A comprehensive survey on sentiment analysis: Approaches, challenges and trends
Sentiment analysis (SA), also called Opinion Mining (OM) is the task of extracting and
analyzing people's opinions, sentiments, attitudes, perceptions, etc., toward different entities …
analyzing people's opinions, sentiments, attitudes, perceptions, etc., toward different entities …
Machine learning and semantic sentiment analysis based algorithms for suicide sentiment prediction in social networks
M Birjali, A Beni-Hssane, M Erritali - Procedia Computer Science, 2017 - Elsevier
Sentiment analysis is one of the new challenges appeared in automatic language
processing with the advent of social networks. Taking advantage of the amount of …
processing with the advent of social networks. Taking advantage of the amount of …
Refining word embeddings with sentiment information for sentiment analysis
Natural Language Processing problems generally require the use of pretrained distributed
word representations to be solved with deep learning models. However, distributed …
word representations to be solved with deep learning models. However, distributed …
An efficient information retrieval system using evolutionary algorithms
When it comes to web search, information retrieval (IR) represents a critical technique as
web pages have been increasingly growing. However, web users face major problems; …
web pages have been increasingly growing. However, web users face major problems; …
A comparison of features extraction methods for Arabic sentiment analysis
Natural Language Processing (NLP) has built up so much importance in the past few years.
With machine learning, NLP can detect a lot of unseen information from a huge volume of …
With machine learning, NLP can detect a lot of unseen information from a huge volume of …
Suicide prediction in twitter data using mining techniques: a survey
ER Kumar, AKR Rao - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Online social networks and the World Wide Web specifically Twitter, have expanded the
network between individuals with an end goal that data can be spread to a huge number of …
network between individuals with an end goal that data can be spread to a huge number of …
An approach for risk estimation in information security using text mining and jaccard method
Involvement of digital information in almost of enterprise sectors makes information having
value that must be protected from information leakage. In order to obtain proper method for …
value that must be protected from information leakage. In order to obtain proper method for …
A comprehensive survey on comparisons across contextual pre-filtering, contextual post-filtering and contextual modelling approaches
K Haruna, MA Ismail, D Damiasih… - Telkomnika …, 2017 - telkomnika.uad.ac.id
Recently, there has been growing interest in recommender systems (RS) and particularly in
context-aware RS. Methods for generating context-aware recommendations are classified …
context-aware RS. Methods for generating context-aware recommendations are classified …
Privacy threat modeling in personalized search systems
Personalized search systems simplify information access on the Web by providing adapted
results for each user's query according to his preferences and needs. Such systems depend …
results for each user's query according to his preferences and needs. Such systems depend …
[PDF][PDF] Evaluating Aggregate Functions of Iceberg Query Using Priority Based Bitmap Indexing Strategy.
KS Prakash, PM Prathap - International Journal of Electrical & …, 2017 - academia.edu
Aggregate function and iceberg queries are important and common in many applications of
data warehouse because users are generally interested in looking for variance or unusual …
data warehouse because users are generally interested in looking for variance or unusual …