Sentiment of Sentence in Tweets: A Review
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 6
Abstract
Abstract: Determine the sentiment of sentence that is positive or negative based on the presence of part of speech tag, the emoticons present in the sentences. For this research we use the most popular microblogging sittwitter for sentiment orientation. In this paper we want to extract tweets form the twitter related to the product like mobile phones, home appliances, vehicle etc. After retrieving tweets we perform some preprocessing on it like remove retweets, remove tweets containing few words with minimum threshold of length five, remove tweets containing only urls. After this the remaining tweets are pre-processed like that transform all letters of the tweets to the lower case then remove punctuation from the tweets because it reduces the accuracy of result. After this remove extra white spaces from the tweets, then we apply a pos tagger to tag each word. The tuple after the applying above steps contain (word, pos tag, English-word, stop-word). We are interested in onlytweets that contain opinion and eliminate the remaining non-opinion tweets from the data set. For this we use the Naïve Bays classification algorithm. After this we use short text classification on tweets i.e., the word having different meaning in different domain. In order to solve this problem we use two different feature selection algorithms the mutual information (MI) and the X2 feature selection. At final stage predicting the orientation of an opinion sentence that is positive or negative as we mentioned above. For this we use two model like unigram model and opinion miner.
Authors and Affiliations
Sandip Mali , Ashish Balerao , Suvarnsing Bhable , Sangramsing Kayte
Enhanced Security Model for Cloud Using Ones compliment Re-coding for Fast Scalar multiplication in ECC
Abstract: Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be...
Secure Personal Health Records access in Cloud Computing
Abstract: Patient Health Record (PHR) is a complete Patient related health data, which is getting stored in cloud computing to gain cost benefit and better access control. In maintaining PHR, cloud computing plays...
Object Elimination and Reconstruction Using an Effective Inpainting Method
Three major problems have been found in the existing algorithms of image inpainting: Reconstruction of large regions, Preference of filling-in and Choice of best exemplars to synthesize the missing reg...
An Attack-resistant Watermark Resynchronization Scheme using LDFT and BSP
Abstract: Image watermarking is a method that embeds a watermark in the digital image by making small changes in the host data. In watermarking applications, the robustness of the watermark to the common signal processin...
Sentiment Mining and Related Classifiers: A Review
Abstract: Brokers trading goods on the Web often seek for their customer’s reviews and feedbacks of their products and the associated services. With the growing popularity of e-commerce, the number of customer opinions t...