Open Access   Article Go Back

Real Time Extraction and Processing of Social Tweets

B. M. Bandgar1 , Binod Kumar2

Section:Research Paper, Product Type: Journal Paper
Volume-3 , Issue-3 , Page no. 1-6, Mar-2015

Online published on Mar 31, 2015

Copyright © B. M. Bandgar , Binod Kumar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: B. M. Bandgar , Binod Kumar, “Real Time Extraction and Processing of Social Tweets,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.3, pp.1-6, 2015.

MLA Style Citation: B. M. Bandgar , Binod Kumar "Real Time Extraction and Processing of Social Tweets." International Journal of Computer Sciences and Engineering 3.3 (2015): 1-6.

APA Style Citation: B. M. Bandgar , Binod Kumar, (2015). Real Time Extraction and Processing of Social Tweets. International Journal of Computer Sciences and Engineering, 3(3), 1-6.

BibTex Style Citation:
@article{Bandgar_2015,
author = {B. M. Bandgar , Binod Kumar},
title = {Real Time Extraction and Processing of Social Tweets},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2015},
volume = {3},
Issue = {3},
month = {3},
year = {2015},
issn = {2347-2693},
pages = {1-6},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=410},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=410
TI - Real Time Extraction and Processing of Social Tweets
T2 - International Journal of Computer Sciences and Engineering
AU - B. M. Bandgar , Binod Kumar
PY - 2015
DA - 2015/03/31
PB - IJCSE, Indore, INDIA
SP - 1-6
IS - 3
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
2910 2639 downloads 2565 downloads
  
  
           

Abstract

Twitter has become one of the most popular micro-blogging platforms recently. Millions of users can share their thoughts and opinions about different aspects and events on the micro-blogging platform. Therefore, Twitter is considered as a rich source of information for decision making and sentiment analysis. Obtaining the real time tweets on the particular topic is one of the challenging tasks. There are numbers of related publications, but which have limitations; also their methods are not much clear and mostly based on Linux based system and uses integrated tools, which is most complex job. Therefore, in this research paper we develop the indigenous Windows based user friendly application in Java to extract, process and classify the real time social network tweet. The tweets are processed for removal of hash, tags and URL and removed the stop words from sentence and tried to detect, analyze the abbreviations or slangs. The meaningful real time tweets are obtained and used for sentimental analysis.

Key-Words / Index Term

Extraction Of Realtime Tweets, Processing Tweets

References

[1]. Farhan Hassan Khan et. al. , TOM: Twitter opinion mining framework using hybrid classification scheme, Decision Support Systems, 2013, http://dx.doi.org/
[2]. 10.1016/j.dss.2013.09.004
[3]. A. Bifet, E. Frank, Sentiment Knowledge Discovery in Twitter Streaming Data,, Springer-Verlag, Berlin, Heidelberg, 2010, pp. 1–15.
[4]. A. Bifet, G. Holmes, B. Pfahringer, MOA-Tweet Reader: real-time analysis in twitter, streaming data, in: T. Elomaa, J. Hollm'en, H. Mannila (Eds.), DS 2011, LNCS 6926, Springer-Verlag, Berlin Heidelberg, 2011, pp. 46–60.
[5]. Argamon S., Bloom K., Esuli A., Sebastiani F., Automatically determining attitude type and force for sentiment analysis, in: Vetulani Z., Uszkoreit H. (Eds.), LTC2007, LNAI 5603, Springer-Verlag, Berlin Heidelberg, 2009, pp. 218–231.
[6]. Fu X., Guo Y., Guo W., Wang Z., et al., Aspect and sentiment extraction based oninformation-theoretic co-clustering, in: Wang J., Yen G.G., Polycarpou M.M.(Eds.),ISNN 2012, Part II, LNCS 7368, Springer-Verlag, Berlin, Heidelberg, 2012, pp. 326–335.
[7]. Lambodar Jena, Narendra Kumar Kamila, Data Extraction and Web page Categorization using Text Mining, IJAIEM, ISSN 2319 – 4847, Volume 2, Issue 6, June 2013
[8]. https://api.twitter.com/
[9]. https://dev.twitter.com/
[10]. http://search.twitter.com/search.format
[11]. http://ravikiranj.net/drupal/201205/code/machine-learning/how-build-twitter-sentiment-analyzer
[12]. J. Pasternack and D. Roth. Extracting article text from the web with maximum subsequence segmentation. In WWW '09: Proceedings of the 18th international conference on World Wide Web, page 1971{980, New York, NY, USA, 2010. ACM
[13]. Georgios Petasis1,2, Dimitrios Petasis1. BlogBuster: A tool for extracting corpora from the blogosphere. Software and Knowledge Engineering Laboratory National Centre for Scientific Research (N.C.S.R.) “Demokritos”, Athens, Greece, 2010.
[14]. Baroni, M., Chantree, F., Kilgarri, A., Sharo, S. (2008). Cleaneval: a competition for cleaning web pages. In Proceedings of the 4th Web as Corpus Workshop (WAC4), - Can we beat Google?. N. Calzolari, K. Choukri, B.Maegaard, J. Mariani, J. Odjik, S. Piperidis, and D. Tapias, editors, Proceedings of the 6th International Language Resources and Evaluation (LREC 2008). Marrakech, Morocco, 2008
[15]. S. Evert. A lightweight and ecient tool for cleaning web pages. In N. Calzolari, K. Choukri, B. Maegaard, J. Mariani, J. Odjik, S. Piperidis, and D. Tapias, editors, Proceedings of the Sixth International Language Resources and Evaluation (LREC'08), Marrakech, Morocco, may 2008. European Language Resources Association (ELRA). http://www.lrec-conf.org/proceedings/lrec2008/N.B. Salem, and J-P Hubaux, “Securing Wireless Mesh Networks”, IEEE Wireless Communications, Vol.13, Issue-2, 2006, pp.50-55.
[16]. S. Han, E. Chang, L. Gao, T. Dillon, T., Taxonomy of Attacks on Wireless Sensor Networks, in the Proceedings of the 1st European Conference on Computer Network Defence (EC2ND), University of Glamorgan, UK, Springer Press, SpringerLink Date: December 2007.
[17]. C. Karlof and D. Wagner, “Secure routing in wireless sensor networks: attacks and countermeasures,” Ad Hoc Networks 1, 2003, pp. 293-315.
[18]. Y. Yang, Y. Gu, X. Tan and L. Ma, “A New Wireless Mesh Networks Authentication Scheme Based on Threshold Method,” 9th International Conference for Young Computer Scientists (ICYCS-2008), 2008, pp. 2260-2265