of Ways That OSNs can be Used for Collaborative Research and Knowledge Sharing in Healthcare. For Example, OSNs can be Used to
17.4.2 Real-Time Healthcare Data Analysis Through OSNs
17.4.3 Ethical Considerations in Utilizing OSN Data for Medical Research
17.5 Leveraging AI and Data Analytics in Healthcare OSNs
17.5.1 AI Applications in OSN-Enabled Healthcare
17.5.1.1 AI can be Used to Enhance OSN-Enabled Healthcare in Some of Approaches, Which Includes
17.5.2 Improving Healthcare Outcomes Through Data Analytics
17.5.3 Personalized Medicine and Predictive Analytics
17.6 Privacy and Security Concerns in OSN-Enabled Healthcare
17.6.1 Ensuring Patient Privacy and Consent
17.6.1.1 Below are a Few Strategies to Make Certain Affected Person Privacy
and Consent in OSNs
17.6.2 Addressing Misinformation and Biases in OSN Health Content
17.6.3 Ethical Guidelines for Healthcare Professionals
17.7 Case Studies of Successful OSN Implementation in Healthcare
17.7.1 Improving Patient Outcomes Through OSNs
17.7.1.1 Study of a Case: PatientsLikeMe
17.7.2 OSNs as Tools for Public Health Awareness
17.7.2.1 Case Study: COVID-19 Education Initiative from Khan Academy
17.7.3 Impact of OSNs on Medical Research and Clinical Trials
17.7.3.1 Case Study: Facebook Participation by Patients in Clinical Trials
17.8 Future Directions and Innovation in OSN Healthcare Integration
17.8.1 Emerging Trends in OSN-Enabled Healthcare
17.8.2 Collaborations Between Healthcare Providers and OSN Platforms
17.8.3 The Role of Virtual Reality and Immersive Technologies
17.9 Healthcare Organizations and OSN Adoption Strategies
17.9.1 Maximizing Benefits of OSNs in Healthcare Delivery
17.9.2 Creating a Culture of Responsible OSN Usage
17.9.3 Overcoming Challenges and Resistance to OSN Integration
17.10 Conclusion
17.10.1 Summary of Key Findings
17.10.2 Implications for the Future of OSNs in Healthcare
References
18. Internet-Based Platforms and Trends Towards Online Social NetworkingBright Keswani, Sunil Kumar Kushwaha, Savita Shiwani and Neeraj Kumar Parashar
18.1 Introduction
18.1.1 Features and Components
18.1.2 Types of Social Networking Platforms
18.2 Applications of OSN
18.2.1 Personal Communication OSN [PC-OSN]
18.2.2 Professional Networking OSN [PN-OSN]
18.2.3 Business and Marketing [BM-OSN]
18.2.4 Knowledge Sharing and Education [KSE-OSN]
18.2.5 Social Activism and Awareness [SAA-OSN]
18.3 Emerging Trends in Online Social Networking
18.3.1 Video Content Dominance
18.3.2 Influencer Culture and Personal Branding
18.3.3 Ephemeral Content
18.3.4 Augmented Reality (AR) and Virtual Reality (VR)
18.3.5 Privacy and Data Security
18.4 Implications and Challenges
18.4.1 Effects of Online Social Networking
18.4.2 Challenges of Online Social Networking
18.4.3 Ethical Considerations
18.5 Related Work
18.6 Proposed Methodology
References
19. Security and Threat in Online Social NetworkingSumit Kumar Kapoor, Kirti Sankhla, Prakhar Agarwal and Sudhir Kumar Rathi
19.1 Introduction
19.2 User-Centric Security Challenges
19.2.1 Privacy Breaches and Data Leaks
19.2.2 Cyberbullying, Harassment, and Online Abuse
19.2.3 Identity Theft and Impersonation
19.2.4 Psychological and Emotional Impacts on Users
19.3 Platform-Centric Vulnerabilities
19.3.1 Fake Accounts and Automated Bots
19.3.2 Misinformation and Disinformation Campaigns
19.3.3 Data Breaches and Compromised User Information
19.3.4 Algorithmic Biases and Content Amplification
19.4 Content Moderation and Algorithmic Solutions
19.4.1 Content Moderation Challenges on Social Platforms
19.4.2 Machine Learning and AI-Based Content Filtering
19.4.3 Fact-Checking Partnerships and Information Verification
19.4.4 Ethical Considerations in Content Moderation
19.5 Emerging Threats
19.5.1 Deepfakes and Their Implications for Online Security
19.5.2 AI-Generated Content and the Erosion of Authenticity
19.5.3 Manipulation of Public Opinion and Political Influence
19.5.4 Staying Ahead of Evolving Threats Through Technological Innovation
19.6 User Education and Privacy Controls
19.6.1 Importance of Educating Users About Online Risks
19.6.2 Strategies for Promoting Digital Literacy and Critical Thinking
19.6.3 Enhancing User Awareness of Privacy Settings and Controls
19.6.4 Case Studies of Successful User Education Initiatives
19.7 Regulatory Frameworks and Industry Standards
19.7.1 Government Regulations Addressing Online Security and Privacy
19.7.2 Industry Efforts to Self-Regulate and Establish Best Practices
19.7.3 Balancing Free Expression and Security in Online Spaces
19.7.4 International Cooperation and Cross-Border Challenges
19.8 Interdisciplinary Approaches
19.8.1 Collaborative Efforts Among Technologists, Psychologists, Sociologists, etc.
19.8.2 Research Findings on the Effectiveness of Interdisciplinary Approaches
19.8.3 Case Studies Highlighting Successful Interdisciplinary Collaborations
19.8.4 The Future of Cross-Disciplinary Efforts in Enhancing Online Security
19.9 Case Studies and Real-World Examples
19.9.1 Analyzing Notable Security Incidents and Their Impact
19.9.2 Lessons Learned from Successful and Unsuccessful Responses
19.9.3 Highlighting Instances of User Empowerment and Platform Accountability
19.9.3.1 User Empowerment
19.9.3.2 Platform Accountability
19.10 Conclusion
19.10.1 Recap of Key Findings and Insights
19.10.2 Implications for the Future of Online Social Networking
19.10.3 Call to Action for Stakeholders, Including Users, Platforms, and Policymakers
19.10.4 Areas for Future Research and Development
19.11 Conclusion
References
20. Social Media Platform Scraping and Extracting ParadigmRakesh Kumar Saxena, Sangita Gupta, Anuradha Raheja and Pushp Raj Tripathi
20.1 Introduction
20.2 Significance of Facebook, Twitter Data Scraping
20.3 Related Work
20.4 Proposed Methodology
20.4.1 Web Scraping Algorithm
20.4.2 Information Trend Algorithm
20.5 Conclusion
References
21. Computer-Generated Environment for Virtual Reality and Digital Information TechnologiesSudhir Kumar Rathi, Pritam Prasad Lata and Aakansha Mitawa
21.1 Introduction
21.1.1 Virtual Reality – Defining the New Reality
21.1.2 Digital Information Technologies – Unleashing the Data’s Potential
21.1.3 Synergy Between Virtual Reality and Digital Information Technologies
21.1.4 Application and Implication of VR And DIT
21.1.5 Working of Virtual Reality Technology
21.1.5.1 Hardware Parts
21.1.5.2 Components of Software
21.1.5.3 The Working Method
21.2 Advantages of Virtual Reality
21.2.1 Working with Digital Information Technologies
21.2.2 Advantages of Digital Information Technologies
21.2.3 Significance of Virtual Reality and Digital Information Technologies
21.2.3.1 VR: Virtual Reality
21.2.3.2 Technology for Digital Information (IT)
21.3 Related Work: Virtual Reality and Digital Information Technologies
21.3.1 The Development of VR and DIT
21.3.2 Applications in Different Industries
21.3.3 Applications in Medicine and Therapy
21.3.4 Gaming and Entertainment
21.3.5 Social Interaction and Collaborative Workspaces
21.3.6 Difficulties and Moral Issues
21.3.7 Future Innovations and Trends
21.3.8 Impact Across Industries
21.3.9 Success Stories and Case Studies
21.4 Proposed Methodology: Leveraging Virtual Reality and Digital Information Technologies
21.4.1 Requirements Analysis
21.4.2 Technology Selection
21.4.3 Content Production
21.4.4 VR and DIT Integration
21.4.5 User Experience Design
21.4.6 Thorough Testing and Iterative Refining
21.4.7 Deployment and Training
21.4.8 Monitoring and Ongoing Development
21.4.9 Evaluation and Success Metrics
21.5 Conclusion
References
22. Online Social Networking: Navigating the Myth and Reality of Friendship in the Era of Zero TrustSukrati Agrawal, Neha Agrawal, Rohit Bansal and Anjali Rawat
22.1 Introduction
22.1.1 Background
22.1.2 Objectives of the Research
22.1.3 Scope and Limitations
22.1.4 Significance of the Study
22.2 Significance of Zero Trust in Online Friendship Environment
22.3 Literature Review
22.3.1 Definition of Friendship
22.3.2 Historical Perspectives on Friendship
22.3.3 The Evolution of Social Networking Platforms
22.3.4 The Impact of Technology on Friendship
22.3.5 The Concept of Online Friendship
22.3.6 The Dark Side of Online Friendship
22.4 The Virtual Facade of Online Friendship
22.5 Psychological Dynamics of Online Friendships
22.5.1 Emotional Connections in Virtual Spaces
22.5.2 Social Comparison and Envy
22.5.2.1 Envy
22.5.2.2 Comparison of Online and Offline Relationship
22.5.3 Trust and Intimacy in Online Relationships
22.6 Zero Trust and Safety in Virtual Spaces
22.6.1 Zero Trust
22.6.2 Individual Safety in Virtual Space
22.7 State-of-the-Art Countermeasures for Cyber Crime
22.8 Public Awareness Advisory: Reporting Cybercrime Immediately
22.9 Conclusion
Acknowledgement
References
23. Various Threats and Attacks on Online Social Networks and Their Counter MeasuresD. Saravanan, Vijay Ramalingam, T. Ragupathi, Arul Prakash, S. Vignesh, Rahin Batcha R., Belsam Jeba Ananth M. and Meenakshi
23.1 Introduction
23.2 Literature Survey
23.3 Privacy Breaches in Online Social Network (OSN)
23.4 Attacks and Threats on Online Social Network
23.4.1 Cyber-Bullying
23.4.2 Phishing
23.4.3 Eavesdropping
23.4.4 Profile Cloning
23.4.5 Fake Profiles
23.4.6 Botnet
23.5 Attacks on Online Social Networks
23.5.1 Video Attack
23.5.2 Like-Jacking Attack on Facebook
23.5.3 Spoofing Attack on Twitter
23.5.4 Denial of Service Attack on Twitter
23.5.5 Koobface Attack on MySpace
23.5.6 Image Attack on MySpace
23.6 Conclusion
References
24. Blockchain-Based Decentralized Online Social Networks – Benefits and ChallengesNeha Agrawal, Sukrati Agrawal, Ankit Upadhyay and Hitesh Rawat
24.1 Introduction
24.2 Online Social Network Threats
24.3 Introduction to Blockchain
24.4 Blockchain Features
24.5 Blockchain Based Social Networks
24.6 Challenges
24.7 Conclusion
References
25. Integrating TF-IDF Features to Divide Amazon Product Reviews into Positive and Negative GroupsAnkit More, Abhishek Mishra, Prakash Maravi, Prathamesh Muzumdar and Abhishek Sharma
25.1 Introduction
25.2 Proposed Work
25.2.1 System Overview
25.2.2 Methodology
25.2.3 Proposed Algorithm
25.3 Analysis of Results
25.3.1 Precision
25.3.2 Recall
25.3.3 F1-Score
25.3.4 Memory Usages
25.3.5 Time Consumed
25.4 Conclusion
25.4.1 Future Work
References
26. Improved Supervised Classification Model for Automatically Categorizes of News ArticlesNikhil Chaturvedi and Jigyasu Dubey
26.1 Introduction
26.2 Related Work
26.3 Proposed Model
26.4 Dataset Description
26.5 Experiment, Results, and Discussion
26.6 Conclusion
References
27. OSN Traits and Vulnerability for Measurement and AnalysisRajat Bhardwaj, Vivek Bhardwaj, Romil Rawat, Hitesh Rawat, Prathamesh Muzumdar and Kamal Borana
27.1 Introduction
27.2 Media and Social Network Statistics Online
27.2.1 Benefits and Drawbacks of Social Media Sites on the Internet, According to Users
27.2.2 Advantages of OSN
27.2.3 OSN’s Negative Aspects
27.2.4 Causes of Security Problems with Social Media on the Internet
27.2.5 General Principles
27.3 Open Research Problems and Difficulties
27.4 Conclusion
References
28. Privacy Preservation in Online Social NetworksArul Prakash, S. Vignesh, Rahin Batcha R., D. Saravanan, Vijay Ramalingam, T. Ragupathi and Meenakshi
28.1 Introduction
28.2 Privacy Protection in Online Social Networks
28.3 Security and Privacy Issues in Online Social Network
28.4 Review of Privacy Preserving Techniques for Online Social Networks
28.5 Recommendations for Privacy Preservation in Online Social Networks
28.6 Conclusion
References
29. Machine Learning Techniques for Heart Disease Detection using E-Health Monitoring SystemVijay Ramalingam, T. Ragupathi, Arul Prakash A., S. Vignesh, Rahin Batcha R. and D. Saravanan
29.1 Introduction
29.2 Literature Survey
29.3 Methodology
29.4 Results and Discussion
29.5 Conclusion
References
30. A Hybrid Method for Image Encryption Using Lagrange’s InterpolationS. Vignesh, Rahin Batcha R., D. Saravanan, Vijay Ramalingam, T. Ragupathi and Arul Prakash A.
30.1 Introduction
30.2 Related Work
30.3 Mathematical Background in Lagrange’s Interpolation
30.4 Proposed Image Encryption Cryptosystem Using Lagrange’s Interpolation
30.5 Conclusion
References
31. Improvement of Underwater Blur Images Using Dark Channel Prior and Fuzzy Intensification Operator for Better Social Network’s TransmissionVijay Kumar Trivedi and Alpesh Soni
31.1 Introduction
31.2 Literature Survey
31.3 Proposed Methodology
31.3.1 Image Denoising
31.3.2 Dehazing (Dark Channel Prior Based)
31.3.2.1 Dark Channel Prior
31.3.2.2 Estimation of Background Light
31.3.2.3 Transmission Estimation
31.3.2.4 Scene Radiance Recovery
31.3.3 Fuzzy Intensification Operator (Tuned Tri-Threshold)
31.4 Experimental Results
31.5 Conclusion
References
About the Editors
IndexBack to Top