Stylometric Techniques for Multiple Author Clustering
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 3
Abstract
In 1598-99 printer, William Jaggard named Shakespeare as the sole author of The Passionate Pilgrim even though Jaggard chose a number of non-Shakespearian poems in the volume. Using a neurolinguistics approach to authorship identification, a four-feature technique, RPAS, is used to convert the 21 poems in The Passionate Pilgrim into a multi-dimensional vector. Three complementary analytical techniques are applied to cluster the data and reduce single technique bias before an alternate method, seriation, is used to measure the distances between clusters and test the strength of the connections. The multivariate techniques are found to be robust and able to allocate nine of the 12 unknown poems to Shakespeare. The authorship of one of the Barnfield poems is questioned, and analysis highlights that others are collaborations or works of yet to be acknowledged poets. It is possible that as many as 15 poems were Shakespeare’s and at least five poets were not acknowledged.
Authors and Affiliations
David Kernot, Terry Bossomaier, Roger Bradbury
Attractiveness Analysis of Quiz Games
Quiz games are played on platforms such as television game shows, radio game shows, and recently, on mobile apps. In this study, HQ Trivia and SongPop 2 were chosen as the benchmark. Each game data have been collected fo...
Hex Symbols Algorithm for Anti-Forensic Artifacts on Android Devices
Mobile phones technology has become one of the most common and important technologies that started as a communication tool and then evolved into key reservoirs of personal information and smart applications. With this in...
Sensitivity Analysis and Validation of Refractive Index Estimation Method with Ground Based Atmospheric Polarized Radiance Measurement Data
Sensitivity analysis and validation of the proposed refractive index estimation method with ground based atmospheric polarized radiance measurement data is conducted. Through the sensitivity analysis, it is found that De...
A New Approach for Improvement Security against DoS Attacks in Vehicular Ad-hoc Network
Vehicular Ad-Hoc Networks (VANET) are a proper subset of mobile wireless networks, where nodes are revulsive, the vehicles are armed with special electronic devices on the motherboard OBU (On Board Unit) which enables th...
Performance Analysis of Machine Learning Algorithms for Missing Value Imputation
Data mining requires a pre-processing task in which the data are prepared, cleaned, integrated, transformed, reduced and discretized for ensuring the quality. Missing values is a universal problem in many research domain...