Attribution of authorship in instant messaging software applications, based on similarity measures of the stylometric features’ vector

2021 ◽  
Vol 0 (11-12/2020) ◽  
pp. 33-41
Author(s):  
Marcin Mazurek ◽  
Mateusz Romaniuk

This paper describes the issue of authorship attribution based on the content of conversations originating from instant messaging software applications. The results presented in the paper refer to the corpus of conversations conducted in Polish. On the basis of a standardised model of the corpus of conversations, stylometric features were extracted, which were divided into four groups: word and message length distributions, character frequencies, tf-idf matrix and features extracted on the basis of turns (conversational features). The vectors of users’ stylometric features were compared in pairs by using Euclidean, cosine and Manhattan metrics. CMC curves were used to analyse the significance of the feature groups and the effectiveness of the metrics for identifying similar speech styles. The best results were obtained by the group of features being the tf-idf matrix compared with the use of cosine distance and the group of features extracted on the basis of turns compared with the use of the Manhattan metric.

Author(s):  
Jon Baggaley

Portable software applications can be carried on a convenient storage medium such as a USB drive, and offer numerous benefits to mobile teachers and learner. The article illustrates the growing field of ‘portable apps’ in reviews of seven contrasting products. These represent the major categories of document editing, email maintenance, Internet browsing, instant messaging, file transfer, multimedia presentation, and anti-virus protection. Emphasis is placed on ways to use ‘portable apps’ to overcome the common problems of Internet usage during travel.


Author(s):  
Susan A. Elwood ◽  
Marsha Grace ◽  
Claudia Lichtenberger

We are making progressive advances towards Weiser’s vision. Technologies are already being embedded into our environment. Smart floors can sense when a person has fallen and immediately send vital information to paramedic support (Abowd, Atkeson, Bobick, Essa, MacIntyre, Mynatt, & Starner, 2000). People are using mobile devices, such as cell phones for e-mail, instant messaging, Web browsing, games, and MP3 playback (Lendino, 2006). Presence technologies are already informing us as to our IM buddy’s physical presence, such as online, off-line, busy, or away from the desk. Current uses of the Web for searching, photos, music, video, various levels of electronic communities, and online, collaborative software applications are preparing users to advance to the next Web 2.0 level of Internet use. Combine Web 2.0 with expanded WiFi capabilities, and we won’t need large computing devices for sharing large amounts of data within virtual, collaborative environments.


2020 ◽  
Author(s):  
John R. Ladd

This lesson introduces three common measures for determining how similar texts are to one another: city block distance, Euclidean distance, and cosine distance. You will learn the general principles behind similarity, the different advantages of these measures, and how to calculate each of them using the SciPy Python library.


Author(s):  
Marco Cristani ◽  
Giorgio Roffo ◽  
Cristina Segalin ◽  
Loris Bazzani ◽  
Alessandro Vinciarelli ◽  
...  

Author(s):  
Alexander Viktorovich Melnikov ◽  
◽  
Yulia Adolfovna, Kosikova ◽  

The Most well - known social software applications are blogs, wikis, social networks, and instant messaging. The social network is described as a convergence of technologies, which means that individuals can easily communicate, select information, and form new communities on the Internet. The rapid growth of social networks is forcing companies to step up their activities in traditional CRM systems. One of the important advantages of the Internet is the creation of an active contact between stakeholders, making it easier for businesses to get feedback from their customers, which allows them to more effectively identify customer needs and develop corrective actions.


2018 ◽  
Vol 5 (2) ◽  
pp. 73-83
Author(s):  
Hussein Abed Ghannam

WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.


Sign in / Sign up

Export Citation Format

Share Document