Investigating the Use of Machine Learning Algorithms in Detecting Gender of the Arabic Tweet Author
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 7
Abstract
Twitter is one of the most popular social network sites on the Internet to share opinions and knowledge extensively. Many advertisers use these Tweets to collect some features and attributes of Tweeters to target specific groups of highly engaged people. Gender detection is a sub-field of sentiment analysis for extracting and predicting the gender of a Tweet author. In this paper, we aim to investigate the gender of Tweet authors using different classification mining techniques on Arabic language, such as Naïve Bayes (NB), Support vector machine (SVM), Naïve Bayes Multinomial (NBM), J48 decision tree, KNN. The results show that the NBM, SVM, and J48 classifiers can achieve accuracy above to 98%, by adding names of Tweet author as a feature. The results also show that the preprocessing approach has negative effect on the accuracy of gender detection. In nutshell, this study shows that the ability of using machine learning classifiers in detecting the gender of Arabic Tweet author.
Authors and Affiliations
Emad AlSukhni, Qasem Alequr
Improved Generalization in Recurrent Neural Networks Using the Tangent Plane Algorithm
The tangent plane algorithm for real time recurrent learning (TPA-RTRL) is an effective online training method for fully recurrent neural networks. TPA-RTRL uses the method of approaching tangent planes to accelerate the...
A Multilingual Datasets Repository of the Hadith Content
Knowledge extraction from unstructured data is a challenging research problem in research domain of Natural Language Processing (NLP). It requires complex NLP tasks like entity extraction and Information Extraction (IE),...
Images Steganography Approach Supporting Chaotic Map Technique for the Security of Online Transfer
One of the most important issue in this domain is the security concern of the transfer data. The online transfer data may access illegally through attack the communication gate between the servers and the users. The main...
A Novel Method for Secured Transaction of Images and Text on Cloud
Implementation of privacy preservation of data on cloud storage is tedious and complex. Cloud is a third party on – demand service to hold data for a specific period. There is no assurance from the cloud storage provider...
Human Related-Health Actions Detection using Android Camera based on TensorFlow Object Detection API
A new method to detect human health-related actions (HHRA) from a video sequence using an Android camera. The Android platform works not only to capture video images through its camera, but also to detect emergency actio...