scispace - formally typeset
Search or ask a question
JournalISSN: 1798-0461

Journal of Emerging Technologies in Web Intelligence 

Engineering and Technology Publishing
About: Journal of Emerging Technologies in Web Intelligence is an academic journal. The journal publishes majorly in the area(s): The Internet & Semantic Web Stack. It has an ISSN identifier of 1798-0461. Over the lifetime, 255 publications have been published receiving 3477 citations.

Papers published on a yearly basis

Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, a Survey of Text Mining techniques and applications have been presented.
Abstract: Text Mining has become an important research area. Text Mining is the discovery by computer of new, previously unknown information, by automatically extracting information from different written resources. In this paper, a Survey of Text Mining techniques and applications have been s presented.

650 citations

Journal ArticleDOI
TL;DR: A Survey of Text Summarization Extractive techniques has been presented and it is shown that extracting important sentences, paragraphs etc. from the source text and concatenating them into shorter form conveys the most important information from the original text document.
Abstract: Text Summarization is condensing the source text into a shorter version preserving its information content and overall meaning. It is very difficult for human beings to manually summarize large documents of text. Text Summarization methods can be classified into extractive and Abstractive summarization. An extractive summarization method consists of selecting important sentences, paragraphs etc. from the original document and concatenating them into shorter form. The importance of sentences is decided based on statistical and linguistic features of sentences. An Abstractive summarization method consists of understanding the original text and re-telling it in fewer words. It uses linguistic methods to examine and interpret the text and then to find the new concepts and expressions to best describe it by generating a new shorter text that conveys the most important information from the original text document. In this paper, a Survey of Text Summarization Extractive techniques has been presented.

559 citations

Journal ArticleDOI
TL;DR: Experimentation in the development of distributed online courses and in software that support the formation of connections between the far-flung pieces of such courses are described, suggesting and supporting the model of learning described in the first section, that of a course network supporting and informing an ever-shifting set of course episodes.
Abstract: We often talk about games, simulations and other events in learning, but these technologies support only episodic learning. Equally important are those technologies that provide a context for these learning episodes, an environment where students interact and converse among themselves. This paper describes experimentation in the development of distributed online courses and in software - particularly, the personal learning environment - that support the formation of connections between the far-flung pieces of such courses. This work, in turn, is suggesting and supporting the model of learning described in the first section, that of a course network supporting and informing an ever-shifting set of course episodes. This in turn suggests a pedagogy of participation rather than retention, and even suggests distributed and locally-based forms of evaluation and assessment. Future developments will focus on realizing these concepts as software or at least software prototypes. The intent of such systems is to facilitate the conversation and interaction around episodic learning events in a distributed environment, transforming them from elements in a linear flow-based design to free-floating objects in an environment.

216 citations

Journal ArticleDOI
TL;DR: A new improved technique is proposed that takes the advantage of the 24 bits in each pixel in the RGB images using the two least significant bits of one channel to indicate existence of data in the other two channels to insert security randomness.
Abstract: Image based steganography utilize the images as cover media to hide secret data. The common technique used in this field replaces the least significant bits (LSB) of image pixels with intended secret bits. Several improvements to enhance the security of the LSB method have been presented earlier. This paper proposed a new improved technique that takes the advantage of the 24 bits in each pixel in the RGB images using the two least significant bits of one channel to indicate existence of data in the other two channels. The stego method does not depend on a separate key to take out the key management overhead. Instead, it is using the size of the secret data as selection criteria for the first indicator channel to insert security randomness. Our proposed technique is analyzed using security and capacity measures and compared to two other similar work. This proposed pixel indicator technique for RGB image steganography showed interesting promising result.

190 citations

Journal ArticleDOI
TL;DR: Some improvements are suggested to solve some challenges caused by agile requirements engineering practices in large projects, like properly handling and identifying sensitive requirements, documenting and managing requirements documentation, keeping agile teams in contact with outside customers.
Abstract: Finding out, analyzing, documenting, and checking requirements are important activities in all development approaches, including agile development. This paper discusses problems concerned with the conduction of requirements engineering activities in agile software development processes and suggests some improvements to solve some challenges caused by agile requirements engineering practices in large projects, like properly handling and identifying sensitive (including non- functional) requirements, documenting and managing requirements documentation, keeping agile teams in contact with outside customers. The paper also discusses the requirements traceability problem in agile software development and the relationships between the traceability and refactoring processes and their impact on each other.

126 citations

Network Information
Related Journals (5)
Procedia Computer Science
19.6K papers, 228.8K citations
83% related
Journal of Ambient Intelligence and Humanized Computing
4.1K papers, 49K citations
80% related
Multimedia Tools and Applications
16K papers, 185.7K citations
79% related
arXiv: Computers and Society
6.4K papers, 55.4K citations
79% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
201467
201350
201243
201132
201045
200918