Professional Documents
Culture Documents
Sentimental Analysis of User's Reviews and Comments On Social Media2
Sentimental Analysis of User's Reviews and Comments On Social Media2
INTRODUCTION
1
CHAPTER - I
INTRODUCTION
The Internet has become an inevitable part of the lives of people today. Gone are the
days when people would browse the net only to retain and even enhance their social lives
through Social Networking Sites. By being aware of your cyber-surroundings and who you
are talking to, you should be able to safely enjoy social networking online. Our intension is
directed at the issue of privacy risk and user behavior in order to suggest viable solutions for
users to both improve their privacy protection, and be able to deploy the social functions
expected from these types of network.
Every human being in the world wants to communicate to their society regarding their
emotions and feelings. There are various mediums existing in the society nowadays for the
same. Like for example Facebook, Twitter etc. Peoples are communicating not only their
personal issues and feelings but also the issues which are happening around the world and
which are relevant to the current society. So any matter or discussions or issues which they
are communicating in this social medias are commonly known as posts .There are two types
of posts. It can be analyze and find out whether it is good or bad. We are trying to analyze
various types of posts through this project.
In recent years, with the growing volume of online reviews available on the Internet,
sentiment analysis and opinion mining, as a special text mining task for determining the
subjective attitude (i.e., sentiment) expressed by the text, is becoming a hotspot in the field of
data mining and natural language processing. Sentiment classification is a basic task in
sentiment analysis, with its aim to classify the sentiment (e.g., positive or negative) of a given
text. The general practice in sentiment classification follows the techniques in traditional
topic-based text classification, where the Bag-of-words (BOW) model is typically used for
text representation. In the BOW model, a review text is represented by a vector of
independent words. The statistical machine learning algorithms (such as naïve Bayes,
maximum entropy classifier, and support vector machines) are then employed to train a
sentiment classifier.
2
1.2 MODULES
User Login And Registration
Profile Creation
Abuse Report
Admin Login
User Management
Review And Reports
Comment Management
Sentimental Analysis
Lexical Dictionary
1.3.3ABUSE REPORT
In case of content uploaded a user can send a abuse to other users, admin can view
this report per views.
1.3.4ADMIN LOGIN
From provided credentials admin may able to login & can manage users.
1.3.5USER MANAGEMENT
User can be blocked or deactivated with this management interface provided to
admin. Admin makes decision with help of abuse module.
3
1.3.6 REVIEW AND REPORTS
Every human being in the world wants to communicate to their society regarding
their emotions and feelings. There are various mediums existing in the society nowadays
for the same. Like for example Facebook , Twitter etc. Peoples are communicating not only
their personal issues and feelings but also the issues which are happening around the world
and which are relevant to the current society. so any matter or discussions or issues which
they are communicating in this social medias are commonly known as posts. There are two
types of posts. It can be analyze and find out whether it is good or bad. We are trying to
analyze various types of posts through this project.
NEGATIVE SENTIMENTS
These are the bad words about the target in deliberation. If the negative sentiments
are increased, it is discarded from the optional list. In case of commodity reviews, if the
negative reviews about the commodities are more, no one intend to buy it.
POLARITY SHIFT
Polarity shift is a kind of linguistic circumstance which can reverse the sentiment
polarity of the text. Negation is the most essential type of polarity shift. For example, by
adding a negation word “don’t” to a positive text “I like this book” since the word “like”,
the sentiment of the text will be reversed from positive to negative. Anyhow, the two
sentiment-opposite texts are acknowledged to be very similar by the BOW representation.
The main reason why standard machine learning algorithms often decline under the
circumstance of polarity shift. Several methods have been proposed in the literature to
indicate the polarity shift problem.
1.3.9LEXICAL DICTIONARY
In the languages where lexical resources are abundant, a straightforward way is to get
the antonym dictionary directly from the well-defined lexicons, such as WordNet in English.
WordNet is a lexical database which groups English words into sets of synonyms called
5
synsets, provides short, general definitions, and records the various semantic relations
between these synonym sets. Using the antonym it is possible to obtain the words and their
opposites. The WordNet antonym dictionary is simple and direct. However, in many
languages other than English, such an antonym dictionary may not be readily available. Even
if we can get an antonym dictionary, it is still hard to guarantee vocabularies in the dictionary
are domain consistent with our tasks. To solve this problem, we furthermore develop a corpus-
based method to construct a pseudo-antonym dictionary. This corpus-based pseudo-antonym
dictionary can be learnt using the labeled training data only. The basic idea is to first use
mutual information to identify the most positive-relevant and the most negative-relevant
features, rank them in two separate groups, and pair the features that have the same level of
sentiment strength as pair of antonym words.
6
CHAPTER - II
SYSTEM STUDY AND SPECIFICATION
7
CHAPTER - II
SYSTEM STUDY AND SPECIFICATION
2.2PROPOSED SYSTEM
In this paper, we propose a simple yet efficient model, called dual sentiment analysis
(DSA), to address the polarity shift problem in sentiment classification. By using the
property that sentiment classification has two opposite class labels (i.e., positive and
negative), we first propose a data expansion technique by creating sentiment reversed
reviews. The original and reversed reviews are constructed in a one-to-one correspondence.
Thereafter, we propose a dual training (DT) algorithm and a dual prediction (DP)
algorithm respectively, to make use of the original and reversed samples in pairs for training
a statistical classifier and make predictions. In DT, the classifier is learnt by maximizing a
combination of likelihoods of the original and reversed training data set. In DP, predictions
are made by considering two sides of one review. That is, we measure not only how
positive/ negative the original review, but also how negative/ positive the reversed review.
8
We further extend our DSA framework from polarity (positive vs. negative)
classification to 3-class (positive vs. negative vs. neutral) sentiment classification, by taking
the neutral reviews into consideration in both dual train in and dual prediction. To reduce
DSA’s dependency on an external antonym dictionary, we finally develop a corpus-based
method for constructing a pseudo-antonym dictionary. The pseudo antonym dictionary is
language-independent and domain- adaptive. It makes the DSA model possible to be applied
into a wide range of applications.
When a user posting an article using post button it checks whether it’s sentiments is
positive or negative by clicking itself. If it is negative , it will be terminated otherwise posted
on the wall. if a user try to insert an article about another user using @tag , a notification is
going to that person whose id is following the @tag. When a third person commented to that
post a notification is going to both one who posted that article and also the person whom the
article represents.
ADVANTAGES:
Allow positive reviews and block negative reviews.
We can change negative reviews.
Notification for both negative and positive reviews and comments.
9
2.3 SOFTWARE SPECIFICATION
Operating system : Windows 7 Ultimate.
Coding Language : ASP.Net with C#.
Front-End : Visual Studio 2012 Professional.
Data Base : SQL Server 2008.
Design Language : HTML, JavaScript.
2.4HARDWARE SPECIFICATION
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Floppy Drive : 1.44 Mb.
Monitor : 14’ Color Monitor.
Mouse : Optical Mouse.
Ram : 512 Mb.
10
CHAPTER - III
DESIGN AND DEVELOPMENT
11
CHAPTER – III
DESIGN AND DEVELOPMENT
12
3.1.3 COMMENT
3.1.4MESSAGE
13
3.2 DATA FLOW DIAGRAM
Level 0:
SENTIMENTALA
User name NALYSIS OF user name
Admin USER’S User
REVIEWS AND
User name COMMENTS ON user name
SOCIAL MEDIA
14
LEVEL1 OF USER:
Register
User user
View Login
Log Search
Friend
Manage
comment
Profile
log Managemen
t
Manage
comment Friend
Message
Request
Friend
View
notificatio
Post n
review
Friend Message
Abuse
Photo Report
Upload
Request Abuse
Photo Gallery
15
LEVEL 1 OF ADMIN:
BLOCK
USER
CHANGE
VIEW PASSWORD
VIEW ABUSE
LOG REPORT
USER
LOG ABUSE
16
LEVEL 2 REGISTRATION
u_id
us_name
us_pwd
REGISTRATION
name_user AND User
LOGIN
personal_info
Place
Address
Fig3.2.4.Data Flow Diagram level2 For Registration
LEVEL 2 COMMENT
cmnt_id
post_cmnt
COMMENT
Comment
photo_id
user_id
cmnt_rslt
17
LEVEL 2 REVIEW
url
Status
share_with
u_id
REVIEW
Review
person_on_post_id
art_cont
ent
art_reslt
Fig3.2.6.Data Flow Diagram level2 Forreview
LEVEL 2 MESSAGE
Msg_id
MESSAGE
U_id Message
Friend_id
Dat_tdy
message
18
3.3 ENTITY RELATIONSHIP DIAGRAM
url u_id
message ab_id
pwd u_name u_id
us_name
manage abuse
has
N us_pwd
admin
1 by_u_id user
ab_datetime
1 name_
user
manage
address
contact
a_id
view log has
place
log_id block_user_id
has
manag has
view have e
u_id u_id
fr_id
status post_
fr_id
cmnt
status
Share user_id
_with
message url
u_id
photo_id
u_id
dat_tdy friend_id req_id art_rslt
cmnt_id
19
3.4SYSTEM ARCHITECTURE
POST
User
Dual prediction
Admin
20
Negative Word
Positive Post
Post features
Training set
Feature
extractor
Post
Classifier
Positive
Negative
21
3.5 TABLE DESIGN
3.5.1 PHOTO_GALLERY
Field Data type Definition Constrains
3.5.2 TBL_ADMIN
Field Data type Definition Constrain
a_id Int Id of admin Primary Key
u_name varchar(50) Username of admin Not null
Pwd varchar(50) Password Not null
3.5.3 TBL_ABUSE
Field Data type Definition Constrain
ab_id Int Abuse id Primary Key
u_id Int Abused user id Not Null
by_u_id Int Abuser id Not Null
message varchar(50) Abused message Not Null
ab_datetime Datetime Abused date time Not Null
22
3.5.4 TBL_REQUEST
Field Data type Definition Constrain
req_id Int Request id Primary key
u_id Int User id Not Null
to_id Int Requested user id Not Null
Command varchar(50) Command to the Not Null
user
Status Int Not Null
3.5.5 TBL_COMMENTS
Field Data type Definition Constrain
cmnt_id Int id of Comment Primary Key
post_cmnt Text Command Not Null
photo_id Int Post/photo id Not Null
user_id Int Id of user Not Null
cmnt_rslt varchar(50) Command result Not Null
3.5.6 TBL_FRIEND
Field Data type Definition Constrain
3.5.7 TBL_LOG
Field Data type Definition Constrain
23
3.5.8 TBL_MESSAGE
Field Data type Definition Constrain
3.5.9 TBL_USER
Field Data type Definition Constrain
u_id Int User id Primary Key
us_name varchar(50) Username of user Not Null
account
us_pwd varchar(50) Password of user Not Null
account
name_user varchar(50) Name of the user Not Null
Contact varchar(50) Phone number Not Null
personal_info varchar(50) Personal details Not Null
Address Text Address of user Not Null
Place varchar(50) Place of user Not Null
url varchar(50) User photo url Not Null
Status Int status Not Null
24
CHAPTER - IV
CODING AND DEPLOYMENT
25
CHAPTER – IV
CODING AND DEPLOYMENT
User_home.aspx.cs
using System;
usingSystem.Collections.Generic;
usingSystem.Linq;
usingSystem.Web;
usingSystem.Web.UI;
usingSystem.Web.UI.WebControls;
usingSystem.Data;
publicpartialclassUser_user_home : System.Web.UI.Page
{ dbcondb = newdbcon();
protectedvoidPage_Load(object sender, EventArgs e)
{ if (!IsPostBack)
{ fill();
// getArticle();
upload_Photo();
btnDelet();
DataTabledt = db.getdatatable("select * from tbl_friend where u_id=" + Session["usr_id"]+"
and status=1");
if (dt.Rows.Count> 0)
{ lbl_frnds.Text = "Friends" + dt.Rows.Count; }
else
{ lbl_frnds.Text = "0 Friends"; } } }
publicvoid fill()
{ DataTabledt = db.getdatatable("select * from tbl_user where u_id=" + Session["usr_id"]);
lbl_name.Text = dt.Rows[0]["name_user"].ToString();
lbl_adrs.Text = dt.Rows[0]["address"].ToString();
lbl_phn.Text = dt.Rows[0]["contact"].ToString();
lbl_plac.Text = dt.Rows[0]["place"].ToString();
Image1.ImageUrl = "../assets/example/" + dt.Rows[0]["url"].ToString();
// Image1.ImageUrl = "../images/unnamed.png" ;
}
publicvoidupload_Photo()
{
stringuser_id = Session["usr_id"].ToString();
if (dt.Rows.Count> 0)
26
{ DataList1.DataSource = dt;
DataList1.DataBind();
}}
protectedvoidbtn_upload_Click(object sender, EventArgs e)
{ Response.Redirect("photo_upload.aspx"); }
protectedvoidbtn_report_Command(object sender, CommandEventArgs e)
{ Response.Redirect("abuse.aspx?val="+e.CommandArgument.ToString()); }
protectedvoidbtn_delet_Command(object sender, CommandEventArgs e)
{ stringstr = e.CommandArgument.ToString();
string[] str2;
str2 = str.Split(';');
string q = "delete photo_gallery where photo_id=" + str2[1] + "";
int n = db.Ins_Up_Del(q);
if (n > 0)
{
upload_Photo();
btnDelet();
} }
publicvoidbtnDelet()
{ foreach (DataListItem item in DataList1.Items)
{
Buttonbtn = item.FindControl("btn_delet") asButton;
stringstr = btn.CommandArgument;
string[] str2 ;
str2 = str.Split(';');
if (str2[0] == Session["usr_id"].ToString())
{ btn.Visible = true; } } }
protectedvoidbtn_post_Click(object sender, EventArgs e)
{ Response.Redirect("add_articles.aspx"); } }
Add_articles.aspx.cs
using System;
usingSystem.Collections.Generic;
usingSystem.Linq;
usingSystem.Web;
usingSystem.Web.UI;
usingSystem.Web.UI.WebControls;
usingSystem.Data;
using System.Net;
using System.IO;
usingNewtonsoft.Json;
usingNewtonsoft.Json.Linq;
publicpartialclassUser_user_comments : System.Web.UI.Page
{
dbcondb = newdbcon();
staticstringart_reslt = "";
// txt_comnt.Text = "Your photo is good " +" \n "+"Change your photo" + "\n" +"photo can
be better";
}
}
protectedvoidbtn_submit_Click(object sender, EventArgs e)
{ if (txt_titl.Text != ""&&txt_comnt.Text != "")
{
//
Response.Redirect("https://api.uclassify.com/v1/uClassify/Sentiment/classify/?readKey=Moiw
yl1rKteB&text="+txt_comnt.Text+ "");
doubleneg = Convert.ToDouble(str);
doublepos = Convert.ToDouble(str2);
if (pos>neg)
{
art_reslt = "positive";
lbl_msg.Text = str + "<br>" + str2 + "positive";
}
else
{
28
art_reslt = "Negative";
lbl_msg.Text = str + "<br>" + str2 + "Negative";
}
// checking @
stringmsg = txt_comnt.Text;
string[] at_rate = msg.Split('@');
intlen = at_rate.Length;
if (len == 1)
{
insert_articl();
}
else
{
string msg2 = at_rate[1];
string[] strn = msg2.Split(' ');
string msg3 = strn[0];
if (art_reslt == "Negative")
{
lbl_msg.Text = "Negative post about a person is not allowed here";
}
else
{ insert_articl();
}}
// }
else
{
ScriptManager.RegisterStartupScript(this, typeof(Page), "alert", "alert('Fields Can Not Be
Empty');", true);
}
}
publicvoidinsert_articl()
{
stringqry = "insert into photo_gallery (u_id,art_content,ph_name,art_reslt) values(" +
Session["usr_id"] + ",'" + txt_comnt.Text + "','" + txt_titl.Text + "','" + art_reslt + "')";
int n = db.Ins_Up_Del(qry);
if (n > 0)
{
lbl_msg.Text = "Successfully Added";
txt_comnt.Text = "";
txt_titl.Text = "";
}
else
{
lbl_msg.Text = "Insertion failed";
}}}
29
Notification.aspx.cs
using System;
usingSystem.Collections.Generic;
usingSystem.Linq;
usingSystem.Web;
usingSystem.Web.UI;
usingSystem.Web.UI.WebControls;
usingSystem.Data;
publicpartialclassUser_notifications : System.Web.UI.Page
{
dbcondb = newdbcon();
if (!IsPostBack)
{
fill();
publicvoid fill()
{
// DataTable dt1 = db.getdatatable("select r.* from tbl_rules r inner join tbl_abusea on
r.allow_user_id = a.by_u_id where r.u_id=" + Session["usr_id"]);
if (dt.Rows.Count> 0)
{
lbl_notif.Visible = false;
GridView1.DataSource = dt;
GridView1.DataBind();
else
{
lbl_notif.Visible = true;
}
protectedvoid Button1_Command(object sender, CommandEventArgs e)
30
{
string q = "delete tbl_abuse where ab_id="+e.CommandArgument.ToString();
int n = db.Ins_Up_Del(q);
if (n > 0)
{
}
}
Abuse.aspx.cs
using System;
usingSystem.Collections.Generic;
usingSystem.Linq;
usingSystem.Web;
usingSystem.Web.UI;
usingSystem.Web.UI.WebControls;
usingSystem.Data;
publicpartialclassUser_abuse : System.Web.UI.Page
{
dbcondb = newdbcon();
protectedvoidPage_Load(object sender, EventArgs e)
{
}
protectedvoidbtn_snd_Click(object sender, EventArgs e)
{
stringstr = Request.QueryString["val"];
if (n > 0)
{
txt_msg.Text = "";
31
CHAPTER – V
TESTING AND IMPLEMENTATION
32
CHAPTER – V
TESTING AND IMPLEMENTATION
INTRODUCTION
The most important phase in system development life cycle is system testing. The
number and nature of errors in a newly designed system depends on the system specifications
and the time frame given for the design.
A newly designed system should have all the subsystems working together, but in reality
each subsystems work independently. During this phase, all the subsystems are gathered into
one pool and tested to determine whether it meets the user requirements.
Testing is done at two level -Testing of individual modules and testing the entire system.
During the system testing, the system is used experimentally to ensure that the software will
run according to the specifications and in the way the user expects. Each test case is designed
with the intent of finding errors in the way the system will process it.
Testing plays a very critical role in determining the reliability and efficiency of software
and hence is a very important stage in software development. Software testing is done at
different levels. They are the unit testing and system testing which comprises of integration
testing and acceptance testing.
33
Integration Testing
In integration testing, the tested modules are combined into sub-systems, which are then
tested. The goal of integration testing to check whether the modules can be integrated properly
emphasizing on the interfaces between modules. The different modules were linked together
and integration testing done on them.
Validation Testing
The objective of the validation test is to tell the user about the validity and reliability of
the system. It verifies whether the system operates as specified and the integrity of
important data is maintained. User motivation is very important for the successful performance
of the system.
All the modules were tested individually using both test data and live data. After each
module was ascertained that it was working correctly and it had been "integrated" with the
system. Again the system was tested as a whole. We hold the system tested with different
types of users. The System Design, Data Flow Diagrams, procedures etc. were well
documented so that the system can be easily maintained and upgraded by any computer
professional at a later.
System Testing
The integration of each module in the system is checked during this level of testing. The
objective of system testing is to check if the software meets its requirements. System testing
is done to uncover errors that were not found in earlier tests. This includes forced system
failures and validation of total system as the user in the operational environment implements
it. Under this testing, low volumes of transactions are generally based on live data. This
volume is increased until the maximum level for each transactions type is reached. The total
system is also tested for recovery after various major failures to ensure that no data are lost
during the breakdown.
34
5.2 SYSTEM IMPLEMENTATION
5.2.1IMPLEMENTATION PROCEDURES
Implementation is the most crucial stage in achieving a successful system and giving the
user’s confidence that the new system is workable and effective. Implementation of a
modified application to replace an existing one. This type of conversation is relatively easy to
handle, provide there are no major changes in the system.
Each program is tested individually at the time of development using the data and has
verified that this program linked together in the way specified in the programs specification,
the computer system and its environment is tested to the satisfaction of the user. The system
that has been developed is accepted and proved to be satisfactory for the user. And so the
system is going to be implemented very soon. A simple operating procedure is included so
that the user can understand the different functions clearly and quickly.
Initially as a first step the executable form of the application is to be created and loaded in
the common server machine which is accessible to all the user and the server is to be
connected to a network. The final stage is to document the entire system which provides
components and the operating procedures of the system.
35
5.3 USER TRAINING
Install visual studio 2012 on your computer.
Run the project in local host.
Click the signup button for registration, after successful registration login to the social account
using your username and password.
If you are forget the password, then you can click on forget password youwill get that on your
e-mail.
You can see different options in your account like home,profile,friend,request,message
andblock/unblock etc.
The home page is same for every user. You can see post button in the home page. Click the
post button. Now you can see the space for write article. Use @ symbol for mention other
user.Then press submit button.
If you write a positive review then it will uploaded on the home page. A notification is going
to that mentioned user.
If you write a too negative article which breaks others privacy then it will not posted.A
notification will also going to that one.
Others can comment to the post.For both negative and positive comments notification is going
to the user.
In the profile part you can add a profile picture and update the profile.
You can search a person on the search box and can send friend request,also you can see
requests from other users in the request part,and accept the request.
You can block/unblock and unfriend a friend.
The message part is for chat purpose with your friends.
You can logout the account by clicking logout button.
If you are not interested being a member, you can deactivate that account.
36
5.4 FINAL TEST CASE REPORT OF ALL MODULES
Test_ID Test Description Test steps Excepted Actual Status
output output
TC-01 Enter registration 1.Enter The user is Same as EO Success
details to sign up registrationdetails registered and
shown
2.click on sign up successfully
registered
3.click on login
button
TC-04 Enter username 1.Enter username A pop up Same as EO Success
and / or password and password message box to
invalid invalid or enter show an invalid
username or username
password invalid orpassword
2. click on login
button
Click search
button
TC-07 Find a friend Enter invalid user An alert shown Same as EO Success
name as friend Could not find
name on search name
box
37
Click search
button
TC-08 Send friend Search friend Friend request Same as EO Success
request user name send
Successfully
Click add friend
TC-09 Accept a person Click on request An alert shown Same as EO Success
as a friend You are friends
Click on accept now
TC-10 Block a friend Click on friend Blocked alert Same as EO Success
Click on block
button
TC-11 unfriend a friend Click on friend Unfriended Same as EO Success
successfully
Click on unfriend
TC-12 Post a review Click on post Successfully Same as EO Success
review is added
Write article to home page.
Notification
Click on submit isgoing to the
user thepost
about whom
38
to the system
Click send
TC-19 View a message Click on The messages Same as EO Success
messages are shown
Click on view
messages
TC-20 Deactivate Click on The account is Same as EO Success
account deactivate deactivated
permanently
Click on
conformation
TC-21 Logout from an Click on logout The login page Same as EO Success
account is shown
39
CHAPTER - VI
SYSTEM MAINTENANCE
40
CHAPTER - VI
SYSTEM MAINTENANCE
System Maintenance changes the existing system, enhancement adds features to the
existing system, and development replaces the existing system. It is an important part of system
development that includes the activities which corrects errors in system design and
implementation, updates the documents, and tests the data.
In this Project the after the system design and implementation is done, maintaining the
activities and process done in the new system.
The following are the system maintenance process in this project:
Collecting Errors.
Checking whether the project meets user’s requirements.
Testing with sample data.
Documenting the manual.
Update the process in the existing system.
Hardware and Software Maintenance.
41
CHAPTER -VII
CONCLUSION /SCOPE FOR FUTURE
ENHANCEMENT / BIBLIOGRAPHY
42
CHAPTER – VII
CONCLUSION
The “SENTIMENTAL ANALYSIS OF USER’S REVIEWS AND COMMENTS
ON SOCIAL MEDIA” is developed using c# with ASP.Net. It fully meets the objective of
the proposed system which it have been developed. The system has reached a steady state
where all the bugs have been eliminated. The system is operated at a high level of efficiency
and all the teachers and the users associated with the system understand its advantages.
Online social networks help people to socialize with the world. But users should be
aware of threats that can be faced due to lack of proper privacy settings. In this paper a novel
method for collaborative sharing of data in OSNs is discussed as well as a method to resolve
privacy conflicts that can occur while multiple persons share a data. Evaluation results show
that privacy risk and data sharing loss are minimized in this approach. Various websites offer
services such as uploading, hosting, and managing for photo-sharing (publicly or privately).
These functions are provided by websites and applications that facilitate the upload and
display of images. The term may even be useful for online photo galleries that are positioned
up and managed by individual users, including photo blogs.
In this work, we propose a novel data expansion approach, called dual sentiment
analysis (DSA), to address the polarity shift problem in sentiment classification. The basic
idea of DSA is to create reversed reviews that are sentiment-opposite to the original reviews,
and make use of the original and reversed reviews in pairs to train a sentiment classifier and
make predictions. DSA is highlighted by the technique of one-to-one correspondence data
expansion and the manner of using a pair of samples in training (dual training) and prediction
(dual prediction).A wide range of experiments demonstrate that the DSA model is very
effective for polarity classification and it significantly outperforms several alternative methods
of considering polarity shift. In addition, we strengthen the DSA algorithm by developing a
selective data expansion technique that choosestraining reviews with higher sentiment degree
for data expansion. The experimental results show that using a selected part of training
reviews for data expansion can yield better performance than that using all reviews.
43
SCOPE FOR FUTURE ENHANCEMENT
44
BIBLIOGRAPHY
BOOK REFERENCES
“Dual Sentiment Analysis: Considering Two Sides of One Review”,Rui Xia, FengXu,
ChengqingZong, Qianmu Li, Yong Qi, and Tao Li ,IEEE Transactions on Knowledge
and Data Engineering DOI 10.1109/TKDE.2015.2407371.
“Principles of Software Engineering”. RohitKhurna,vikas publishing ,2014.
”Review of Dual Sentiment Analysis”Bhagyashri Ramesh Jadhav,
ManjushriMahajanInternational Journal of Science and Research (IJSR) 2013.
”Sentiment Analysis For Two Sides Of Reviews Using Dual Prediction
Algorithm”G.GraceRanjitham, S.Mohana, B.Vinothini , IJARTET, 2016.
WEBSITES REFERENCES
45
ANNEXURES
46
OUTPUT DESIGN
POST
NOTIFICATION
47
SCREEN SHOTS OF EXECUTED RESULTS
WRITING REVIEW
48
COMMENTING TO THE POST
POSTED REVIEW
49
NOTIFICATION TO THE USER
ADMIN
50
MANAGING USER
ABUSE REPORT
VIEW LOG
51
ABBREVIATIONS
DT DUAL TRAINING
DP DUAL PREDICTION
52