Real Time Extraction and Processing of Social Tweets
Keywords:
Extraction Of Realtime Tweets, Processing TweetsAbstract
Twitter has become one of the most popular micro-blogging platforms recently. Millions of users can share their thoughts and opinions about different aspects and events on the micro-blogging platform. Therefore, Twitter is considered as a rich source of information for decision making and sentiment analysis. Obtaining the real time tweets on the particular topic is one of the challenging tasks. There are numbers of related publications, but which have limitations; also their methods are not much clear and mostly based on Linux based system and uses integrated tools, which is most complex job. Therefore, in this research paper we develop the indigenous Windows based user friendly application in Java to extract, process and classify the real time social network tweet. The tweets are processed for removal of hash, tags and URL and removed the stop words from sentence and tried to detect, analyze the abbreviations or slangs. The meaningful real time tweets are obtained and used for sentimental analysis.
References
. Farhan Hassan Khan et. al. , TOM: Twitter opinion mining framework using hybrid classification scheme, Decision Support Systems, 2013, http://dx.doi.org/
. 10.1016/j.dss.2013.09.004
. A. Bifet, E. Frank, Sentiment Knowledge Discovery in Twitter Streaming Data,, Springer-Verlag, Berlin, Heidelberg, 2010, pp. 1–15.
. A. Bifet, G. Holmes, B. Pfahringer, MOA-Tweet Reader: real-time analysis in twitter, streaming data, in: T. Elomaa, J. Hollm'en, H. Mannila (Eds.), DS 2011, LNCS 6926, Springer-Verlag, Berlin Heidelberg, 2011, pp. 46–60.
. Argamon S., Bloom K., Esuli A., Sebastiani F., Automatically determining attitude type and force for sentiment analysis, in: Vetulani Z., Uszkoreit H. (Eds.), LTC2007, LNAI 5603, Springer-Verlag, Berlin Heidelberg, 2009, pp. 218–231.
. Fu X., Guo Y., Guo W., Wang Z., et al., Aspect and sentiment extraction based oninformation-theoretic co-clustering, in: Wang J., Yen G.G., Polycarpou M.M.(Eds.),ISNN 2012, Part II, LNCS 7368, Springer-Verlag, Berlin, Heidelberg, 2012, pp. 326–335.
. Lambodar Jena, Narendra Kumar Kamila, Data Extraction and Web page Categorization using Text Mining, IJAIEM, ISSN 2319 – 4847, Volume 2, Issue 6, June 2013
. http://search.twitter.com/search.format
. http://ravikiranj.net/drupal/201205/code/machine-learning/how-build-twitter-sentiment-analyzer
. J. Pasternack and D. Roth. Extracting article text from the web with maximum subsequence segmentation. In WWW '09: Proceedings of the 18th international conference on World Wide Web, page 1971{980, New York, NY, USA, 2010. ACM
. Georgios Petasis1,2, Dimitrios Petasis1. BlogBuster: A tool for extracting corpora from the blogosphere. Software and Knowledge Engineering Laboratory National Centre for Scientific Research (N.C.S.R.) “Demokritos”, Athens, Greece, 2010.
. Baroni, M., Chantree, F., Kilgarri, A., Sharo, S. (2008). Cleaneval: a competition for cleaning web pages. In Proceedings of the 4th Web as Corpus Workshop (WAC4), - Can we beat Google?. N. Calzolari, K. Choukri, B.Maegaard, J. Mariani, J. Odjik, S. Piperidis, and D. Tapias, editors, Proceedings of the 6th International Language Resources and Evaluation (LREC 2008). Marrakech, Morocco, 2008
. S. Evert. A lightweight and ecient tool for cleaning web pages. In N. Calzolari, K. Choukri, B. Maegaard, J. Mariani, J. Odjik, S. Piperidis, and D. Tapias, editors, Proceedings of the Sixth International Language Resources and Evaluation (LREC'08), Marrakech, Morocco, may 2008. European Language Resources Association (ELRA). http://www.lrec-conf.org/proceedings/lrec2008/N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
. S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
. Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
