Techniques for Improving the Labelling Process of Sentiment Analysis in the Saudi Stock Market
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2018, Vol 9, Issue 3
Abstract
Sentiment analysis is utilised to assess users’ feedback and comments. Recently, researchers have shown an increased interest in this topic due to the spread and expansion of social networks. Users’ feedback and comments are written in unstructured formats, usually with informal language, which presents challenges for sentiment analysis. For the Arabic language, further challenges exist due to the complexity of the language and no sentiment lexicon is available. Therefore, labelling carried out by hand can lead to mislabelling and misclassification. Consequently, inaccurate classification creates the need to construct a relabelling process for Arabic documents to remove noise in labelling. The aim of this study is to improve the labelling process of the sentiment analysis. Two approaches were utilised. First, a neutral class was added to create a framework of reliable Twitter tweets with positive, negative, or neutral sentiments. The second approach was improving the labelling process by relabelling. In this study, the relabelling process applied to only seven random features (positive or negative): “earnings” (ارباح), “losses” (خسائر), “green colour” (باللون_الاخضر), “growing” (زياده), “distribution” (توزيع), “decrease” (انخفاض), “financial penalty” (غرامة), and “delay” (تاجيل). Of the 48 tweets documented and examined, 20 tweets were relabelled and the classification error was reduced by 1.34%.
Authors and Affiliations
Hamed AL-Rubaiee, Renxi Qiu, Khalid Alomar, Dayou Li
Experimental Analysis of the Fault Tolerance of the PIM-SM IP Multicast Routing Protocol under GNS3
PIM-SM is the most commonly used IP multicast routing protocol in IPTV systems. Its fault tolerance is examined by experimenting on a mesh topology multicast test network built up by Cisco routers under GNS3. Different f...
Balancing a Sphere in a Linear Oscillatory Movement through Fuzzy Control
The following paper describes an intelligent control problem, which depends on the balance of a metallic sphere on a beam, that oscillates in only one point, localized in the middle of the beam, using it for the ba...
An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries
ARP spoofing is the most dangerous attack that threats LANs, this attack comes from the way the ARP protocol works, since it is a stateless protocol. The ARP spoofing attack may be used to launch either denial of service...
Intruder Attacks on Wireless Sensor Networks: A Soft Decision and Prevention Mechanism
Because of the wide-ranging of applications in a variety of fields, such as medicine, environmental studies, robotics, warfare and security, and so forth, the research on wireless sensor networks (WSNs) has attracted muc...
Automated Imaging System for Pigmented Skin Lesion Diagnosis
Through the study of pigmented skin lesions risk factors, the appearance of malignant melanoma turns the anomalous occurrence of these lesions to annoying sign. The difficulty of differentiation between malignant melanom...