A review of the existing state of Personality prediction of Twitterusers with Machine Learning Algorithms
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 4
Abstract
Abstract: Twitter is a popular social media platform with millions of users. The tweets shared by these usershave recently attracted the attention of researchers from diverse fields. In this paper, we focus primarily onpredicting user’s personality from the analysis of tweets shared by the user. However, different techniques havebeen used to predict a user’s personality from tweets but there are certain shortcomings which still need to beaddressed. The aim of this paper is to consider the current state of this research and explore the need ofpredicting personality from tweets by crucially reviewing the literature done till date and provide an overviewof the different measures taken to alleviate the issues faced by researchers in this field.
Authors and Affiliations
Kanupriya Sharma , Amanpreet Kaur
Efficient Data Caching Based On Fuzzy Decision Routing InVehicle Disruption Tolerant Networks
Abstract: Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable nodemobility, and lack of global network information. Most of current research efforts in DTNs focus on dataforward...
Gender classification using face image and voice
Abstract: This paper is about gender classification using face image and voice of a speaker. The basic aim of the paper is to predict the gender of speaker through voice sample using Auto-correlation method and predict t...
Sentiment Classification in Hindi
Abstract : Traditional approaches for classification of sentiments depend on lexical or syntax based feature oron both. Different methods for sentiments classifications are described .The main goal of analysis of thesent...
A Generalized Study on Encryption Techniques for Location Based Services
Abstract: Location-based service (LBS) is the concept that denotes applications integrating geographic location (i.e., spatial coordinates) with the general notion of services. Examples of such applications include...
Copyright protection scheme based on visual Cryptography: AReview
Abstract: Management of digital images via internet and e-business has witnessed tremendous growth in lastdecades, resulting in vulnerability to copyright infringement, Manipulation and attacks. This paper reviewss...