SlideShare une entreprise Scribd logo
1  sur  24
A Fuzzy Approach For Multi-Domain
Sentiment Analysis
Mauro Dragoni
Fondazione Bruno Kessler (FBK), Shape and Evolve Living Knowledge Unit (SHELL)
https://shell.fbk.eu/index.php/Mauro_Dragoni - dragoni@fbk.eu
work done in collaboration with
Prof. Andrea G.B. Tettamanzi and Prof. Celia da Costa Pereira
INRIA Sophia Antipolis
June, 19th 2014
Outline
1. Background on Sentiment Analysis and Fuzzy Logic
2. Motivations
3. The Approach
4. Evaluation of the Implemented System
Sentiment Analysis - 1
 Natural Language Processing task for identifying the opinion given by
someone with respect to something.
 Opinions may be positive, negative, or neutral.
 The value associated with the opinion is called “polarity”.
Sentiment Analysis - 2
 Basic challenges:
 Identification of the polarities for each term in the text.
 Deciding how to aggregate the different polarities.
 Advanced challenges:
 Identification of the entities in each sentence (subjects).
 Identification of the features describing each entity.
 Adaptation of the sentiment model to different domain.
 Manage the uncertainty of each learned information within the single domain
Fuzzy Logic
 Allows to represent imprecise information.
 With respect to classical logic, truth-values of assertions may assume all
values in the interval [0, 1]
 The main element of the fuzzy logic are Fuzzy Sets
Hot temperature.
x
y
Motivations - 1
 The same concept may have different polarities in different domains.
 The polarity associating a concept to a domain may be uncertain due to
the different contexts in which it is used.
Motivations - 2
 The assignment of a unique polarity value to the entire text leads to
imprecise information.
 In the same text, different aspects have to be analyzed.
 A significant concept extraction capability is required.
“I bought a new smartphone: the screen is awesome, even if some
colors are not very brilliant, but the battery is too short”
The Approach
 Creation of the knowledge base.
 Concept extraction.
 Learning of the preliminary sentiment information.
 Propagation of the learned information through the knowledge graph.
 Modeling of the fuzzy shapes.
Creation of the Knowledge Base
 Based on the integration of WordNet with SenticNet
 WordNet has been enriched with terms extracted from the Roget’s
Thesaurus
 The links between WordNet and SenticNet have been built by taking into
account the synonyms of each WordNet synset and the synonyms of each
SenticNet concept.
 In order to avoid ambiguities not all associations have been created.
 Example: concept “base”
WordNet: 20 senses (for the noun)
SenticNet: base (beneath, below, understructure)  WordNet sense 2
Concept Extraction - 1
 Two samples:
1. Today I went to the mall and bought some desserts and a lot of very nice
Christmas gifts.
2. The touchscreen is awesome but the battery is too short.
Concept Extraction - 2
Multi-Domain Fuzzy Propagation - 1
 Polarity information is propagated through the knowledge base by using
an algorithm implementing the simulated annealing strategy.
 The propagation of the values is driven by three parameters: annealing
rate, propagation rate, and convergence limit.
 The intermediate polarity values measured on each concept at the end of
each iteration are stored in order to build the final fuzzy shape associated
with each combination concept-domain.
 A different model is learned for each domain.
Multi-Domain Fuzzy Propagation - 2
Domain Initialization:
Information Propagation:
Stop Condition:
Multi-Domain Fuzzy Propagation - 3
 Trade-offs:
 high propagation rate  risk of polarity convergence
 low convergence limit  risk of polarity convergence
 lower propagation rate  incomplete graph
 high annealing rate  premature stop of the algorithm
 high convergence limit  premature stop of the algorithm
Multi-Domain Fuzzy Propagation - 4
Modeling of Fuzzy Shapes - 1
Value computed from the
training set.
Value obtained after the
propagation phase.
Support computed based on the
variance value.
Modeling of Fuzzy Shapes - 2
Type 1 level of uncertainty: the core
of the fuzzy trapezoid crosses the
neutral polarity
Type 2 level of uncertainty: only the
support of the fuzzy trapezoid crosses
the neutral polarity
Evaluation of the System - 1
 Evaluation on the Blitzer dataset:
 25 domains
 ~3000 reviews for each domain in the balanced dataset
 75% of instances for the training, 25% for the validation
 Three baselines: SVM, Max-Entropy, and Naïve-Bayes
 Compared the performance by discarding the different levels of uncertainty
 Evaluation on:
 Elementary Polarity Computation
 Concept Extraction + Polarity Computation
Evaluation of the System - 2
 How fuzzy polarities are aggregated?
x
Evaluation of the System - 3
Evaluation of the System - 4
Approach Avg. Precision Avg. Recall
SVM 0.8068 1.0
Naïve-Bayes 0.8227 1.0
Max-Entropy 0.8225 1.0
MDFSA 0.8617 ~ 1.0
MDFSA
(Type 1 Uncertainty excluded)
0.8735 ~ 0.7
MDFSA
(Type 1 & 2 Uncertainty excluded)
0.8991 ~ 0.5
Elementary Polarity Computation:
Evaluation of the System - 5
Approach Precision Recall F-Measure
MDFSA 0.25 0.26 0.25
IBM 0.24 0.14 0.18
UNI-NEGEV 0.12 0.05 0.07
Concept Extraction + Polarity Computation (ESWC 2014 Challenge):
Future Work
 Integration of more knowledge bases into the system.
 Improve how ambiguities are addressed.
 Improve the concept extraction module.
 Extending the approach for addressing multilingualism.
 Apply the approach to the social network environment.
Mauro Dragoni
https://shell.fbk.eu/index.php/Mauro_Dragoni
dragoni@fbk.eu

Contenu connexe

Tendances

Artificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep LearningArtificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep LearningSujit Pal
 
Neural Networks and Deep Learning
Neural Networks and Deep LearningNeural Networks and Deep Learning
Neural Networks and Deep LearningAsim Jalis
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningLior Rokach
 
Contextual Dissonance: Design Bias in Sensor-Based Experience Sampling Methods
Contextual Dissonance: Design Bias in Sensor-Based Experience Sampling MethodsContextual Dissonance: Design Bias in Sensor-Based Experience Sampling Methods
Contextual Dissonance: Design Bias in Sensor-Based Experience Sampling MethodsNeal Lathia
 
An Introduction to Deep Learning (April 2018)
An Introduction to Deep Learning (April 2018)An Introduction to Deep Learning (April 2018)
An Introduction to Deep Learning (April 2018)Julien SIMON
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERijcsit
 
An introduction to Machine Learning
An introduction to Machine LearningAn introduction to Machine Learning
An introduction to Machine Learningbutest
 
Eswc2009
Eswc2009Eswc2009
Eswc2009fanizzi
 
Soft computing abstracts
Soft computing abstractsSoft computing abstracts
Soft computing abstractsabctry
 
Sentiment Analysis on Twitter
Sentiment Analysis on TwitterSentiment Analysis on Twitter
Sentiment Analysis on TwitterSubarno Pal
 
Generating Natural-Language Text with Neural Networks
Generating Natural-Language Text with Neural NetworksGenerating Natural-Language Text with Neural Networks
Generating Natural-Language Text with Neural NetworksJonathan Mugan
 
Unsupervised Cross-Domain Image Generation
Unsupervised Cross-Domain Image GenerationUnsupervised Cross-Domain Image Generation
Unsupervised Cross-Domain Image GenerationJunho Cho
 
PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...
PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...
PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...GeekPwn Keen
 
The Smart Way To Invest in AI and ML_SFStartupDay
The Smart Way To Invest in AI and ML_SFStartupDayThe Smart Way To Invest in AI and ML_SFStartupDay
The Smart Way To Invest in AI and ML_SFStartupDayAmazon Web Services
 
CP2083 Introduction to Artificial Intelligence
CP2083 Introduction to Artificial IntelligenceCP2083 Introduction to Artificial Intelligence
CP2083 Introduction to Artificial Intelligencebutest
 
Deep learning in Crypto Currency Trading
Deep learning in Crypto Currency TradingDeep learning in Crypto Currency Trading
Deep learning in Crypto Currency TradingMartin Kariithi, CFA
 

Tendances (17)

Artificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep LearningArtificial Intelligence, Machine Learning and Deep Learning
Artificial Intelligence, Machine Learning and Deep Learning
 
Neural Networks and Deep Learning
Neural Networks and Deep LearningNeural Networks and Deep Learning
Neural Networks and Deep Learning
 
55
5555
55
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
Contextual Dissonance: Design Bias in Sensor-Based Experience Sampling Methods
Contextual Dissonance: Design Bias in Sensor-Based Experience Sampling MethodsContextual Dissonance: Design Bias in Sensor-Based Experience Sampling Methods
Contextual Dissonance: Design Bias in Sensor-Based Experience Sampling Methods
 
An Introduction to Deep Learning (April 2018)
An Introduction to Deep Learning (April 2018)An Introduction to Deep Learning (April 2018)
An Introduction to Deep Learning (April 2018)
 
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVERBREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
BREAKING MIGNOTTE’S SEQUENCE BASED SECRET SHARING SCHEME USING SMT SOLVER
 
An introduction to Machine Learning
An introduction to Machine LearningAn introduction to Machine Learning
An introduction to Machine Learning
 
Eswc2009
Eswc2009Eswc2009
Eswc2009
 
Soft computing abstracts
Soft computing abstractsSoft computing abstracts
Soft computing abstracts
 
Sentiment Analysis on Twitter
Sentiment Analysis on TwitterSentiment Analysis on Twitter
Sentiment Analysis on Twitter
 
Generating Natural-Language Text with Neural Networks
Generating Natural-Language Text with Neural NetworksGenerating Natural-Language Text with Neural Networks
Generating Natural-Language Text with Neural Networks
 
Unsupervised Cross-Domain Image Generation
Unsupervised Cross-Domain Image GenerationUnsupervised Cross-Domain Image Generation
Unsupervised Cross-Domain Image Generation
 
PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...
PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...
PRACTICAL ADVERSARIAL ATTACKS AGAINST CHALLENGING MODELS ENVIRONMENTS - Moust...
 
The Smart Way To Invest in AI and ML_SFStartupDay
The Smart Way To Invest in AI and ML_SFStartupDayThe Smart Way To Invest in AI and ML_SFStartupDay
The Smart Way To Invest in AI and ML_SFStartupDay
 
CP2083 Introduction to Artificial Intelligence
CP2083 Introduction to Artificial IntelligenceCP2083 Introduction to Artificial Intelligence
CP2083 Introduction to Artificial Intelligence
 
Deep learning in Crypto Currency Trading
Deep learning in Crypto Currency TradingDeep learning in Crypto Currency Trading
Deep learning in Crypto Currency Trading
 

En vedette

i.a.Preoperative ovarian cancer diagnosis using neuro fuzzy approach
i.a.Preoperative ovarian cancer diagnosis using neuro fuzzy approachi.a.Preoperative ovarian cancer diagnosis using neuro fuzzy approach
i.a.Preoperative ovarian cancer diagnosis using neuro fuzzy approachJonathan Josue Cid Galiot
 
Sentiment mining- The Design and Implementation of an Internet Public Opinion...
Sentiment mining- The Design and Implementation of an Internet PublicOpinion...Sentiment mining- The Design and Implementation of an Internet PublicOpinion...
Sentiment mining- The Design and Implementation of an Internet Public Opinion...Prateek Singh
 
Mike davies sentiment_analysis_presentation_backup
Mike davies sentiment_analysis_presentation_backupMike davies sentiment_analysis_presentation_backup
Mike davies sentiment_analysis_presentation_backupm1ked
 
Machine Learning - Object Detection and Classification
Machine Learning - Object Detection and ClassificationMachine Learning - Object Detection and Classification
Machine Learning - Object Detection and ClassificationVikas Jain
 
Sentiment Analysis in Twitter
Sentiment Analysis in TwitterSentiment Analysis in Twitter
Sentiment Analysis in Twitterprnk08
 
Sentiment Analysis in Twitter with Lightweight Discourse Analysis
Sentiment Analysis in Twitter with Lightweight Discourse AnalysisSentiment Analysis in Twitter with Lightweight Discourse Analysis
Sentiment Analysis in Twitter with Lightweight Discourse AnalysisSubhabrata Mukherjee
 
Twitter sentiment analysis
Twitter sentiment analysisTwitter sentiment analysis
Twitter sentiment analysisSunil Kandari
 
Project prSentiment Analysis of Twitter Data Using Machine Learning Approach...
Project prSentiment Analysis  of Twitter Data Using Machine Learning Approach...Project prSentiment Analysis  of Twitter Data Using Machine Learning Approach...
Project prSentiment Analysis of Twitter Data Using Machine Learning Approach...Geetika Gautam
 
Arabic Text mining Classification
Arabic Text mining Classification Arabic Text mining Classification
Arabic Text mining Classification Zakaria Zubi
 
Sentiment tool Project presentaion
Sentiment tool Project presentaionSentiment tool Project presentaion
Sentiment tool Project presentaionRavindra Chaudhary
 
Sentiment Analaysis on Twitter
Sentiment Analaysis on TwitterSentiment Analaysis on Twitter
Sentiment Analaysis on TwitterNitish J Prabhu
 
Sentiment analysis of arabic,a survey
Sentiment analysis of arabic,a surveySentiment analysis of arabic,a survey
Sentiment analysis of arabic,a surveyArabic_NLP_ImamU2013
 
Tweets Classification using Naive Bayes and SVM
Tweets Classification using Naive Bayes and SVMTweets Classification using Naive Bayes and SVM
Tweets Classification using Naive Bayes and SVMTrilok Sharma
 
Sentiment analysis using naive bayes classifier
Sentiment analysis using naive bayes classifier Sentiment analysis using naive bayes classifier
Sentiment analysis using naive bayes classifier Dev Sahu
 
Introduction to Sentiment Analysis
Introduction to Sentiment AnalysisIntroduction to Sentiment Analysis
Introduction to Sentiment AnalysisJaganadh Gopinadhan
 
Building Large Arabic Multi-Domain Resources for Sentiment Analysis
Building Large Arabic Multi-Domain Resources for Sentiment Analysis Building Large Arabic Multi-Domain Resources for Sentiment Analysis
Building Large Arabic Multi-Domain Resources for Sentiment Analysis Hady Elsahar
 
Sentiment analysis of twitter data
Sentiment analysis of twitter dataSentiment analysis of twitter data
Sentiment analysis of twitter dataBhagyashree Deokar
 
[ASA] Sentiment Analysis in Twitter, a Study on the Saudi Community
[ASA] Sentiment Analysis in Twitter, a Study on the Saudi Community[ASA] Sentiment Analysis in Twitter, a Study on the Saudi Community
[ASA] Sentiment Analysis in Twitter, a Study on the Saudi CommunityASA_Group
 

En vedette (20)

i.a.Preoperative ovarian cancer diagnosis using neuro fuzzy approach
i.a.Preoperative ovarian cancer diagnosis using neuro fuzzy approachi.a.Preoperative ovarian cancer diagnosis using neuro fuzzy approach
i.a.Preoperative ovarian cancer diagnosis using neuro fuzzy approach
 
Data mining project
Data mining projectData mining project
Data mining project
 
Sentiment mining- The Design and Implementation of an Internet Public Opinion...
Sentiment mining- The Design and Implementation of an Internet PublicOpinion...Sentiment mining- The Design and Implementation of an Internet PublicOpinion...
Sentiment mining- The Design and Implementation of an Internet Public Opinion...
 
Mike davies sentiment_analysis_presentation_backup
Mike davies sentiment_analysis_presentation_backupMike davies sentiment_analysis_presentation_backup
Mike davies sentiment_analysis_presentation_backup
 
Machine Learning - Object Detection and Classification
Machine Learning - Object Detection and ClassificationMachine Learning - Object Detection and Classification
Machine Learning - Object Detection and Classification
 
Sentiment Analysis in Twitter
Sentiment Analysis in TwitterSentiment Analysis in Twitter
Sentiment Analysis in Twitter
 
Sentiment Analysis in Twitter with Lightweight Discourse Analysis
Sentiment Analysis in Twitter with Lightweight Discourse AnalysisSentiment Analysis in Twitter with Lightweight Discourse Analysis
Sentiment Analysis in Twitter with Lightweight Discourse Analysis
 
Twitter sentiment analysis
Twitter sentiment analysisTwitter sentiment analysis
Twitter sentiment analysis
 
Project prSentiment Analysis of Twitter Data Using Machine Learning Approach...
Project prSentiment Analysis  of Twitter Data Using Machine Learning Approach...Project prSentiment Analysis  of Twitter Data Using Machine Learning Approach...
Project prSentiment Analysis of Twitter Data Using Machine Learning Approach...
 
Arabic Text mining Classification
Arabic Text mining Classification Arabic Text mining Classification
Arabic Text mining Classification
 
Arabic tokenization and stemming
Arabic tokenization and  stemmingArabic tokenization and  stemming
Arabic tokenization and stemming
 
Sentiment tool Project presentaion
Sentiment tool Project presentaionSentiment tool Project presentaion
Sentiment tool Project presentaion
 
Sentiment Analaysis on Twitter
Sentiment Analaysis on TwitterSentiment Analaysis on Twitter
Sentiment Analaysis on Twitter
 
Sentiment analysis of arabic,a survey
Sentiment analysis of arabic,a surveySentiment analysis of arabic,a survey
Sentiment analysis of arabic,a survey
 
Tweets Classification using Naive Bayes and SVM
Tweets Classification using Naive Bayes and SVMTweets Classification using Naive Bayes and SVM
Tweets Classification using Naive Bayes and SVM
 
Sentiment analysis using naive bayes classifier
Sentiment analysis using naive bayes classifier Sentiment analysis using naive bayes classifier
Sentiment analysis using naive bayes classifier
 
Introduction to Sentiment Analysis
Introduction to Sentiment AnalysisIntroduction to Sentiment Analysis
Introduction to Sentiment Analysis
 
Building Large Arabic Multi-Domain Resources for Sentiment Analysis
Building Large Arabic Multi-Domain Resources for Sentiment Analysis Building Large Arabic Multi-Domain Resources for Sentiment Analysis
Building Large Arabic Multi-Domain Resources for Sentiment Analysis
 
Sentiment analysis of twitter data
Sentiment analysis of twitter dataSentiment analysis of twitter data
Sentiment analysis of twitter data
 
[ASA] Sentiment Analysis in Twitter, a Study on the Saudi Community
[ASA] Sentiment Analysis in Twitter, a Study on the Saudi Community[ASA] Sentiment Analysis in Twitter, a Study on the Saudi Community
[ASA] Sentiment Analysis in Twitter, a Study on the Saudi Community
 

Similaire à A Fuzzy Approach For Multi-Domain Sentiment Analysis

Deep learning tutorial 9/2019
Deep learning tutorial 9/2019Deep learning tutorial 9/2019
Deep learning tutorial 9/2019Amr Rashed
 
Deep Learning Tutorial
Deep Learning TutorialDeep Learning Tutorial
Deep Learning TutorialAmr Rashed
 
soft computing BTU MCA 3rd SEM unit 1 .pptx
soft computing BTU MCA 3rd SEM unit 1 .pptxsoft computing BTU MCA 3rd SEM unit 1 .pptx
soft computing BTU MCA 3rd SEM unit 1 .pptxnaveen356604
 
Methodological study of opinion mining and sentiment analysis techniques
Methodological study of opinion mining and sentiment analysis techniquesMethodological study of opinion mining and sentiment analysis techniques
Methodological study of opinion mining and sentiment analysis techniquesijsc
 
LearningAG.ppt
LearningAG.pptLearningAG.ppt
LearningAG.pptbutest
 
Big Data Intelligence: from Correlation Discovery to Causal Reasoning
Big Data Intelligence: from Correlation Discovery to Causal Reasoning Big Data Intelligence: from Correlation Discovery to Causal Reasoning
Big Data Intelligence: from Correlation Discovery to Causal Reasoning Wanjin Yu
 
Brief Tour of Machine Learning
Brief Tour of Machine LearningBrief Tour of Machine Learning
Brief Tour of Machine Learningbutest
 
Methodological Study Of Opinion Mining And Sentiment Analysis Techniques
Methodological Study Of Opinion Mining And Sentiment Analysis Techniques  Methodological Study Of Opinion Mining And Sentiment Analysis Techniques
Methodological Study Of Opinion Mining And Sentiment Analysis Techniques ijsc
 
Deep Learning: concepts and use cases (October 2018)
Deep Learning: concepts and use cases (October 2018)Deep Learning: concepts and use cases (October 2018)
Deep Learning: concepts and use cases (October 2018)Julien SIMON
 
An Introduction to Deep Learning (May 2018)
An Introduction to Deep Learning (May 2018)An Introduction to Deep Learning (May 2018)
An Introduction to Deep Learning (May 2018)Julien SIMON
 
A scenario based approach for dealing with
A scenario based approach for dealing withA scenario based approach for dealing with
A scenario based approach for dealing withijcsa
 
Introduction to deep learning
Introduction to deep learningIntroduction to deep learning
Introduction to deep learningAmr Rashed
 
Cost-effective Interactive Attention Learning with Neural Attention Process
Cost-effective Interactive Attention Learning with Neural Attention ProcessCost-effective Interactive Attention Learning with Neural Attention Process
Cost-effective Interactive Attention Learning with Neural Attention ProcessMLAI2
 
A Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionA Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionIJCSIS Research Publications
 
Discover How Scientific Data is Used for the Public Good with Natural Languag...
Discover How Scientific Data is Used for the Public Good with Natural Languag...Discover How Scientific Data is Used for the Public Good with Natural Languag...
Discover How Scientific Data is Used for the Public Good with Natural Languag...BaoTramDuong2
 
Facial Emotion Recognition using Convolution Neural Network
Facial Emotion Recognition using Convolution Neural NetworkFacial Emotion Recognition using Convolution Neural Network
Facial Emotion Recognition using Convolution Neural NetworkYogeshIJTSRD
 
Generating domain specific sentiment lexicons using the Web Directory
Generating domain specific sentiment lexicons using the Web Directory Generating domain specific sentiment lexicons using the Web Directory
Generating domain specific sentiment lexicons using the Web Directory acijjournal
 
Emotion Recognition through Speech Analysis using various Deep Learning Algor...
Emotion Recognition through Speech Analysis using various Deep Learning Algor...Emotion Recognition through Speech Analysis using various Deep Learning Algor...
Emotion Recognition through Speech Analysis using various Deep Learning Algor...IRJET Journal
 

Similaire à A Fuzzy Approach For Multi-Domain Sentiment Analysis (20)

Deep learning tutorial 9/2019
Deep learning tutorial 9/2019Deep learning tutorial 9/2019
Deep learning tutorial 9/2019
 
Deep Learning Tutorial
Deep Learning TutorialDeep Learning Tutorial
Deep Learning Tutorial
 
soft computing BTU MCA 3rd SEM unit 1 .pptx
soft computing BTU MCA 3rd SEM unit 1 .pptxsoft computing BTU MCA 3rd SEM unit 1 .pptx
soft computing BTU MCA 3rd SEM unit 1 .pptx
 
Methodological study of opinion mining and sentiment analysis techniques
Methodological study of opinion mining and sentiment analysis techniquesMethodological study of opinion mining and sentiment analysis techniques
Methodological study of opinion mining and sentiment analysis techniques
 
LearningAG.ppt
LearningAG.pptLearningAG.ppt
LearningAG.ppt
 
Big Data Intelligence: from Correlation Discovery to Causal Reasoning
Big Data Intelligence: from Correlation Discovery to Causal Reasoning Big Data Intelligence: from Correlation Discovery to Causal Reasoning
Big Data Intelligence: from Correlation Discovery to Causal Reasoning
 
Brief Tour of Machine Learning
Brief Tour of Machine LearningBrief Tour of Machine Learning
Brief Tour of Machine Learning
 
Methodological Study Of Opinion Mining And Sentiment Analysis Techniques
Methodological Study Of Opinion Mining And Sentiment Analysis Techniques  Methodological Study Of Opinion Mining And Sentiment Analysis Techniques
Methodological Study Of Opinion Mining And Sentiment Analysis Techniques
 
Deep Learning: concepts and use cases (October 2018)
Deep Learning: concepts and use cases (October 2018)Deep Learning: concepts and use cases (October 2018)
Deep Learning: concepts and use cases (October 2018)
 
An Introduction to Deep Learning (May 2018)
An Introduction to Deep Learning (May 2018)An Introduction to Deep Learning (May 2018)
An Introduction to Deep Learning (May 2018)
 
A scenario based approach for dealing with
A scenario based approach for dealing withA scenario based approach for dealing with
A scenario based approach for dealing with
 
Novi sad ai event 1-2018
Novi sad ai event 1-2018Novi sad ai event 1-2018
Novi sad ai event 1-2018
 
Introduction to deep learning
Introduction to deep learningIntroduction to deep learning
Introduction to deep learning
 
Cost-effective Interactive Attention Learning with Neural Attention Process
Cost-effective Interactive Attention Learning with Neural Attention ProcessCost-effective Interactive Attention Learning with Neural Attention Process
Cost-effective Interactive Attention Learning with Neural Attention Process
 
The Tower of Knowledge A Generic System Architecture
The Tower of Knowledge A Generic System ArchitectureThe Tower of Knowledge A Generic System Architecture
The Tower of Knowledge A Generic System Architecture
 
A Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware DetectionA Survey of Deep Learning Algorithms for Malware Detection
A Survey of Deep Learning Algorithms for Malware Detection
 
Discover How Scientific Data is Used for the Public Good with Natural Languag...
Discover How Scientific Data is Used for the Public Good with Natural Languag...Discover How Scientific Data is Used for the Public Good with Natural Languag...
Discover How Scientific Data is Used for the Public Good with Natural Languag...
 
Facial Emotion Recognition using Convolution Neural Network
Facial Emotion Recognition using Convolution Neural NetworkFacial Emotion Recognition using Convolution Neural Network
Facial Emotion Recognition using Convolution Neural Network
 
Generating domain specific sentiment lexicons using the Web Directory
Generating domain specific sentiment lexicons using the Web Directory Generating domain specific sentiment lexicons using the Web Directory
Generating domain specific sentiment lexicons using the Web Directory
 
Emotion Recognition through Speech Analysis using various Deep Learning Algor...
Emotion Recognition through Speech Analysis using various Deep Learning Algor...Emotion Recognition through Speech Analysis using various Deep Learning Algor...
Emotion Recognition through Speech Analysis using various Deep Learning Algor...
 

Plus de Mauro Dragoni

Keynote given at ISWC 2019 Semantic Management for Healthcare Workshop
Keynote given at ISWC 2019 Semantic Management for Healthcare WorkshopKeynote given at ISWC 2019 Semantic Management for Healthcare Workshop
Keynote given at ISWC 2019 Semantic Management for Healthcare WorkshopMauro Dragoni
 
Translating Ontologies in Real-World Settings
Translating Ontologies in Real-World SettingsTranslating Ontologies in Real-World Settings
Translating Ontologies in Real-World SettingsMauro Dragoni
 
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information Retrieval
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information RetrievalKeystone Summer School 2015: Mauro Dragoni, Ontologies For Information Retrieval
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information RetrievalMauro Dragoni
 
Exploiting Multilinguality For Creating Mappings Between Thesauri
Exploiting Multilinguality For Creating Mappings Between ThesauriExploiting Multilinguality For Creating Mappings Between Thesauri
Exploiting Multilinguality For Creating Mappings Between ThesauriMauro Dragoni
 
Semantic-based Process Analysis
Semantic-based Process AnalysisSemantic-based Process Analysis
Semantic-based Process AnalysisMauro Dragoni
 
Authoring OWL 2 ontologies with the TEX-OWL syntax
Authoring OWL 2 ontologies with the TEX-OWL syntaxAuthoring OWL 2 ontologies with the TEX-OWL syntax
Authoring OWL 2 ontologies with the TEX-OWL syntaxMauro Dragoni
 
Using Semantic and Domain-based Information in CLIR Systems
Using Semantic and Domain-based Information in CLIR SystemsUsing Semantic and Domain-based Information in CLIR Systems
Using Semantic and Domain-based Information in CLIR SystemsMauro Dragoni
 
Multilingual Knowledge Organization Systems Management: Best Practices
Multilingual Knowledge Organization Systems Management: Best PracticesMultilingual Knowledge Organization Systems Management: Best Practices
Multilingual Knowledge Organization Systems Management: Best PracticesMauro Dragoni
 
Collaborative Modeling of Processes and Ontologies with MoKi
Collaborative Modeling of Processes and Ontologies with MoKiCollaborative Modeling of Processes and Ontologies with MoKi
Collaborative Modeling of Processes and Ontologies with MoKiMauro Dragoni
 

Plus de Mauro Dragoni (9)

Keynote given at ISWC 2019 Semantic Management for Healthcare Workshop
Keynote given at ISWC 2019 Semantic Management for Healthcare WorkshopKeynote given at ISWC 2019 Semantic Management for Healthcare Workshop
Keynote given at ISWC 2019 Semantic Management for Healthcare Workshop
 
Translating Ontologies in Real-World Settings
Translating Ontologies in Real-World SettingsTranslating Ontologies in Real-World Settings
Translating Ontologies in Real-World Settings
 
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information Retrieval
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information RetrievalKeystone Summer School 2015: Mauro Dragoni, Ontologies For Information Retrieval
Keystone Summer School 2015: Mauro Dragoni, Ontologies For Information Retrieval
 
Exploiting Multilinguality For Creating Mappings Between Thesauri
Exploiting Multilinguality For Creating Mappings Between ThesauriExploiting Multilinguality For Creating Mappings Between Thesauri
Exploiting Multilinguality For Creating Mappings Between Thesauri
 
Semantic-based Process Analysis
Semantic-based Process AnalysisSemantic-based Process Analysis
Semantic-based Process Analysis
 
Authoring OWL 2 ontologies with the TEX-OWL syntax
Authoring OWL 2 ontologies with the TEX-OWL syntaxAuthoring OWL 2 ontologies with the TEX-OWL syntax
Authoring OWL 2 ontologies with the TEX-OWL syntax
 
Using Semantic and Domain-based Information in CLIR Systems
Using Semantic and Domain-based Information in CLIR SystemsUsing Semantic and Domain-based Information in CLIR Systems
Using Semantic and Domain-based Information in CLIR Systems
 
Multilingual Knowledge Organization Systems Management: Best Practices
Multilingual Knowledge Organization Systems Management: Best PracticesMultilingual Knowledge Organization Systems Management: Best Practices
Multilingual Knowledge Organization Systems Management: Best Practices
 
Collaborative Modeling of Processes and Ontologies with MoKi
Collaborative Modeling of Processes and Ontologies with MoKiCollaborative Modeling of Processes and Ontologies with MoKi
Collaborative Modeling of Processes and Ontologies with MoKi
 

Dernier

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Dernier (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

A Fuzzy Approach For Multi-Domain Sentiment Analysis

  • 1. A Fuzzy Approach For Multi-Domain Sentiment Analysis Mauro Dragoni Fondazione Bruno Kessler (FBK), Shape and Evolve Living Knowledge Unit (SHELL) https://shell.fbk.eu/index.php/Mauro_Dragoni - dragoni@fbk.eu work done in collaboration with Prof. Andrea G.B. Tettamanzi and Prof. Celia da Costa Pereira INRIA Sophia Antipolis June, 19th 2014
  • 2. Outline 1. Background on Sentiment Analysis and Fuzzy Logic 2. Motivations 3. The Approach 4. Evaluation of the Implemented System
  • 3. Sentiment Analysis - 1  Natural Language Processing task for identifying the opinion given by someone with respect to something.  Opinions may be positive, negative, or neutral.  The value associated with the opinion is called “polarity”.
  • 4. Sentiment Analysis - 2  Basic challenges:  Identification of the polarities for each term in the text.  Deciding how to aggregate the different polarities.  Advanced challenges:  Identification of the entities in each sentence (subjects).  Identification of the features describing each entity.  Adaptation of the sentiment model to different domain.  Manage the uncertainty of each learned information within the single domain
  • 5. Fuzzy Logic  Allows to represent imprecise information.  With respect to classical logic, truth-values of assertions may assume all values in the interval [0, 1]  The main element of the fuzzy logic are Fuzzy Sets Hot temperature. x y
  • 6. Motivations - 1  The same concept may have different polarities in different domains.  The polarity associating a concept to a domain may be uncertain due to the different contexts in which it is used.
  • 7. Motivations - 2  The assignment of a unique polarity value to the entire text leads to imprecise information.  In the same text, different aspects have to be analyzed.  A significant concept extraction capability is required. “I bought a new smartphone: the screen is awesome, even if some colors are not very brilliant, but the battery is too short”
  • 8. The Approach  Creation of the knowledge base.  Concept extraction.  Learning of the preliminary sentiment information.  Propagation of the learned information through the knowledge graph.  Modeling of the fuzzy shapes.
  • 9. Creation of the Knowledge Base  Based on the integration of WordNet with SenticNet  WordNet has been enriched with terms extracted from the Roget’s Thesaurus  The links between WordNet and SenticNet have been built by taking into account the synonyms of each WordNet synset and the synonyms of each SenticNet concept.  In order to avoid ambiguities not all associations have been created.  Example: concept “base” WordNet: 20 senses (for the noun) SenticNet: base (beneath, below, understructure)  WordNet sense 2
  • 10. Concept Extraction - 1  Two samples: 1. Today I went to the mall and bought some desserts and a lot of very nice Christmas gifts. 2. The touchscreen is awesome but the battery is too short.
  • 12. Multi-Domain Fuzzy Propagation - 1  Polarity information is propagated through the knowledge base by using an algorithm implementing the simulated annealing strategy.  The propagation of the values is driven by three parameters: annealing rate, propagation rate, and convergence limit.  The intermediate polarity values measured on each concept at the end of each iteration are stored in order to build the final fuzzy shape associated with each combination concept-domain.  A different model is learned for each domain.
  • 13. Multi-Domain Fuzzy Propagation - 2 Domain Initialization: Information Propagation: Stop Condition:
  • 14. Multi-Domain Fuzzy Propagation - 3  Trade-offs:  high propagation rate  risk of polarity convergence  low convergence limit  risk of polarity convergence  lower propagation rate  incomplete graph  high annealing rate  premature stop of the algorithm  high convergence limit  premature stop of the algorithm
  • 16. Modeling of Fuzzy Shapes - 1 Value computed from the training set. Value obtained after the propagation phase. Support computed based on the variance value.
  • 17. Modeling of Fuzzy Shapes - 2 Type 1 level of uncertainty: the core of the fuzzy trapezoid crosses the neutral polarity Type 2 level of uncertainty: only the support of the fuzzy trapezoid crosses the neutral polarity
  • 18. Evaluation of the System - 1  Evaluation on the Blitzer dataset:  25 domains  ~3000 reviews for each domain in the balanced dataset  75% of instances for the training, 25% for the validation  Three baselines: SVM, Max-Entropy, and Naïve-Bayes  Compared the performance by discarding the different levels of uncertainty  Evaluation on:  Elementary Polarity Computation  Concept Extraction + Polarity Computation
  • 19. Evaluation of the System - 2  How fuzzy polarities are aggregated? x
  • 20. Evaluation of the System - 3
  • 21. Evaluation of the System - 4 Approach Avg. Precision Avg. Recall SVM 0.8068 1.0 Naïve-Bayes 0.8227 1.0 Max-Entropy 0.8225 1.0 MDFSA 0.8617 ~ 1.0 MDFSA (Type 1 Uncertainty excluded) 0.8735 ~ 0.7 MDFSA (Type 1 & 2 Uncertainty excluded) 0.8991 ~ 0.5 Elementary Polarity Computation:
  • 22. Evaluation of the System - 5 Approach Precision Recall F-Measure MDFSA 0.25 0.26 0.25 IBM 0.24 0.14 0.18 UNI-NEGEV 0.12 0.05 0.07 Concept Extraction + Polarity Computation (ESWC 2014 Challenge):
  • 23. Future Work  Integration of more knowledge bases into the system.  Improve how ambiguities are addressed.  Improve the concept extraction module.  Extending the approach for addressing multilingualism.  Apply the approach to the social network environment.

Notes de l'éditeur

  1. Fuzzy logic allows to increase the description ability of the crisp logics, because it allows one to describe facts using values that express imprecise situations; so, we exit from the constraint of using only 0 or 1 values, but we can use all values in this interval. The main element of fuzzy logic is constituted by fuzzy sets that represent the sets of the membership relations between the environment objects and a particular subset of them.