Efficient Multi Review Classification using feature extraction technique in the Micro Reviews
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 2
Abstract
Although the content of micro-blogging sites has been studied extensively, micro-reviews are a source of content that has been largely overlooked in the literature. In this paper we study micro-reviews, and we show how they can be used for the problem of review selection. To the best of our knowledge we are the first to mine micro reviews such as foursquare tips and combine them with full-text reviews such as Yelp reviews. Our work introduces a novel formulation of review selection, where the goal is to maximize coverage while ensuring efficiency, leading to novel coverage problems. The coverage problems we consider are of broader interest, and they could find applications to different domains. We consider approximation and heuristic algorithms, and study them experimentally, demonstrating quantitatively and qualitatively the benefits of our approach. We also propose an Integer Linear Programming (ILP) formulation, and provide an optimal algorithm. This allows us to quantify the approximation quality of the greedy heuristics. Experimental results explains the performance of the system against the State of art approach in terms of precision and Recall.
Authors and Affiliations
Miss. A. Jenifaasheer, Dr. Anna Saro Vijendran
Structural Analysis of Nano Composites Using FE-Modeling under Flexural Load
High strength of Carbon nanotube reinforced composites has motivated us to study and understand the mechanical properties of carbon nanotubes. Carbon nanotubes finds its application in the field of automotive and aerosp...
Implementation of Lexical Analysis
A compiler translates and/or compiles a program written in a suitable source language into target language through a number of phases. It is used for determining token through code given in input and act as communicatio...
Review on Data Security in Homomorphic Encryption
The cloud computing is the architecture in which hosts, virtual machines, data centers and cloud service providers are involved in the communication. In the network, two types of encryption schemes are implemented to pr...
Design of Reconfigurable OFDM and CDMA Transceiver Based On FPGA
The rapid expansion in digital Wireless communications results in a demand for systems that are reliable and have a high spectral efficiency. To fulfill these demands, the multicarrier modulation scheme, often called Or...
Shear Strengthening of R.C. Beams by using GFRP
Shear is actually a very complex problem and is not completely solved for simple reinforcement concrete beams. The current codes (American Concrete Institute (ACI), ISIS Canada and I.S.456:2000) qualify the nominal shea...