SlideShare a Scribd company logo
1 of 3
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 781
Tweet Segmentation and Its Application to Named Entity Recognition
Ramya
1Ramya , Address: Thanjavur
2Professor: Mrs. Hemalatha, M.Sc., M.Phil., M.C.A., Dept. of Computer Science, Shrimathi Indira Gandhi College,
Tamil Nadu, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Twitter has attracted millions of users to
share and disseminate most up-to-date information, resulting
in large volumes of data produced every day. However, many
applications in Information Retrieval (IR) and Natural
Language Processing (NLP) suffer severely from the noisyand
short nature of tweets. In this project, propose a novel
framework for tweet segmentation in a batch mode, called
Hybrid Segmentation. By splitting tweets into meaningful
segments, the semantic or context information is well
preserved and easily extracted by the downstream
applications. HybridSeg finds the optimal segmentation of a
tweet by maximizing the sum of the stickiness scores of its
candidate segments. The stickiness score considers the
probability of a segment being a phrase in English (i.e., global
context) and the probability of a segment being a phrase
within the batch of tweets (i.e., local context). For the latter,
propose and evaluate two models to derive local context by
considering the linguistic features and term-dependency in a
batch of tweets, respectively. HybridSeg is also designed to
iteratively learn from confident segments as pseudo feedback.
Experiments on two tweet data sets show that tweet
segmentation quality is significantly improved by learning
both global and local contexts compared with using global
context alone. Through analysis and comparison, show that
local linguistic features are more reliable for learning local
context compared with term-dependency. As an application,
show that high accuracy is achieved in named entity
recognition by applying segment-based part-of-speech (POS)
tagging.
Key Words: Twitter stream, tweet segmentation,named
entity recognition, linguistic processing, Wikipedia
1. INTRODUCTION
Tweets are posted for information sharing and
communication. The named entities and semantic phrases
are well preserved in tweets. The method realizing the
proposed framework that solely relies on global context is
denoted by HybridSeg. Tweets are highly time-sensitive.The
well preserved linguistic features in these tweets facilitate
named entity recognition with high accuracy. Each named
entity is a valid segment. The method utilizinglocallinguistic
features is denoted by HybridSeg NER. It obtains confident
segments based on the voting resultsofmultipleoff-the-shelf
NER tools. Another method utilizing local collocation
knowledge, denoted by HybridSeg N-Gram, is proposed
based on the observation that many tweets publishedwithin
a short time period are about the same topic. HybridSeg N-
Gram segments tweets by estimating the term-dependency
within a batch of tweets. To improve POS tagging on tweets,
Ritter et al. train a POS tagger by using CRF model with
conventional and tweet-specific features. Even thoughshort
text strings might be a problem, sentiment analysis
within micro blogging hasshown that Twitter canbeseenas
a valid online indicator of political sentiment. A lot of
advertising and branding is now tied to Twitter.
Furthermore, and most importantly, the first place one goes
to find any breaking news is to search it on Twitter. The
focus of this project is clustering with the TF-IDF weighted
mechanism of daily technology news tweets of prominent
bloggers and news sites using Apache Mahout and to
evaluate the effectsof introducing andremovinganonymous
wordson the quality of clustering. This projectrestrictsitself
to only tweets in the English language.
2. Existing System
Nowadays people are using so many social
networking sitesare. But the people using allsitesforupdate
statesand sharing photos, videosand so on. There is noalert
for bad weather situation, earthquakes and so on. The
problem is that lot of time consumed to the people for
checking the message submitted in the social networking
and file a case in cyber crime. After verification cyber crime
defense commission will remove the post according to the
cyber crime rules in a span of time. This will not solve the
problem only to remove the thingsafter the issuearises. Due
to ignorance and lack of understanding of Social Media
privacy feature, people make many mistakes. Another
situation to consider has to do with the availability of
information too personal, whether in pictures or text. You
cannot give out too much personal information. As
throughout the Internet. The User can send their post with
some illegal words and letters.
2.1 Survey
A. User tracking using tweet segmentation and word
Many organizations have been reported to create and
monitoring targeted Twitter streams to collect a bunch of
information and understand according to user's view.
Targeted Twitter stream is main usually constructed by
filtering tweets and that abused words with predefined
selection criteria. Due to its invaluable business value of
timely information from these tweets, it's a necessary to
understand that abused word's language for a large body of
downstream applications, such as named entity recognition
(NER), event detecting and summarizing that particular
word, opinion mining, sentiment analysis, and etc. In these
proposed system application is developed which take tweet
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 782
is input and search semantic negative or illegal words from
database. Generate report of that abusing word and send to
cyber crime's site. Then depending on the tweet, track the
related information of the person. Track allthetweetsofthat
particular person and track that person through
identification databases. Then take a action by cyber crime.
And after that prevent the tweet.
B. Measuring the controversy level of Arabic trending
topics on Twitter
Social micro-blogging systemslike Twitter are usedtodayas
a platform that enables its users to write down about
different topics. One important aspect of such human
interactions is the existence of debateanddisagreement.The
most heated debates are found on controversial topics.
Detecting such topics can be very beneficial in
understanding the behavior of online social networks users
and the dynamics of their interactions. Such an
understanding leads to better ways of handling and
predicting how the "online crowds" will act. Several
approaches have been proposed for detectingcontroversyin
online communication. Some of them represent the
interactions in the form of graphsand study their properties
in order to determine whether the topic of interaction is
controversial or not. Other approachesrely onthecontentof
the exchanged messages. In this study, we focus on the
former approach in identifying the controversy level of the
trending topics on Twitter. Unlike many previous works,
then do not limit ourselves to a certain domain. Moreover,
the main focus on social content written in Arabic about hot
events occurring in the Middle East. To the best of our
knowledge, ours is the first work to undertake thisapproach
in studying controversy in general topics written in Arabic.
Collect a large dataset of tweets on different trending topics
from different domains. First apply several approaches for
controversy detection and compare their outcomes to
determine which one is the most consistent measure.
C. Event Detection and Key Posts Discovering in Social
Media Data Streams
Microblogging, as a popular social mediaservice,hasbecome
a new information channel for usersto receiveandexchange
the most up-to-date information on current events.
Consequently, it is crucial to detect newemergingeventsand
to discover the key posts which have the potentialtoactively
disseminate the events through microblogging. However,
traditional event detection models require human
intervention for detecting the number of topics to be
explored, which significantly reduces the efficiency and
accuracy of event detection. Most of the existing methods
focus only on event detection and are unable to discover the
key posts related to the events, making itchallengingtotrack
momentous events in timely manner. To tackle these
problems, a HITS (Hypertext Induced Topic Search) based
topic decision method, named TD-HITSisproposed.TD-HITS
can automatically detect the number of topics as well as
discovering associated key posts from a large number of
posts. The experimental results are based on a Twitter
dataset to demonstrate the effectiveness of our proposed
methodsfor both detecting eventsand identifyingkeyposts.
D. Tweet modeling with LSTM recurrent neural
networks for hash tag recommendation
The hash symbol, called a hash tag, is used to mark the
keyword or topic in a tweet. It was created organically by
users as a way to categorize messages. Hash tags also
provide valuable information for manyresearchapplications
such as sentiment classification and topic analysis.However,
only a small number of tweets are manually annotated.
Therefore, an automatic hashtagrecommendationmethodis
needed to help userstag their new tweets.Previousmethods
mostly use conventional machine learning classifierssuchas
SVM or utilize collaborative filtering technique. A bottleneck
of these approachesisthat they all use the TF-IDF schemeto
represent tweets and ignore the semantic information in
tweets. In this paper, we also regard hash tag
recommendation asa classification task but propose a novel
recurrent neural network model tolearn vector-basedtweet
representations to recommend hashtags. More precisely,we
use a skip-gram model to generate distributed word
representations and then apply a convolution neural
network to learn semantic sentence vectors. Afterwards,we
make use of the sentence vectors to train a long short-term
memory recurrent neural network (LSTM-RNN).Wedirectly
use the produced tweet vectors as features to classify
hashtags without any feature engineering. Experiments on
real world data from Twitter to recommend hashtags show
that our proposed LSTM-RNN model outperforms state-of-
the-art methods and LSTM unit also obtains the best
performance compared to standard RNN and gated
recurrent unit (GRU).
E. Exploring human emotion via Twitter
Sentiment analysis or opinion mining on twitter data is an
emerging topic in research. In this paper, we have described
a system for emotion analysis of tweets using only the core
text. Tweets are usually short, more ambiguousandcontains
a huge amount of noisy data, sometimes it is difficult to
understand the user's opinion. The main challenge is to
feature extraction for the purpose of classification and
feature extraction depends on the perfection of
preprocessing of a tweet. The preprocessing is the most
difficult task, since it can be done in various ways and the
methods or steps applied in preprocessing are not distinct.
Most of the researches in this topic, have been focused on
binary (positive and negative) and 3-way (positive, negative
and neutral) classifications. In this paper, we have focused
on emotion classification of tweets as multi-class
classification. We have chosen basic human emotions
(happiness, sadness, surprise, disgust) and neutral as our
emotion classes. According to the experimental results, our
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072
© 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 783
approach improved the performance of multi-class
classification of twitter data.
3. Proposed System
Tweets are posted for information sharing and
communication. The named entities and semantic phrases
are well preserved in tweets. The global context derived
from Web pages or Wikipedia therefore helps identifying
the meaningful segments in tweets. The method realizing
the proposed framework that solely relies on global
context is denoted by HybridSegWeb. Tweets are highly
time-sensitive so that many emerging phrases like “She
Dancing” cannot be found in external knowledge bases.
However, considering a large number of tweets published
within a short time period containing the phrase, it is not
difficult to recognize “She Dancing” as a valid and
meaningful segment. Therefore investigate two local
contexts, namely local linguistic features and local
collocation. Observe that tweets from many official
accounts of news agencies, organizations, and advertisers
are likely well written. The well preserved linguistic
features in these tweets facilitate named entity recognition
with high accuracy. Each named entity is a valid segment.
The method utilizing local linguistic features is denoted by
HybridSegNER. It obtains confident segments based on the
voting results of multiple off-the-shelf NER tools.
Fig1- Sample Twitter Segmentation
Text Mining Algorithm
Text mining, also referred to as text data mining, roughly
equivalent to text analytics, is the process of deriving high-
quality information from text. High-quality information is
typically derived through the devising of patternsandtrends
through means such as statistical pattern learning. Text
mining usually involves the process of structuring the input
text (usually parsing, along with the addition of some
derived linguistic features and the removal of others, and
subsequent insertion into a database), deriving patterns
within the structured data, and finally evaluation and
interpretation of the output. 'High quality' in text mining
usually refers to some combination of relevance, novelty,
and interestingness. Typical text mining tasks include text
categorization, text clustering, concept/entity extraction,
production of granular taxonomies, sentiment analysis,
document summarization, and entityrelationmodeling.Text
analysis involves information retrieval, lexical analysis to
study word frequency distributions, pattern recognition,
tagging/annotation, information extraction, data mining
techniques including link and association analysis,
visualization, and predictiveanalytics. The overarchinggoal
is, essentially, to turn text into data for analysis, via
application of natural language processing and analytical
methods.
4. Conclusion
The HybridSeg framework which segments tweets
into meaningful phrases called segments using both global
and local context. Through our framework, we demonstrate
that local linguistic features are more reliable than term
dependency in guiding the segmentation process. This
finding opens opportunities for tools developed for formal
text to be applied to tweets which are believed to be much
more noise than formal text. Tweet segmentation helps to
preserve the semantic meaning of tweets, which
subsequently benefits many downstream applications, e.g.
named entity recognition. Through experiments, we show
that segment based named entity recognition methods
achieves much better accuracy than the word-based
alternative.
REFERENCES
1. Twiner: Named entity recognition in targeted
twitter stream- C. Li, J. Weng, Q. He, Y. Yao, A. Datta,
A. Sun, and B.-S. Lee.
2. Augmenting naive bayes classifiers with statistical
language models- F. Peng, D. Schuurmans, and S.
Wang.
3. Topic sentiment analysis in twitter: a graph-based
hash tag sentiment classification approach- X.
Wang, F. Wei, X. Liu, M. Zhou, and M. Zhang.
4. Twevent: segment-based event detection from
tweets- C. Li, A. Sun, and A. Datta-
5. Incorporating nonlocal information into
information extraction systems by gibbs sampling-
J. R. Finkel, T. Grenager, and C. Manning.

More Related Content

What's hot

IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine LearningIRJET Journal
 
Detection of cyber-bullying
Detection of cyber-bullying Detection of cyber-bullying
Detection of cyber-bullying Ziar Khan
 
IRJET - Social Network Question and Answer System
IRJET - Social Network Question and Answer SystemIRJET - Social Network Question and Answer System
IRJET - Social Network Question and Answer SystemIRJET Journal
 
Detecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareDetecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareAshish Arora
 
IRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source IdentificationIRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source IdentificationIRJET Journal
 
IRJET - Fake News Detection using Machine Learning
IRJET -  	  Fake News Detection using Machine LearningIRJET -  	  Fake News Detection using Machine Learning
IRJET - Fake News Detection using Machine LearningIRJET Journal
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET Journal
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET Journal
 
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORKINFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORKIAEME Publication
 
IRJET- Fake News Detection
IRJET- Fake News DetectionIRJET- Fake News Detection
IRJET- Fake News DetectionIRJET Journal
 
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...IRJET Journal
 
IRJET - Suicidal Text Detection using Machine Learning
IRJET -  	  Suicidal Text Detection using Machine LearningIRJET -  	  Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine LearningIRJET Journal
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET Journal
 
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MININGFAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MININGijnlc
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacksAboul Ella Hassanien
 
Tweet segmentation and its application to named entity recognition
Tweet segmentation and its application to named entity recognitionTweet segmentation and its application to named entity recognition
Tweet segmentation and its application to named entity recognitionShakas Technologies
 

What's hot (20)

IRJET- Fake Profile Identification using Machine Learning
IRJET-  	  Fake Profile Identification using Machine LearningIRJET-  	  Fake Profile Identification using Machine Learning
IRJET- Fake Profile Identification using Machine Learning
 
Detection of cyber-bullying
Detection of cyber-bullying Detection of cyber-bullying
Detection of cyber-bullying
 
IRJET - Social Network Question and Answer System
IRJET - Social Network Question and Answer SystemIRJET - Social Network Question and Answer System
IRJET - Social Network Question and Answer System
 
Detecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer softwareDetecting the presence of cyberbullying using computer software
Detecting the presence of cyberbullying using computer software
 
IRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source IdentificationIRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source Identification
 
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
 
IRJET - Fake News Detection using Machine Learning
IRJET -  	  Fake News Detection using Machine LearningIRJET -  	  Fake News Detection using Machine Learning
IRJET - Fake News Detection using Machine Learning
 
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORKINFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
 
IRJET- Fake News Detection
IRJET- Fake News DetectionIRJET- Fake News Detection
IRJET- Fake News Detection
 
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
A Paper on Web Data Segmentation for Terrorism Detection using Named Entity R...
 
IRJET - Suicidal Text Detection using Machine Learning
IRJET -  	  Suicidal Text Detection using Machine LearningIRJET -  	  Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine Learning
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
 
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MININGFAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
 
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
[IJET-V2I1P14] Authors:Aditi Verma, Rachana Agarwal, Sameer Bardia, Simran Sh...
 
[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah
[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah
[IJET V2I4P9] Authors: Praveen Jayasankar , Prashanth Jayaraman ,Rachel Hannah
 
Seminar Report Mine
Seminar Report MineSeminar Report Mine
Seminar Report Mine
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
 
Tweet segmentation and its application to named entity recognition
Tweet segmentation and its application to named entity recognitionTweet segmentation and its application to named entity recognition
Tweet segmentation and its application to named entity recognition
 

Similar to Tweet Segmentation and Its Application to Named Entity Recognition

IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2VecIRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2VecIRJET Journal
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksIRJET Journal
 
IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
 IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
IRJET - Implementation of Twitter Sentimental Analysis According to Hash TagIRJET Journal
 
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKDETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKIRJET Journal
 
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITYFRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITYcscpconf
 
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media MiningIRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media MiningIRJET Journal
 
Classification of Disastrous Tweets on Twitter using BERT Model
Classification of Disastrous Tweets on Twitter using BERT ModelClassification of Disastrous Tweets on Twitter using BERT Model
Classification of Disastrous Tweets on Twitter using BERT ModelIRJET Journal
 
Dynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptxDynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptxRivikaJain
 
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET-  	  An Improved Machine Learning for Twitter Breaking News Extraction ...IRJET-  	  An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...IRJET Journal
 
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGSENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGIRJET Journal
 
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...IRJET Journal
 
BUS 625 Week 4 Response to Discussion 2Guided Response Your.docx
BUS 625 Week 4 Response to Discussion 2Guided Response Your.docxBUS 625 Week 4 Response to Discussion 2Guided Response Your.docx
BUS 625 Week 4 Response to Discussion 2Guided Response Your.docxjasoninnes20
 
BUS 625 Week 4 Response to Discussion 2Guided Response Your.docx
BUS 625 Week 4 Response to Discussion 2Guided Response Your.docxBUS 625 Week 4 Response to Discussion 2Guided Response Your.docx
BUS 625 Week 4 Response to Discussion 2Guided Response Your.docxcurwenmichaela
 
DP1_160430723010_Divya.pptx
DP1_160430723010_Divya.pptxDP1_160430723010_Divya.pptx
DP1_160430723010_Divya.pptxDivyaPatel729457
 
Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...IRJET Journal
 
Twitter_Hashtag_Prediction.pptx
Twitter_Hashtag_Prediction.pptxTwitter_Hashtag_Prediction.pptx
Twitter_Hashtag_Prediction.pptxSayaliKawale2
 
A Baseline Based Deep Learning Approach of Live Tweets
A Baseline Based Deep Learning Approach of Live TweetsA Baseline Based Deep Learning Approach of Live Tweets
A Baseline Based Deep Learning Approach of Live Tweetsijtsrd
 
IRJET- Review Analyser with Bot
IRJET- Review Analyser with BotIRJET- Review Analyser with Bot
IRJET- Review Analyser with BotIRJET Journal
 

Similar to Tweet Segmentation and Its Application to Named Entity Recognition (20)

IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2VecIRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
 
Spammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social NetworksSpammer Detection and Fake User Identification on Social Networks
Spammer Detection and Fake User Identification on Social Networks
 
IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
 IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
IRJET - Implementation of Twitter Sentimental Analysis According to Hash Tag
 
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORKDETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
DETECTION OF MALICIOUS SOCIAL BOTS USING ML TECHNIQUE IN TWITTER NETWORK
 
F017433947
F017433947F017433947
F017433947
 
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITYFRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
FRAMEWORK FOR ANALYZING TWITTER TO DETECT COMMUNITY SUSPICIOUS CRIME ACTIVITY
 
IRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media MiningIRJET - Detection of Drug Abuse using Social Media Mining
IRJET - Detection of Drug Abuse using Social Media Mining
 
Classification of Disastrous Tweets on Twitter using BERT Model
Classification of Disastrous Tweets on Twitter using BERT ModelClassification of Disastrous Tweets on Twitter using BERT Model
Classification of Disastrous Tweets on Twitter using BERT Model
 
Dynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptxDynamic feature selection for spam detection (1).pptx
Dynamic feature selection for spam detection (1).pptx
 
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET-  	  An Improved Machine Learning for Twitter Breaking News Extraction ...IRJET-  	  An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
 
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNINGSENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
SENTIMENT ANALYSIS OF SOCIAL MEDIA DATA USING DEEP LEARNING
 
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
 
BUS 625 Week 4 Response to Discussion 2Guided Response Your.docx
BUS 625 Week 4 Response to Discussion 2Guided Response Your.docxBUS 625 Week 4 Response to Discussion 2Guided Response Your.docx
BUS 625 Week 4 Response to Discussion 2Guided Response Your.docx
 
BUS 625 Week 4 Response to Discussion 2Guided Response Your.docx
BUS 625 Week 4 Response to Discussion 2Guided Response Your.docxBUS 625 Week 4 Response to Discussion 2Guided Response Your.docx
BUS 625 Week 4 Response to Discussion 2Guided Response Your.docx
 
DP1_160430723010_Divya.pptx
DP1_160430723010_Divya.pptxDP1_160430723010_Divya.pptx
DP1_160430723010_Divya.pptx
 
Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...Analyzing Social media’s real data detection through Web content mining using...
Analyzing Social media’s real data detection through Web content mining using...
 
Twitter_Hashtag_Prediction.pptx
Twitter_Hashtag_Prediction.pptxTwitter_Hashtag_Prediction.pptx
Twitter_Hashtag_Prediction.pptx
 
A Baseline Based Deep Learning Approach of Live Tweets
A Baseline Based Deep Learning Approach of Live TweetsA Baseline Based Deep Learning Approach of Live Tweets
A Baseline Based Deep Learning Approach of Live Tweets
 
IRJET- Review Analyser with Bot
IRJET- Review Analyser with BotIRJET- Review Analyser with Bot
IRJET- Review Analyser with Bot
 
E017433538
E017433538E017433538
E017433538
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIkoyaldeepu123
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Recently uploaded (20)

Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
EduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AIEduAI - E learning Platform integrated with AI
EduAI - E learning Platform integrated with AI
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 

Tweet Segmentation and Its Application to Named Entity Recognition

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 781 Tweet Segmentation and Its Application to Named Entity Recognition Ramya 1Ramya , Address: Thanjavur 2Professor: Mrs. Hemalatha, M.Sc., M.Phil., M.C.A., Dept. of Computer Science, Shrimathi Indira Gandhi College, Tamil Nadu, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Twitter has attracted millions of users to share and disseminate most up-to-date information, resulting in large volumes of data produced every day. However, many applications in Information Retrieval (IR) and Natural Language Processing (NLP) suffer severely from the noisyand short nature of tweets. In this project, propose a novel framework for tweet segmentation in a batch mode, called Hybrid Segmentation. By splitting tweets into meaningful segments, the semantic or context information is well preserved and easily extracted by the downstream applications. HybridSeg finds the optimal segmentation of a tweet by maximizing the sum of the stickiness scores of its candidate segments. The stickiness score considers the probability of a segment being a phrase in English (i.e., global context) and the probability of a segment being a phrase within the batch of tweets (i.e., local context). For the latter, propose and evaluate two models to derive local context by considering the linguistic features and term-dependency in a batch of tweets, respectively. HybridSeg is also designed to iteratively learn from confident segments as pseudo feedback. Experiments on two tweet data sets show that tweet segmentation quality is significantly improved by learning both global and local contexts compared with using global context alone. Through analysis and comparison, show that local linguistic features are more reliable for learning local context compared with term-dependency. As an application, show that high accuracy is achieved in named entity recognition by applying segment-based part-of-speech (POS) tagging. Key Words: Twitter stream, tweet segmentation,named entity recognition, linguistic processing, Wikipedia 1. INTRODUCTION Tweets are posted for information sharing and communication. The named entities and semantic phrases are well preserved in tweets. The method realizing the proposed framework that solely relies on global context is denoted by HybridSeg. Tweets are highly time-sensitive.The well preserved linguistic features in these tweets facilitate named entity recognition with high accuracy. Each named entity is a valid segment. The method utilizinglocallinguistic features is denoted by HybridSeg NER. It obtains confident segments based on the voting resultsofmultipleoff-the-shelf NER tools. Another method utilizing local collocation knowledge, denoted by HybridSeg N-Gram, is proposed based on the observation that many tweets publishedwithin a short time period are about the same topic. HybridSeg N- Gram segments tweets by estimating the term-dependency within a batch of tweets. To improve POS tagging on tweets, Ritter et al. train a POS tagger by using CRF model with conventional and tweet-specific features. Even thoughshort text strings might be a problem, sentiment analysis within micro blogging hasshown that Twitter canbeseenas a valid online indicator of political sentiment. A lot of advertising and branding is now tied to Twitter. Furthermore, and most importantly, the first place one goes to find any breaking news is to search it on Twitter. The focus of this project is clustering with the TF-IDF weighted mechanism of daily technology news tweets of prominent bloggers and news sites using Apache Mahout and to evaluate the effectsof introducing andremovinganonymous wordson the quality of clustering. This projectrestrictsitself to only tweets in the English language. 2. Existing System Nowadays people are using so many social networking sitesare. But the people using allsitesforupdate statesand sharing photos, videosand so on. There is noalert for bad weather situation, earthquakes and so on. The problem is that lot of time consumed to the people for checking the message submitted in the social networking and file a case in cyber crime. After verification cyber crime defense commission will remove the post according to the cyber crime rules in a span of time. This will not solve the problem only to remove the thingsafter the issuearises. Due to ignorance and lack of understanding of Social Media privacy feature, people make many mistakes. Another situation to consider has to do with the availability of information too personal, whether in pictures or text. You cannot give out too much personal information. As throughout the Internet. The User can send their post with some illegal words and letters. 2.1 Survey A. User tracking using tweet segmentation and word Many organizations have been reported to create and monitoring targeted Twitter streams to collect a bunch of information and understand according to user's view. Targeted Twitter stream is main usually constructed by filtering tweets and that abused words with predefined selection criteria. Due to its invaluable business value of timely information from these tweets, it's a necessary to understand that abused word's language for a large body of downstream applications, such as named entity recognition (NER), event detecting and summarizing that particular word, opinion mining, sentiment analysis, and etc. In these proposed system application is developed which take tweet
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 782 is input and search semantic negative or illegal words from database. Generate report of that abusing word and send to cyber crime's site. Then depending on the tweet, track the related information of the person. Track allthetweetsofthat particular person and track that person through identification databases. Then take a action by cyber crime. And after that prevent the tweet. B. Measuring the controversy level of Arabic trending topics on Twitter Social micro-blogging systemslike Twitter are usedtodayas a platform that enables its users to write down about different topics. One important aspect of such human interactions is the existence of debateanddisagreement.The most heated debates are found on controversial topics. Detecting such topics can be very beneficial in understanding the behavior of online social networks users and the dynamics of their interactions. Such an understanding leads to better ways of handling and predicting how the "online crowds" will act. Several approaches have been proposed for detectingcontroversyin online communication. Some of them represent the interactions in the form of graphsand study their properties in order to determine whether the topic of interaction is controversial or not. Other approachesrely onthecontentof the exchanged messages. In this study, we focus on the former approach in identifying the controversy level of the trending topics on Twitter. Unlike many previous works, then do not limit ourselves to a certain domain. Moreover, the main focus on social content written in Arabic about hot events occurring in the Middle East. To the best of our knowledge, ours is the first work to undertake thisapproach in studying controversy in general topics written in Arabic. Collect a large dataset of tweets on different trending topics from different domains. First apply several approaches for controversy detection and compare their outcomes to determine which one is the most consistent measure. C. Event Detection and Key Posts Discovering in Social Media Data Streams Microblogging, as a popular social mediaservice,hasbecome a new information channel for usersto receiveandexchange the most up-to-date information on current events. Consequently, it is crucial to detect newemergingeventsand to discover the key posts which have the potentialtoactively disseminate the events through microblogging. However, traditional event detection models require human intervention for detecting the number of topics to be explored, which significantly reduces the efficiency and accuracy of event detection. Most of the existing methods focus only on event detection and are unable to discover the key posts related to the events, making itchallengingtotrack momentous events in timely manner. To tackle these problems, a HITS (Hypertext Induced Topic Search) based topic decision method, named TD-HITSisproposed.TD-HITS can automatically detect the number of topics as well as discovering associated key posts from a large number of posts. The experimental results are based on a Twitter dataset to demonstrate the effectiveness of our proposed methodsfor both detecting eventsand identifyingkeyposts. D. Tweet modeling with LSTM recurrent neural networks for hash tag recommendation The hash symbol, called a hash tag, is used to mark the keyword or topic in a tweet. It was created organically by users as a way to categorize messages. Hash tags also provide valuable information for manyresearchapplications such as sentiment classification and topic analysis.However, only a small number of tweets are manually annotated. Therefore, an automatic hashtagrecommendationmethodis needed to help userstag their new tweets.Previousmethods mostly use conventional machine learning classifierssuchas SVM or utilize collaborative filtering technique. A bottleneck of these approachesisthat they all use the TF-IDF schemeto represent tweets and ignore the semantic information in tweets. In this paper, we also regard hash tag recommendation asa classification task but propose a novel recurrent neural network model tolearn vector-basedtweet representations to recommend hashtags. More precisely,we use a skip-gram model to generate distributed word representations and then apply a convolution neural network to learn semantic sentence vectors. Afterwards,we make use of the sentence vectors to train a long short-term memory recurrent neural network (LSTM-RNN).Wedirectly use the produced tweet vectors as features to classify hashtags without any feature engineering. Experiments on real world data from Twitter to recommend hashtags show that our proposed LSTM-RNN model outperforms state-of- the-art methods and LSTM unit also obtains the best performance compared to standard RNN and gated recurrent unit (GRU). E. Exploring human emotion via Twitter Sentiment analysis or opinion mining on twitter data is an emerging topic in research. In this paper, we have described a system for emotion analysis of tweets using only the core text. Tweets are usually short, more ambiguousandcontains a huge amount of noisy data, sometimes it is difficult to understand the user's opinion. The main challenge is to feature extraction for the purpose of classification and feature extraction depends on the perfection of preprocessing of a tweet. The preprocessing is the most difficult task, since it can be done in various ways and the methods or steps applied in preprocessing are not distinct. Most of the researches in this topic, have been focused on binary (positive and negative) and 3-way (positive, negative and neutral) classifications. In this paper, we have focused on emotion classification of tweets as multi-class classification. We have chosen basic human emotions (happiness, sadness, surprise, disgust) and neutral as our emotion classes. According to the experimental results, our
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 05 Issue: 08 | Aug 2018 www.irjet.net p-ISSN: 2395-0072 © 2018, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 783 approach improved the performance of multi-class classification of twitter data. 3. Proposed System Tweets are posted for information sharing and communication. The named entities and semantic phrases are well preserved in tweets. The global context derived from Web pages or Wikipedia therefore helps identifying the meaningful segments in tweets. The method realizing the proposed framework that solely relies on global context is denoted by HybridSegWeb. Tweets are highly time-sensitive so that many emerging phrases like “She Dancing” cannot be found in external knowledge bases. However, considering a large number of tweets published within a short time period containing the phrase, it is not difficult to recognize “She Dancing” as a valid and meaningful segment. Therefore investigate two local contexts, namely local linguistic features and local collocation. Observe that tweets from many official accounts of news agencies, organizations, and advertisers are likely well written. The well preserved linguistic features in these tweets facilitate named entity recognition with high accuracy. Each named entity is a valid segment. The method utilizing local linguistic features is denoted by HybridSegNER. It obtains confident segments based on the voting results of multiple off-the-shelf NER tools. Fig1- Sample Twitter Segmentation Text Mining Algorithm Text mining, also referred to as text data mining, roughly equivalent to text analytics, is the process of deriving high- quality information from text. High-quality information is typically derived through the devising of patternsandtrends through means such as statistical pattern learning. Text mining usually involves the process of structuring the input text (usually parsing, along with the addition of some derived linguistic features and the removal of others, and subsequent insertion into a database), deriving patterns within the structured data, and finally evaluation and interpretation of the output. 'High quality' in text mining usually refers to some combination of relevance, novelty, and interestingness. Typical text mining tasks include text categorization, text clustering, concept/entity extraction, production of granular taxonomies, sentiment analysis, document summarization, and entityrelationmodeling.Text analysis involves information retrieval, lexical analysis to study word frequency distributions, pattern recognition, tagging/annotation, information extraction, data mining techniques including link and association analysis, visualization, and predictiveanalytics. The overarchinggoal is, essentially, to turn text into data for analysis, via application of natural language processing and analytical methods. 4. Conclusion The HybridSeg framework which segments tweets into meaningful phrases called segments using both global and local context. Through our framework, we demonstrate that local linguistic features are more reliable than term dependency in guiding the segmentation process. This finding opens opportunities for tools developed for formal text to be applied to tweets which are believed to be much more noise than formal text. Tweet segmentation helps to preserve the semantic meaning of tweets, which subsequently benefits many downstream applications, e.g. named entity recognition. Through experiments, we show that segment based named entity recognition methods achieves much better accuracy than the word-based alternative. REFERENCES 1. Twiner: Named entity recognition in targeted twitter stream- C. Li, J. Weng, Q. He, Y. Yao, A. Datta, A. Sun, and B.-S. Lee. 2. Augmenting naive bayes classifiers with statistical language models- F. Peng, D. Schuurmans, and S. Wang. 3. Topic sentiment analysis in twitter: a graph-based hash tag sentiment classification approach- X. Wang, F. Wei, X. Liu, M. Zhou, and M. Zhang. 4. Twevent: segment-based event detection from tweets- C. Li, A. Sun, and A. Datta- 5. Incorporating nonlocal information into information extraction systems by gibbs sampling- J. R. Finkel, T. Grenager, and C. Manning.