A Novel Position-based Sentiment Classification Algorithm for Facebook Comments
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 10
Abstract
With the popularisation of social networks, people are now more at ease to share their thoughts, ideas, opinions and views about all kinds of topics on public platforms. Millions of users are connected each day on social networks and they often contribute to online crimes by their comments or posts through cyberbullying, identity theft, online blackmailing, etc. Mauritius has also registered a surge in the number of cybercrime cases during the past decade. In this study, a trilingual dataset of 1031 comments was extracted from public pages on Facebook. This dataset was manually categorised into four different sentiment classes: positive, negative, very negative and neutral, using a novel sentiment classification algorithm. Out of these 1031 comments, it was found that 97.8% of the very negative sentiments, 70.7% of the negative sentiments and 77.0% of the positive sentiments were correctly extracted. Despite the added complexity of our dataset, the accuracy of our system is slightly better than similar works in the field. The accuracy of the lexicon-based approach was also much higher than when we used machine learning techniques. The outcome of this research work can be used by the Mauritius Police Force to track down potential cases of cybercrime on social networks. Decisive actions can then be implemented in time.
Authors and Affiliations
Khunishkah Surroop, Khushboo Canoo, Sameerchand Pudaruth
Evaluating Cancer Treatment Alternatives using Fuzzy PROMETHEE Method
The aim of this study is to apply the principle of multi-criteria decision making theories on various types of cancer treatment techniques. Cancer is an abnormal cell that divides in an uncontrolled manner, it is a growt...
Conception of a management tool of Technology Enhanced Learning Environments
This paper describes the process of the conception of a software tool of TELE management. The proposed management tool combines information from two sources: i) the automatic reports produced by the Learning Content Mana...
Annotations, Collaborative Tagging, and Searching Mathematics in E-Learning
This paper presents a new framework for adding semantics into e-learning system. The proposed approach relies on two principles. The first principle is the automatic addition of semantic information when creating t...
Exploiting SCADA vulnerabilities using a Human Interface Device
SCADA (Supervisory Control and Data Acquisition) systems are used to control and monitor critical national infras-tructure functions like electricity, gas, water and railways. Field devices such as PLC’s (Programmable Lo...
SW-SDF Based Personal Privacy with QIDB-Anonymization Method
Personalized anonymization is a method in which a guarding node is used to indicate whether the record owner is ready to reveal its sensitivity based on which anonymization will be performed. Most of the sensitive values...