The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, there is more and more network education public sentiment information on internet and it has produced a significant impact on education. More and more hide information which is useful can be mined; therefore, this paper constructs a model about the application of the text mining technology in monitoring the network education public sentiment, according to the characteristics of the network...
Twitter, the social network service, is a rich source of information on customer response to a live event such as a television show. In this paper we present a case study where we analyzed publicly available tweets that were posted when a popular TV show was aired for the first time in a season. We use standard text-mining techniques to answer questions such as, what were the main themes during the...
In this paper, we are interested in using text mining to analyze textual data obtained from electronic social media in order to find out social concerns on crisis. In particular, we explore the temporal theme patterns in the natural catastrophe, i.e. the Yushu Earthquake, and compare the foci of the Chinese public, Chinese government and the overseas. By incorporating sources of information with a...
Exploring the evolution of social contexts with time can provide unique insights into human social dynamics. Several social contexts and relationships can be mined from unstructured text articles that describe social phenomena. In contrast to structured graphs of social networks, named entity recognition is a task that attempts to classify elements in unstructured textual items into predefined categories,...
Much has been documented in the literature on sentiment analysis and document summarisation. Much of this applies to long structured text in the form of documents and blog posts. With a shift in social media towards short commentary (see Facebook status updates and twitter tweets), the difference in comment structure may affect the accuracy of sentiment analysis techniques. From our VoiceYourView...
Recently, a huge wave of social media has generated significant impact in people's perceptions about technological domains. They are captured in several blogs/forums, where the themes relate to products of several companies. One of the companies can be interested to track them as resources for customer perceptions and detect user sentiments. The keyword-based approaches for identifying such themes...
In this work we propose a method for localizing text regions within scene images consisting of two major stages. In the first stage, a set of potential text regions is extracted from the input image using residual operators (such as ultimate attribute opening and closing). In the second stage a set of features is obtained from each potential text region and this feature set will be later used as an...
Web content clustering is very important part of topic detection and tracking issue. In our paper we focus on pre-processing phase of web content clustering. We focus on blog articles published in Slovak language. We evaluate the impact of different data pre-processing methods on success of blog clustering. We found out that applying various text data manipulation techniques in preprocessing can improve...
A steganographic method of embedding textual information in an audio file is presented in this paper. In the proposed technique, first the audio file is sampled and then an appropriate bit of each alternate sample is altered to embed the textual information. As a steganographic approach the perceptual quality of the host audio signal was not to be degraded.
Adaptive hypermedia bring a major benefit of traditional face to face teaching to electronic media in that they allow to custom tailor the way in which one media object is delivered to different users. While the creation of adaptive hypermedia is a highly labor intensive process for text based media, creating adaptive multimedia documents poses nearly insurmountable obstacles. This is mainly due to...
Steganography can be defined as a method of hiding data within a cover media so that other individuals fail to realize their existence. Image, audio and video are some popular media for steganography. But text is ideal for steganography due to its ubiquity and smaller size compared to these media. However, text communication channels do not necessarily provide sufficient redundancy for covert communication...
We live in an era of media and information explosion. Information is transmitted in various, constantly revolutionized forms. Movies, television and other new animated media have penetrated into all aspects of our life and become part of it. From those media we acquire knowledge, ways of communication and pleasure. The deep-seated difference between the new media and the traditional static media is...
Steganography is the means of storing information inside another message in such a way that hides informations existence. A number of steganography algorithms have been introduced using text, image, audio, video files as the cover media. Among these, text documents have been widely used for a very long time. This paper presents a new approach for steganography in Hindi texts. Considering the structure...
Steganography is the ability to hide information in a cover media such as text, and pictures. An improved approach is proposed to embed secret into Arabic text cover media using Kashida, an Arabic extension character. The proposed approach is maximizing the use of Kashida to hide more information, represented in binary bits, in Arabic text cover media. A stego system has been developed based on this...
The paper discusses on the ongoing work of editorial analysis and synthesis construction, basically text annotation and the linguistic criteria for distinguishing between facts and opinions. Further we also talk on the factors playing a crucial role in determining the strengths of opinions. We also discuss on the process of argumentation structure outlining, a major part of our work that directs the...
We describe the development of a set of tools for analyzing the textual contents of digital forensic evidence for the purpose of enhancing an investigator's ability to discover information quickly and efficiently. By examining the textual contents of files and unallocated space, relationships between sets of files and clusters can be formed based on the information that they contain. Using the information...
Correspondence analysis has been used in text mining to deepen global understanding on the characteristics of categorized accumulated textual information, and may lead to new knowledge discovery. However, difficulty in category classification for textual information remains. This article presents a new analysis method for higher education curriculum textual information utilizing corresponding analysis...
These days VLSC (very large-scale conversation) is a particular type of online conversation, that is large scale, public, text-based, many-to-many and persistent. The nature of VLSC allows the accumulation of thousands of conversation in a fraction of time, and it often grows out of userspsila readable capacity. Therefore, extracting dominant public opinion on VLSC is usually impossible without causing...
This study examined the combinations of audio, text, and graphics that 96 paid adult volunteers selected when they followed an online demonstration of setting an alarm on a virtual cellphone on a touch-screen. The volunteers either had English as their first language (E1st) or not (E2nd), or were adults who were native English speakers but considered themselves poor readers (PR). The demonstration...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.