The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Abstract. In the context of smart cities and Internet of Things (IoT), there are many trending contents on the social networks that reflect the picture of the community or their interest. In this paper, we propose a model that automatically collect trending social data and analyze them automatically. The model explores trending contents, overall attitude of textual contents and the relationships among...
Background: Online forums are instruments through which information or problems are shared and discussed, including expressions of interests and intentions. Objective: In this paper, we present ongoing work aimed at analyzing the content of forum posts of a hybrid open source company that offers both free and commercial licenses, in order to help its community manager gain improved understanding of...
Document image binarization is a central problem in many document analysis systems. Indeed, it represents one of the basic challenges, especially in case of historical documents analysis. In this paper, we propose a novel robust multi stage framework that combines different existing document image thresholding methods for the purpose of getting a better binarization result. CLAHE technique is introduced...
Skew detection is a crucial step for document analysis systems. Indeed, it represents one of the basic challenges, especially in case of historical documents analysis. In this paper, we propose a novel robust skew angle detection and correction technique. Morphological Skeleton is introduced to significantly reduce the amount of data to treat by removing the redundant pixels and keeping only the central...
Owing to the elevated intra/inter variation among the foreground and background text of various document images, the text segmentation from the poorly degraded document images is the difficult job. This paper presents the document image binarization method by adaptive image contrast which is the integration of the local image gradient and the local image contrast which is lenient to background and...
Suicide is becoming a serious problem, and how to prevent suicide has become a very important research topic. The development of Social Network System (SNS) provides an ideal platform to monitor persons' suicidal ideation. Based on Sina microblog (Weibo), this paper proposes a real-time monitoring system detecting users' suicidal ideation. From 59046 posts collected with labels of either suicide or...
The present work describes a method to analyze the answers of questions of an examination of the class Paradigms of Programming, given by students and written in the form of text written in natural language, to contrast their degree of coincidence with the answers to the same questions that were provided by the teachers of the class. From the proposal arise elements called concepts and / or relations...
With the rapid growth of unstructured data accessible via web, managing these data and finding undiscovered information in huge dataset become a necessary task. Consequently text mining, which can be defined as gleaning important information from natural language text, has emerged. In this study, in order to facilitate information management for aspect based sentiment analysis studies, a Turkish sentiment...
Aksara jawa is an ancient Javanese character, which has been used since 17th century. The character is mostly written on stones to describe history or naming such as places, wedding, tombstones, etc. This character is however gradually ignored by people. Thus, it is extremely important to preserve this near loss heritage culture. In this paper, as a step toward preserving and converting visual information...
Social network analysis is an important set of techniques that are used in many different areas. One such area is intelligence and law enforcement where social network analysis is used to study various kinds of networks. One of the problems with social networks that are extracted from social media is that easily becomes very large and as a consequence difficult to analyze. Therefore, there is a need...
Digitization of documents has gained prominence in the recent past for data preserving. Paper documents can be converted to digital form by using various modes of acquisition techniques. In this paper processing of data captured using normal digital camera has been considered. The camera captured document images may contain warped document due to perspective and geometric distortions. Curvature of...
Speech synthesis is the computer generated human voice. It is also known as a text-to-speech system which converts text information into speech. Speech synthesis systems are often called text-to-speech (TTS) systems about their ability to convert text into speech. A TTS synthesis system converts written orthographic text into corresponding artificial speech signals. In multi-lingual cultural settings,...
Automatic text summarization is one of the important challenges of natural language tasks. It will help the readers save time to get the important information from a lengthy document automatically. Sentiment Analysis is the process of identifying and categorizing opinions expressed in a piece of text computationally to determine whether the writer's attitude towards a particular topic, product, etc...
We investigate the problem of analyzing word frequencies in multiple text sources with the aim to give an overview of word-based similarities in several texts as a starting point for further analysis. To reach this goal, we designed a visual analytics approach composed of typical stages and processes, combining algorithmic analysis, visualization techniques, the human users with their perceptual abilities,...
Ransomware is the most threatening malware which expects payment at the stake of your personal files/folders. Ransomware has been found in Windows, IOS, Android and even in Linux too. And none of them was able to protect its users from its threat. Many detection techniques and analysis tools have been developed to detect ransomware virus. According to the Verizon named American company's report, ransomware...
Each of the dialects of Thai Language has a distinct identity associated with its accents. The conversation between different native speakers of these dialects despite their standard language origination cannot be avoided when visiting each region. Communication with people who understand only the Northern Thai Dialect (NTD) brought us to the idea of inventing the Northern Thai Dialect Text to Speech...
Text mining is the process to automatically infer relevant information from semantically related text documents. This technique, which has applications from business intelligence to homeland security, terrorism and crime fight, might bring noticeable privacy issues when analyzed documents contain privacy sensitive information. In this paper, we propose a framework for privacy-preserving text analysis,...
The development of mobile devices as well as social media platforms recently lead to the necessity of monitoring the latter during crisis and emergency situations. Paradoxically, the huge amount of information available through these new sources may lead to information gaps, within the Public Safety Organization operators' awareness. We describe some specific types of information gaps due first to...
Strategy maps are attracting considerable interest in strategic planning due to their capacity to represent causal-effect relationships among the key concepts. Several studies have used expert estimates to quantify the relationships. However, these evolve dynamically and are context-specific. Therefore, there is a need to develop automatic knowledge acquisition systems. Here, the assumption was used...
This paper analysis document to explore tendencies of implementing ICT curriculum content and policies in Australian education in Victoria in New South Wales states. After analyzing the policies, it is believed that different from the previous curriculum where ICT was perceived as a tool, the new curricula shows more programmatic approach towards.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.