A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
SivaKumar, T.
- A Survey on Different Approaches for Sentiment Analysis of People
Authors
1 Dept of Computer Science, Sree Narayana Guru College, Coimbatore-641105, Tamil Nadu, IN
Source
Indian Journal of Innovations and Developments, Vol 5, No 6 (2016), Pagination: 1-4Abstract
Objective: To analysis different techniques and approaches for sentiment analysis to know the user opinion about a product or event or service that helps to improve an organization.
Findings: In an emerging network every company wants to know users opinion about their product or service. Each and every user has different views about the product or service and their views are expressed through reviews. The analysis of such opinion from different users plays an important role in the growth of a company. The opinions are expressed through reviews in the natural language. Sentiment analysis is a process used to identify emotions, opinions and evaluations and it also predict the orientation of sentiment whether the sentiment is positive, neutral or negative opinion based on the words or sentences expressed in the reviews. Sentiment analysis is otherwise called as opinion mining. In this paper various techniques and approaches for sentiment analysis are analysed and finally compared their effectiveness through parameters like accuracy, precision, recall and F-measure values.
Results: In this paper various techniques for sentiment analysis techniques are compared through parameters to prove unsupervised approach at aspect level for sentiment analysis is better than other techniques.
Application/Improvements: The finding of this work shows that unsupervised approach at aspect level for sentiment analysis is better than other techniques.
Keywords
Sentiment Analysis, Opinion Mining, Sentiment Orientation, Unsupervised Aspect-Based Sentiment Analysis.References
- B. Liu. Sentiment analysis and opinion mining. Synthesis lectures on human language technologies, 2012; 5(1), 1-167.
- J. Yesudoss, T. Banusankari. An efficient word alignment model for co-extracting opinion targets and opinion words from online reviews. Indian Journal of Innovations and Development, 2015; 4(7), 2015.
- E. Cambria, B. Schuller, Y. Xia, C. Havasi. New avenues in opinion mining and sentiment analysis. IEEE Intelligent Systems, 2013; 28(2), 15-21.
- T. T. Thet, J. C. Na, C. S. Khoo. Aspect-based sentiment analysis of movie reviews on discussion boards. Journal of information science. 2010; 36(6), 823-848.
- B. Lu, M. Ott, C. Cardie, B. K. Tsou. Multi-aspect sentiment analysis with topic models. In 2011 IEEE 11th International Conference on Data Mining Workshops. 2011, Dec, pp. 81-88.
- D. Marcheggiani, O. Täckström, A. Esuli, F. Sebastiani. Hierarchical multi-label conditional random fields for aspect-oriented opinion mining. In European Conference on Information Retrieval. Springer International Publishing. 2014 April; 273-285.
- J. Steinberger, T. Brychcın, M. Konkol. Aspect-level sentiment analysis in Czech. Association for Computational Linguistics(ACL),2014; 24-30
- T. Parlar, S. A. Özel. A new feature selection method for sentiment analysis of Turkish reviews. In Innovations in Intelligent Systems and Applications (INISTA), 2016 International Symposium on IEEE. 2016 August, 1-6.
- S. K. Ray, K. Shaalan. Using Freeware Resources to Analyse Sentiments in Social Media. Developments of E-Systems Engineering (DeSE), 2015 International Conference on IEEE. 2015
- P. Tripathi, S. K. Vishwakarma, A. Lala. Sentiment Analysis of English Tweets Using Rapid Miner. In Computational Intelligence and Communication Networks (CICN), 2015 International Conference on IEEE. 2015; Dec, 668-672
- A. P. Jain, V. D. Katkar. Sentiments analysis of Twitter data using data mining. In Information Processing (ICIP), 2015 International Conference on IEEE. 2015 Dec., 807-810.
- E. S. Chifu, T. S. Letia, V. R. Chifu. Unsupervised Aspect Level Sentiment Analysis Using Self-Organizing Maps. In 2015 17th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC). IEEE. 2015, Sep, 468-475.
- S. M. Jiménez-Zafra, M. T. Martín-Valdivia, E. Martínez-Cámara, L. A. Ureña-López. Combining resources to improve unsupervised sentiment analysis at aspect-level. Journal of Information Science, 2015; 42(2), 213-229.
- A Survey on Pseudonym Management Scheme in Vehicular Ad-Hoc Networks
Authors
1 Department of Computer Science, SNGC, Chavadi, Coimbatore-641105, Tamilnadu, IN
Source
Indian Journal of Innovations and Developments, Vol 5, No 6 (2016), Pagination: 1-4Abstract
Objectives: To evaluate various pseudonym management schemes in vehicular Ad-hoc Network (VANET) for enhancing confidentiality or ambiguity.
Methods: Vehicular Ad-hoc Network (VANET) is one of the categories in mobile ad-hoc networks (MANET), which is created for the intelligent transport system (ITS).VANET is utilizes to permit vehicles in terms of self-organized network system not including the requirement of the enduring transportation. The pseudonym management is the technique amongst the road side units (RSU) and vehicles for providing the requirements of the vehicles. The major issue in VANET is anonymity which is achieved through pseudonym management technique. There are different approaches developed to support the anonymity in VANET.
Findings: This paper investigates detailed information of different approaches and finally compared their effectiveness.
Application/Improvements: The finding of this work shows that Pseudonym shuffling process based scheme is better than other techniques.
Keywords
Pseudonym Management System, Vehicular Ad-Hoc Network (VANET), Mobile Ad-Hoc Network (MANET), Anonymity.References
- A.Prasanna, R. Asha. An Improved Selfish Node Detection in the Mobile Adhoc Network with the Consideration of Malicious Nodes Present in the Network. Indian Journal of Innovations and Developments, 2015; 4(4), 1-6.
- D.Jiang, L.Delgrossi. IEEE 802.11 p: Towards an international standard for wireless access in vehicular environments. In Vehicular Technology Conference, 2008. VTC Spring 2008. IEEE. 2008 May; 2036-2040.
- M.Raya, J. P.Hubaux. Securing vehicular ad hoc networks. Journal of Computer Security. 2007; 15(1), 39-68.
- E.Schoch, F.Kargl, T.Leinmüller, S.Schlott, P.Papadimitratos. Impact of pseudonym changes on geographic routing in vanets. In European Workshop on Security in Ad-hoc and Sensor Networks. Springer Berlin Heidelberg.2006 Sep; 43-57.
- E. Fonseca, A. Festag, R. Baldessari, R. L.Aguiar. Support of anonymity in vanets-putting pseudonymity into practice. In 2007 IEEE Wireless Communications and Networking Conference. IEEE, 2007 March; 3400-3405.
- M.Gerlach, F.Guttler. Privacy in VANETs using changing pseudonyms-ideal and real. In 2007 IEEE 65th Vehicular Technology Conference-VTC2007-Spring. IEEE, 2007 April; 2521-2525.
- L.Buttyán, T.Holczer, I. Vajda. On the effectiveness of changing pseudonyms to provide location privacy in VANETs. In European Workshop on Security in Ad-hoc and Sensor Networks. Springer Berlin Heidelberg. 2007 July; 129-141.
- Y.Pan, J.Li, L.Feng, B.Xu. An analytical model for random changing pseudonyms scheme in VANETs. In Network Computing and Information Security (NCIS), 2011 International Conference on IEEE. 2011 May; 2, 141-145).
- J.Liao, J.Li. Effectively changing pseudonyms for privacy protection in vanets. In 2009 10th International Symposium on Pervasive Systems, Algorithms, and Networks. IEEE, 2009 Dec; 648-652.
- J.Freudiger, M. H.Manshaei, J. Y.Le Boudec, J. P.Hubaux. On the age of pseudonyms in mobile ad hoc networks. In INFOCOM, 2010 Proceedings IEEE. 2010 March; 1-9.
- L.Chen, S. L.Ng, G.Wang. Threshold anonymous announcement in VANETs. IEEE Journal on Selected Areas in Communications, 2011; 29(3), 605-615.
- R.Lu, X.Lin, T. H.Luan, X.Liang, X.Shen. Pseudonym changing at social spots: An effective strategy for location privacy in vanets. IEEE transactions on vehicular technology, 2012; 61(1), 86-96.
- H. Artail, N. Abbani. A pseudonym management system to achieve anonymity in vehicular Ad hoc networks. IEEE Transactions on Dependable and Secure Computing, 2016; 13(1), 106-119.