Review on Comment Volume Prediction
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 2
Abstract
Abstract: In this paper we present the concept of social media and its various functional building blocks. Social media has become an ubiquitous part of social networking and content sharing. Social media make use of mobile and web to create the platforms with which individuals and communities share, discuss, and modify user-generated content. This is examined that social media user’s comments are also very much influential in order to make or change people’s perception and to bring some topic in trending. Different techniques havebeen proposed for comment volume prediction which are discussed in the literature survey.
Authors and Affiliations
Mandeep Kaur , Prince Verma
Secure Data Sharing Using Cryptography in Cloud Environment
Abstract : Cloud computing is rapidly growing due to the provisioning of elastic, flexible, and on-demand storage and computing services for users. In cloud based storage concept, data owner does not have full control ov...
Evaluating Total Cost of Ownership for University EnterpriseResource Planning: Case of Maseno University
Abstract: Higher learning institutions (HEI) are investing in IT to attain operational excellence. Organizationslooking to reduce technology costs typically look for ways to reduce the Total Cost of Ownership (TCO)...
A web-based decision support system for lower back pain diagnosis
Abstract: In the era of science and technology, computer is the most spirited constituent in our today’s health care sector with variety of facilities. The use of Artificial Intelligent (AI), Knowledge Management, is the...
Throughput and Error State Performance of AMC Scheme in 3G Wireless Systems
In this paper, Adaptive Modulation and Coding technique for OFDM is proposed. In this technique it is possible to switch the modulation order and coding rate in order to better match the channel conditions. The u...
Multi-Tier Web Security on Web Applications from Sql Attacks
Abstract: This paper deals with the techniques that are used to prevent the web applications from web security vulnerabilities caused by hackers which leads to the misusage of data. Web services and applications ha...