Int. J. Synth. Emot.最新文献

筛选
英文 中文
Opinion Mining of Twitter Events using Supervised Learning 基于监督学习的Twitter事件意见挖掘
Int. J. Synth. Emot. Pub Date : 2018-07-01 DOI: 10.4018/IJSE.2018070102
Nida Hakak, Mahira Kirmani
{"title":"Opinion Mining of Twitter Events using Supervised Learning","authors":"Nida Hakak, Mahira Kirmani","doi":"10.4018/IJSE.2018070102","DOIUrl":"https://doi.org/10.4018/IJSE.2018070102","url":null,"abstract":"Micro-blogs are a powerful tool to express an opinion. Twitter is one of the fastest growing micro-blogs and has more than 900 million users. Twitter is a rich source of opinion as users share their daily experience of life and respond to specific events using tweets on twitter. In this article, an automatic opinion classifier capable of automatically classifying tweets into different opinions expressed by them is developed. Also, a manually annotated corpus for opinion mining to be used by supervised learning algorithms is designed. An opinion classifier uses semantic, lexical, domain dependent, and context features for classification. Results obtained confirm competitive performance and the robustness of the system. Classifier accuracy is more than 75.05%, which is higher than the baseline accuracy.","PeriodicalId":272943,"journal":{"name":"Int. J. Synth. Emot.","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126165052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploiting Chi Square Method for Sentiment Analysis of Product Reviews 基于卡方方法的产品评论情感分析
Int. J. Synth. Emot. Pub Date : 2018-07-01 DOI: 10.4018/IJSE.2018070105
Nilesh M. Shelke, Shrinivas P. Deshpande
{"title":"Exploiting Chi Square Method for Sentiment Analysis of Product Reviews","authors":"Nilesh M. Shelke, Shrinivas P. Deshpande","doi":"10.4018/IJSE.2018070105","DOIUrl":"https://doi.org/10.4018/IJSE.2018070105","url":null,"abstract":"Sentiment analysis is an extension of data mining which employs natural language processing and information extraction task to recognize people's opinion towards entities such as products, services, issues, organizations, individuals, events, topics, and their attributes. It gives the summarized opinion of a writer or speaker. It has received lot of attention due to increasing number of posts/tweets on social sites. The proposed system is meant to classify a given text of review into positive, negative, or the neutral category. Primary objective of this article is to provide a method of exploiting permutation and combination and chi values for sentiment analysis of product reviews. Publicly available freely dictionary SentiWordNet 3.0 has been used for review classification. The proposed system is domain independent and context aware. Another objective of the proposed system is to identify the feature specific intensity with which reviewer has expressed his opinion. Effectiveness of the proposed system has been verified through performance matrix and compared with other research work.","PeriodicalId":272943,"journal":{"name":"Int. J. Synth. Emot.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117309801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Summarizing Opinions with Sentiment Analysis from Multiple Reviews on Travel Destinations 用旅游目的地多重评论的情感分析总结意见
Int. J. Synth. Emot. Pub Date : 2018-07-01 DOI: 10.4018/IJSE.2018070107
Argha Roy, Shyamali Guria, Suman Halder, Sayani Banerjee, Sourav Mandal
{"title":"Summarizing Opinions with Sentiment Analysis from Multiple Reviews on Travel Destinations","authors":"Argha Roy, Shyamali Guria, Suman Halder, Sayani Banerjee, Sourav Mandal","doi":"10.4018/IJSE.2018070107","DOIUrl":"https://doi.org/10.4018/IJSE.2018070107","url":null,"abstract":"Recently, the web has been crowded with growing volumes of various texts on every aspect of human life. It is difficult to rapidly access, analyze, and compose important decisions using efficient methods for raw textual data in the form of social media, blogs, feedback, reviews, etc., which receive textual inputs directly. It proposes an efficient method for summarization of various reviews of tourists on a specific tourist spot towards analyzing their sentiments towards the place. A classification technique automatically arranges documents into predefined categories and a summarization algorithm produces the exact condensed input such that output is most significant concepts of source documents. Finally, sentiment analysis is done in summarized opinion using NLP and text analysis techniques to show overall sentiment about the spot. Therefore, interested tourists can plan to visit the place do not go through all the reviews, rather they go through summarized documents with the overall sentiment about target place.","PeriodicalId":272943,"journal":{"name":"Int. J. Synth. Emot.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121219608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smart Refrigerator with Recipe Assistance 智能冰箱与食谱协助
Int. J. Synth. Emot. Pub Date : 2017-07-01 DOI: 10.4018/IJSE.2017070104
Aishwarya Gadgil, Vedija Jagtap, P. Kulkarni
{"title":"Smart Refrigerator with Recipe Assistance","authors":"Aishwarya Gadgil, Vedija Jagtap, P. Kulkarni","doi":"10.4018/IJSE.2017070104","DOIUrl":"https://doi.org/10.4018/IJSE.2017070104","url":null,"abstract":"Internet of Things (IoT) will lead to a technological revolution that will change the way people live and interact with their surroundings. Intelligent appliances combined with multimedia capability have been emerging in everyone's life. Smart home is one of the prominent areas of intelligent advances. Kitchen is considered as the center of our house, where the refrigerator plays an important role. Smart Refrigerator with Recipe Assistance will help in automating the refrigerator. The authors propose a system that would track the stock of ingredients in the refrigerator with the help of RFID tags and load cells. According to the availability of ingredients a list of possible recipes is predicted and suggestions will be given to the user. Whenever an item is identified by a RFID tag, estimations on the usage of ingredients are made and we can get notifications about the scarce products. The system will also help in checking the availability of ingredients based on the recipe user wishes to cook. The time required by an individual for manually checking the availability of ingredients in the refrigerator and then thinking about what to cook is greatly reduced using this system. Most of the information is automatically generated using RFID tags. Once the user logins into the application he/ she will be suggested the possible list of recipes based on the availability. Human intellectual power then can be used for new creative processes rather than using it for routine chores.","PeriodicalId":272943,"journal":{"name":"Int. J. Synth. Emot.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122513440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Parallel Outlier Detection for Streamed Data Using Non-Parameterized Approach 基于非参数化方法的流数据异常点并行检测
Int. J. Synth. Emot. Pub Date : 2017-07-01 DOI: 10.4018/IJSE.2017070102
H. D. Markad, S. Sangve
{"title":"Parallel Outlier Detection for Streamed Data Using Non-Parameterized Approach","authors":"H. D. Markad, S. Sangve","doi":"10.4018/IJSE.2017070102","DOIUrl":"https://doi.org/10.4018/IJSE.2017070102","url":null,"abstract":"Outlierdetectionisusedinvariousapplicationslikedetectionoffraud,networkanalysis,monitoring trafficovernetworks,manufacturingandenvironmentalsoftware.Thedatastreamswhicharegenerated arecontinuousandchangingovertime.Thisisthereasonwhyitbecomesnearlydifficulttodetect theoutliersintheexistingdatawhichishugeandcontinuousinnature.Thestreameddataisreal timeandchangesovertimeandhenceitisimpracticaltostoredatainthedataspaceandanalyze itforabnormalbehavior.Thelimitationsindataspacehasledtotheproblemofrealtimeanalysis ofdataandprocessingit inFCFSbasis.Theresultsregardingtheabnormalbehaviorhavetobe doneveryquicklyandinalimitedtimeframeandonaninfinitesetofdatastreamscomingoverthe networks.Toaddresstheproblemofdetectingoutliersonareal-timebasisisachallengingtaskand hencehastobemonitoredwiththehelpoftheprocessingpowerusedtodesignthegraphicsofany processingunit.Thealgorithmusedinthispaperusesakernelfunctiontoaccomplishthetask.It producestimelyoutcomeonhighspeedmulti-dimensionaldata.Thismethodincreasesthespeed ofoutlierdetectionby20timesandthespeedgoesonincreasingwiththeincreasewiththenumber ofdataattributesandinputdatarate. KEywORDS Anomaly Intrusion Detection, Compute Unified Device Architecture (CUDA), Gaussian Detection Scheme, Graphics Processing Unit (GPU), Outlier Detection, Parallel Execution","PeriodicalId":272943,"journal":{"name":"Int. J. Synth. Emot.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124384218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Framework for Threat Analysis and Attack Modelling of Network Security Protocols 网络安全协议威胁分析与攻击建模框架
Int. J. Synth. Emot. Pub Date : 2017-07-01 DOI: 10.4018/IJSE.2017070105
Nachiket Athavale, Shubham Deshpande, Vikash Chaudhary, Jatin Chavan, S. Barde
{"title":"Framework for Threat Analysis and Attack Modelling of Network Security Protocols","authors":"Nachiket Athavale, Shubham Deshpande, Vikash Chaudhary, Jatin Chavan, S. Barde","doi":"10.4018/IJSE.2017070105","DOIUrl":"https://doi.org/10.4018/IJSE.2017070105","url":null,"abstract":"Nowadays everything is computerized including banking and personal records. Also, to boost business profits, businessmen have changed their way of operations from physical way to electronic way, for example Flipkart. But as these developments benefit the developer they also increase the chance of exposing all of customer's personal details to malicious users. Hackers can enter into the system and can steal crucial or sensitive information about other authentic users and in case of banks leads to frauds. Security thus, becomes an important issue for all companies and banks. Intrusion detection systems help such companies by detecting in real time whether an intrusion is carried on or not. Here the authors are developing a signature based intrusion detection system which will scan incoming packets and send a warning message to system administrator. Also, the authors are implementing a framework and provide it to all the users so that developing intrusion detection based system similar to ours. The advantage of using framework is that it can be upgraded and re-defined whenever it is needed.","PeriodicalId":272943,"journal":{"name":"Int. J. Synth. Emot.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128974911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Long-Term and Short-Term Traffic Forecasting Using Holt-Winters Method: A Comparability Approach with Comparable Data in Multiple Seasons 基于冬至法的长期和短期交通预测:多季节可比数据的可比性方法
Int. J. Synth. Emot. Pub Date : 2017-07-01 DOI: 10.4018/IJSE.2017070103
A. R. Raikwar, Rahul R. Sadawarte, Rishikesh G. More, Rutuja S. Gunjal, P. Mahalle, P. Railkar
{"title":"Long-Term and Short-Term Traffic Forecasting Using Holt-Winters Method: A Comparability Approach with Comparable Data in Multiple Seasons","authors":"A. R. Raikwar, Rahul R. Sadawarte, Rishikesh G. More, Rutuja S. Gunjal, P. Mahalle, P. Railkar","doi":"10.4018/IJSE.2017070103","DOIUrl":"https://doi.org/10.4018/IJSE.2017070103","url":null,"abstract":"The need of faster life has caused the exponential growth in No. of vehicles on streets. The adverse effects include frequent traffic congestion, less time efficiency, unnecessary fuel consumption, pollution, accidents, etc. One of most important solution for resolving these problems is efficient transportation management system. Data science introduces different techniques and tools for overcoming these problems and to improve the data quality and forecasting inferences. The proposed long-term forecasting model can predict numerical values of effective attributes for a particular day on half-hourly basis, at least 24 hours prior to the time of prediction. The proposed forecasting model for short-term analysis will be having access to data as close as 30-minute difference from the time of prediction. Our proposed solution has integrated use of Holt-Winters (HW) method along with comparability schemes for seasonal approach. Long-Term and Short-Term Traffic Forecasting Using Holt-Winters Method: A Comparability Approach With Comparable Data in Multiple Seasons","PeriodicalId":272943,"journal":{"name":"Int. J. Synth. Emot.","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116380066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
iParking: An Intelligent Android-Cloud Based Smart Parking Reservation System Using Smart Phones Supportive to Smart City iParking:基于Android-Cloud的智能停车预约系统,基于智能手机支持智慧城市
Int. J. Synth. Emot. Pub Date : 2017-07-01 DOI: 10.4018/IJSE.2017070101
Ankita Khadsare, G. Jadhav, Sayali Mali, Shivani Nanaware
{"title":"iParking: An Intelligent Android-Cloud Based Smart Parking Reservation System Using Smart Phones Supportive to Smart City","authors":"Ankita Khadsare, G. Jadhav, Sayali Mali, Shivani Nanaware","doi":"10.4018/IJSE.2017070101","DOIUrl":"https://doi.org/10.4018/IJSE.2017070101","url":null,"abstract":"Locating a parking area in most of the metropolitan areas, especially during the rush hoursis difficult for anyone at the present time. The iParking system proposed in this paper allows us to find and reserve the vacant parking slots through oursmart phones and moreover supports the principles of “Smart City.” The design and implementation of the system called Reservation Based Smart Parking System (RSPS) is based on cloud computing and android application and finds availability of nearest parking slots. The objective is to reduce the time in finding the parking slots and avoid unnecessary traveling. The technology proposed in this paper usesInfrared Sensors (IR Sensors) for detecting the occupancy of parking slots. The iParking uses Radio Frequency Identification Devices (RFID) to identify and track a car. The methodology proposed in this paper can easily be compared with the existing parking system in terms of reducing the searching time and fuel. General Terms Proposed RSPS is using well known technologies Cloud Computing, Android mobile Operating System and RFID sensing to identify and book the nearest parking slot.","PeriodicalId":272943,"journal":{"name":"Int. J. Synth. Emot.","volume":"901 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132411668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Text to Sign Language Translation System: A Review of Literature 文本到手语翻译系统:文献综述
Int. J. Synth. Emot. Pub Date : 2016-07-01 DOI: 10.4018/IJSE.2016070104
L. Goyal, Vishal Goyal
{"title":"Text to Sign Language Translation System: A Review of Literature","authors":"L. Goyal, Vishal Goyal","doi":"10.4018/IJSE.2016070104","DOIUrl":"https://doi.org/10.4018/IJSE.2016070104","url":null,"abstract":"Many machine translation systems for spoken languages are available, but the translation system between the spoken and Sign Language are limited. The translation from Text to Sign Language is different from the translation between spoken languages because the Sign Language is visual spatial language which uses hands, arms, face, and head and body postures for communication in three dimensions. The translation from text to Sign Language is complex as the grammar rules for Sign Language are not standardized. Still a number of approaches have been used for translating the Text to Sign Language in which the input is the text and output is in the form of pre-recorded videos or the animated character generated by computer Avatar. This paper reviews the research carried out for automatic translation from Text to the Sign Language.","PeriodicalId":272943,"journal":{"name":"Int. J. Synth. Emot.","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116565607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Efficient Energy Saving Cryptographic Techniques with Software Solution in Wireless Network 无线网络中高效节能密码技术的软件解决方案
Int. J. Synth. Emot. Pub Date : 2016-07-01 DOI: 10.4018/IJSE.2016070105
Alka P. Sawlikar, Z. J. Khan, S. Akojwar
{"title":"Efficient Energy Saving Cryptographic Techniques with Software Solution in Wireless Network","authors":"Alka P. Sawlikar, Z. J. Khan, S. Akojwar","doi":"10.4018/IJSE.2016070105","DOIUrl":"https://doi.org/10.4018/IJSE.2016070105","url":null,"abstract":"To reduce communication costs, to protect our data from eavesdropping and from unauthorized users, cryptographic algorithms are used. Cryptographic module has to be developed for combining the operation of compression and encryption synchronously on the file. The information file is preliminary processed and then converts into one intermediary form so that it can be compressed with better efficiency and security. In this paper an optimized approaching coding technique which deals with both the issues of size and security is introduced and characterized experimentally using the performance measurement approach java in which file of any data length can be practically compressed and encrypted using new encryption technique and a novel energy saving technique in wireless communication network with efficient hardware solution is presented. To improve the strength and capability of algorithms and to compress the transmitted data an intelligent and reversible conversion technique is applied.","PeriodicalId":272943,"journal":{"name":"Int. J. Synth. Emot.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114603593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信