Answered step by step
Verified Expert Solution
Question
1 Approved Answer
In addition, select at least two posts that your classmates have made and comment on what they did well with their paraphrasing, and what they
In addition, select at least two posts that your classmates have made and comment on what they did well with their paraphrasing, and what they could have done differently. These posts will count towards participation:
Post 1: By Cyril Ngwa
Application of Text Mining Techniques on Scholarly Research Articles: Methods and Tools
Original text
The amount of electronic textual information available is consistently increasing (Dang & Ahmad, 2015). Even the scientific literature is growing and archived for the upcoming generations in digital formats (Nie & Sun, 2017). Along with this, efforts are going on to automatically mine this growing literature to sieve out the meaningful information out of textual information by applying text mining techniques. These techniques are deployed to extract, analyze, and find meaningful information from a set of documents (Sumathy & Chidambaram, 2013). Some additional applications of text mining are text summarization, information retrieval, information clustering, text categorization, information extraction, language identification, authorship relation identification, identifying phrase structures and detecting key phrases, extracting entities such as molecules, compounds, gene-sequences, names, dates, abbreviations and locating acronyms (Witten, Don, Dewsnip, & Tablan, 2004).
Paraphrasing
People are increasingly imploring electronic textual information in writing. the world of digital technology is growing so in other to be able to sieve out meaningful information from a seat of documents text mining technics such as text summarization, information retrieval, information clustering, text categorization, information extractions are used.
Post 2: Kelly Lamb
Exploring New Authentication Protocols for Sensitive Data Protection on Smartphones
Original Text:
Smartphones are increasingly becoming a tool for ubiquitous access to a number of services including, but not limited to, e-commerce and home banking, and are used more and more for sensitive data storage.
If, on one hand, this makes the smartphone a powerful tool in our private and professional life, on the other hand it has brought about a series of new challenging security and privacy threats, and raised the need to protect users and their data through new secure authentication protocols.
In this article, we illustrate how the security level of a human authentication system is increasing from traditional systems based on the use of passwords or badges to modern systems based on biometrics.
We have moved a step forward by conceiving an authentication protocol based on the combined recognition of the human face and smartphone fingerprint.
Thanks to image processing techniques, both the distinctive characteristics of the face and of the device that captures the face image can be extracted from a single photo or video frame and used for a double check of user identity.
The fast technological development of smartphones allows performing sophisticated operations on the device itself.
From the edge computing perspective, the burden of biometric recognition and source camera identification can be moved to the end user side.
Paraphrase Text:
People are increasingly adopting smartphones as the tool of choice to access internet services that require the use of sensitive information.
As smartphones increase in ability and use, they present conundrums on how to balance ease of use to these sensitive information against securing access to them through advanced authentication processes.
With the following information, we present advancements in authenticating user access via modern biometrics systems and compare them to current standards using passwords.
The new advancements in smartphone authentication combine the device fingerprint with that of the user's face.
Utilizing the smartphone image capabilities, authentication can be verified using a combination of facial features along with the device that takes the photo.
Through the improvements in smartphone speed and image processing, the smartphone can perform the authentication itself.
The improvements in this bleeding-edge technology provides the means necessary to perform advanced biometric authentication.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started