Journal•ISSN: 1798-0461
Journal of Emerging Technologies in Web Intelligence
Engineering and Technology Publishing
About: Journal of Emerging Technologies in Web Intelligence is an academic journal. The journal publishes majorly in the area(s): The Internet & Semantic Web Stack. It has an ISSN identifier of 1798-0461. Over the lifetime, 255 publications have been published receiving 3477 citations.
Papers
More filters
••
TL;DR: In this paper, a Survey of Text Mining techniques and applications have been presented.
Abstract: Text Mining has become an important research area. Text Mining is the discovery by computer of new, previously unknown information, by automatically extracting information from different written resources. In this paper, a Survey of Text Mining techniques and applications have been s presented.
650 citations
••
TL;DR: A Survey of Text Summarization Extractive techniques has been presented and it is shown that extracting important sentences, paragraphs etc. from the source text and concatenating them into shorter form conveys the most important information from the original text document.
Abstract: Text Summarization is condensing the source text into a shorter version preserving its information content and overall meaning. It is very difficult for human beings to manually summarize large documents of text. Text Summarization methods can be classified into extractive and Abstractive summarization. An extractive summarization method consists of selecting important sentences, paragraphs etc. from the original document and concatenating them into shorter form. The importance of sentences is decided based on statistical and linguistic features of sentences. An Abstractive summarization method consists of understanding the original text and re-telling it in fewer words. It uses linguistic methods to examine and interpret the text and then to find the new concepts and expressions to best describe it by generating a new shorter text that conveys the most important information from the original text document. In this paper, a Survey of Text Summarization Extractive techniques has been presented.
559 citations
••
TL;DR: Experimentation in the development of distributed online courses and in software that support the formation of connections between the far-flung pieces of such courses are described, suggesting and supporting the model of learning described in the first section, that of a course network supporting and informing an ever-shifting set of course episodes.
Abstract: We often talk about games, simulations and other events in learning, but these technologies support only episodic learning. Equally important are those technologies that provide a context for these learning episodes, an environment where students interact and converse among themselves. This paper describes experimentation in the development of distributed online courses and in software - particularly, the personal learning environment - that support the formation of connections between the far-flung pieces of such courses. This work, in turn, is suggesting and supporting the model of learning described in the first section, that of a course network supporting and informing an ever-shifting set of course episodes. This in turn suggests a pedagogy of participation rather than retention, and even suggests distributed and locally-based forms of evaluation and assessment. Future developments will focus on realizing these concepts as software or at least software prototypes. The intent of such systems is to facilitate the conversation and interaction around episodic learning events in a distributed environment, transforming them from elements in a linear flow-based design to free-floating objects in an environment.
216 citations
••
TL;DR: A new improved technique is proposed that takes the advantage of the 24 bits in each pixel in the RGB images using the two least significant bits of one channel to indicate existence of data in the other two channels to insert security randomness.
Abstract: Image based steganography utilize the images as cover media to hide secret data. The common technique used in this field replaces the least significant bits (LSB) of image pixels with intended secret bits. Several improvements to enhance the security of the LSB method have been presented earlier. This paper proposed a new improved technique that takes the advantage of the 24 bits in each pixel in the RGB images using the two least significant bits of one channel to indicate existence of data in the other two channels. The stego method does not depend on a separate key to take out the key management overhead. Instead, it is using the size of the secret data as selection criteria for the first indicator channel to insert security randomness. Our proposed technique is analyzed using security and capacity measures and compared to two other similar work. This proposed pixel indicator technique for RGB image steganography showed interesting promising result.
190 citations
••
TL;DR: Some improvements are suggested to solve some challenges caused by agile requirements engineering practices in large projects, like properly handling and identifying sensitive requirements, documenting and managing requirements documentation, keeping agile teams in contact with outside customers.
Abstract: Finding out, analyzing, documenting, and checking requirements are important activities in all development approaches, including agile development. This paper discusses problems concerned with the conduction of requirements engineering activities in agile software development processes and suggests some improvements to solve some challenges caused by agile requirements engineering practices in large projects, like properly handling and identifying sensitive (including non- functional) requirements, documenting and managing requirements documentation, keeping agile teams in contact with outside customers. The paper also discusses the requirements traceability problem in agile software development and the relationships between the traceability and refactoring processes and their impact on each other.
126 citations