SlideShare a Scribd company logo
A Fuzzy Approach to Text Classification With Two-Stage
Training for Ambiguous Instances
ABSTRACT:
Sentiment analysis is a very popular application area of text mining and machine
learning. The popular methods include support vector machine, naive bayes,
decision trees, and deep neural networks. However, these methods generally
belong to discriminative learning, which aims to distinguish one class from others
with a clear-cut outcome, under the presence of ground truth. In the context of text
classification, instances are naturally fuzzy (can be multilabeled in some
application areas) and thus are not considered clear-cut, especially given the fact
that labels assigned to sentiment in text represent an agreed level of subjective
opinion for multiple human annotators rather than indisputable ground truth. This
has motivated researchers to develop fuzzy methods, which typically train
classifiers through generative learning, i.e., a fuzzy classifier is used to measure the
degree to which an instance belongs to each class. Traditional fuzzy methods
typically involve generation of a single fuzzy classifier and employ a fixed rule of
defuzzification outputting the class with the maximum membership degree. The
use of a single fuzzy classifier with the above-fixed rule of defuzzification is likely
to get the classifier encountering the text ambiguity situation on sentiment data,
i.e., an instance may obtain equal membership degrees to both the positive and
negative classes. In this paper, we focus on cyberhate classification, since the
spread of hate speech via social media can have disruptive impacts on social
cohesion and lead to regional and community tensions. Automatic detection of
cyberhate has thus become a priority research area. In particular, we propose a
modified fuzzy approach with two stage training for dealing with text ambiguity
and classifying four types of hate speech, namely, religion, race, disability, and
sexual orientation—and compare its performance with those popular methods as
well as some existing fuzzy approaches, while the features are prepared through
the bag-of-words and word embedding feature extraction methods alongside the
correlation based feature subset selection method. The experimental results show
that the proposed fuzzy method outperforms the other methods in most cases.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : JAVA.
 Tool : Netbeans 7.2.1
 Database : MYSQL
REFERENCE:
Han Liu , Member, IEEE, Pete Burnap, Member, IEEE, Wafa Alorainy, and
Matthew L. Williams, “A Fuzzy Approach to Text Classification With Two-Stage
Training for Ambiguous Instances”, IEEE Transactions on Computational Social
Systems, Volume: 6 , Issue: 2 , April 2019.

More Related Content

PPTX
ONLINE SOCIAL NETWORK
PPTX
A system to filter unwanted messages from OSN user walls
DOCX
A system to filter unwanted messages from osn user walls
PDF
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
PPTX
A system to filter unwanted messages from the
PDF
A system to filter unwanted messages
PDF
Content Based Message Filtering For OSNS Using Machine Learning Classifier
PPTX
seminar on To block unwanted messages _from osn
ONLINE SOCIAL NETWORK
A system to filter unwanted messages from OSN user walls
A system to filter unwanted messages from osn user walls
Filtering Unwanted Messages from Online Social Networks (OSN) using Rule Base...
A system to filter unwanted messages from the
A system to filter unwanted messages
Content Based Message Filtering For OSNS Using Machine Learning Classifier
seminar on To block unwanted messages _from osn

What's hot (14)

PPTX
投影片 1
PDF
Filter unwanted messages from walls and blocking non legitimate users in osn
DOCX
A system to filter unwanted messages from osn user walls
PPT
Open and Participatory Environments in Language Learning
PDF
Filter unwanted messages from walls and blocking nonlegitimate user in osn
PPTX
Identifying features in opinion mining via intrinsic and extrinsic domain rel...
PDF
Iaetsd hierarchical fuzzy rule based classification
PPTX
Frank Harbers - Automatic genre classification of historical newspaper articles
PPT
Extracting Key Terms From Noisy and Multi-theme Documents
PPTX
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
PPT
ICAME 2010
DOCX
SATANJEEV BANERJEE
PPTX
Layne Johnson Open Forum - MLA 2011
PPT
Second Life & Education
投影片 1
Filter unwanted messages from walls and blocking non legitimate users in osn
A system to filter unwanted messages from osn user walls
Open and Participatory Environments in Language Learning
Filter unwanted messages from walls and blocking nonlegitimate user in osn
Identifying features in opinion mining via intrinsic and extrinsic domain rel...
Iaetsd hierarchical fuzzy rule based classification
Frank Harbers - Automatic genre classification of historical newspaper articles
Extracting Key Terms From Noisy and Multi-theme Documents
Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection
ICAME 2010
SATANJEEV BANERJEE
Layne Johnson Open Forum - MLA 2011
Second Life & Education
Ad

Similar to A Fuzzy Approach to Text Classification WithTwo-Stage Training for Ambiguous Instances (20)

DOCX
A Multi-Stage Machine Learning and Fuzzy Approach to Cyber-Hate Detection.docx
PPTX
ashu ppt final.pptx
PPTX
hate speech detection system using machine learning
PDF
Supervised Approach to Extract Sentiments from Unstructured Text
PDF
Hate Speech Recognition System through NLP and Deep Learning
DOCX
JPJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
PDF
A Survey on Word Sense Disambiguation
PDF
Natural Language Processing Through Different Classes of Machine Learning
DOC
taghelper-final.doc
PDF
Deep learning for male speach detection in tweets
PDF
Automatic Hate Speech Detection: A Literature Review
PDF
LSTM Based Sentiment Analysis
DOCX
NE7012- SOCIAL NETWORK ANALYSIS
PDF
Comparative Analysis of Existing and a Novel Approach to Topic Detection on C...
PDF
Comparative Analysis of Existing and a Novel Approach to Topic Detection on C...
PPTX
toxic commnets classification using python
PDF
A scalable, lexicon based technique for sentiment analysis
PPTX
Semi supervised approach for word sense disambiguation
PDF
An Analytical Survey on Hate Speech Recognition through NLP and Deep Learning
A Multi-Stage Machine Learning and Fuzzy Approach to Cyber-Hate Detection.docx
ashu ppt final.pptx
hate speech detection system using machine learning
Supervised Approach to Extract Sentiments from Unstructured Text
Hate Speech Recognition System through NLP and Deep Learning
JPJ1419 Discovering Emerging Topics in Social Streams via Link-Anomaly Detec...
A Survey on Word Sense Disambiguation
Natural Language Processing Through Different Classes of Machine Learning
taghelper-final.doc
Deep learning for male speach detection in tweets
Automatic Hate Speech Detection: A Literature Review
LSTM Based Sentiment Analysis
NE7012- SOCIAL NETWORK ANALYSIS
Comparative Analysis of Existing and a Novel Approach to Topic Detection on C...
Comparative Analysis of Existing and a Novel Approach to Topic Detection on C...
toxic commnets classification using python
A scalable, lexicon based technique for sentiment analysis
Semi supervised approach for word sense disambiguation
An Analytical Survey on Hate Speech Recognition through NLP and Deep Learning
Ad

More from JAYAPRAKASH JPINFOTECH (20)

PDF
Java Web Application Project Titles 2023-2024.pdf
PDF
Dot Net Final Year IEEE Project Titles.pdf
PDF
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
PDF
Python IEEE Project Titles 2023 - 2024.pdf
PDF
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
DOCX
Spammer detection and fake user Identification on Social Networks
DOCX
Sentiment Classification using N-gram IDF and Automated Machine Learning
DOCX
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
DOCX
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
DOCX
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
DOCX
Crop Yield Prediction and Efficient use of Fertilizers
DOCX
Collaborative Filtering-based Electricity Plan Recommender System
DOCX
Achieving Data Truthfulness and Privacy Preservation in Data Markets
DOCX
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
DOCX
Towards Fast and Reliable Multi-hop Routing in VANETs
DOCX
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
DOCX
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
DOCX
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
DOCX
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
DOCX
Node-Level Trust Evaluation in Wireless Sensor Networks
Java Web Application Project Titles 2023-2024.pdf
Dot Net Final Year IEEE Project Titles.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdf
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
Spammer detection and fake user Identification on Social Networks
Sentiment Classification using N-gram IDF and Automated Machine Learning
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Crop Yield Prediction and Efficient use of Fertilizers
Collaborative Filtering-based Electricity Plan Recommender System
Achieving Data Truthfulness and Privacy Preservation in Data Markets
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
Towards Fast and Reliable Multi-hop Routing in VANETs
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Node-Level Trust Evaluation in Wireless Sensor Networks

Recently uploaded (20)

PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
Classroom Observation Tools for Teachers
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
Pre independence Education in Inndia.pdf
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Lesson notes of climatology university.
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Insiders guide to clinical Medicine.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Abdominal Access Techniques with Prof. Dr. R K Mishra
O5-L3 Freight Transport Ops (International) V1.pdf
Microbial diseases, their pathogenesis and prophylaxis
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Cell Structure & Organelles in detailed.
Classroom Observation Tools for Teachers
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPH.pptx obstetrics and gynecology in nursing
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Anesthesia in Laparoscopic Surgery in India
2.FourierTransform-ShortQuestionswithAnswers.pdf
Pre independence Education in Inndia.pdf
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
VCE English Exam - Section C Student Revision Booklet
Lesson notes of climatology university.
Sports Quiz easy sports quiz sports quiz
Insiders guide to clinical Medicine.pdf

A Fuzzy Approach to Text Classification WithTwo-Stage Training for Ambiguous Instances

  • 1. A Fuzzy Approach to Text Classification With Two-Stage Training for Ambiguous Instances ABSTRACT: Sentiment analysis is a very popular application area of text mining and machine learning. The popular methods include support vector machine, naive bayes, decision trees, and deep neural networks. However, these methods generally belong to discriminative learning, which aims to distinguish one class from others with a clear-cut outcome, under the presence of ground truth. In the context of text classification, instances are naturally fuzzy (can be multilabeled in some application areas) and thus are not considered clear-cut, especially given the fact that labels assigned to sentiment in text represent an agreed level of subjective opinion for multiple human annotators rather than indisputable ground truth. This has motivated researchers to develop fuzzy methods, which typically train classifiers through generative learning, i.e., a fuzzy classifier is used to measure the degree to which an instance belongs to each class. Traditional fuzzy methods typically involve generation of a single fuzzy classifier and employ a fixed rule of defuzzification outputting the class with the maximum membership degree. The use of a single fuzzy classifier with the above-fixed rule of defuzzification is likely to get the classifier encountering the text ambiguity situation on sentiment data, i.e., an instance may obtain equal membership degrees to both the positive and negative classes. In this paper, we focus on cyberhate classification, since the spread of hate speech via social media can have disruptive impacts on social cohesion and lead to regional and community tensions. Automatic detection of
  • 2. cyberhate has thus become a priority research area. In particular, we propose a modified fuzzy approach with two stage training for dealing with text ambiguity and classifying four types of hate speech, namely, religion, race, disability, and sexual orientation—and compare its performance with those popular methods as well as some existing fuzzy approaches, while the features are prepared through the bag-of-words and word embedding feature extraction methods alongside the correlation based feature subset selection method. The experimental results show that the proposed fuzzy method outperforms the other methods in most cases. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1 GB SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : JAVA.  Tool : Netbeans 7.2.1  Database : MYSQL
  • 3. REFERENCE: Han Liu , Member, IEEE, Pete Burnap, Member, IEEE, Wafa Alorainy, and Matthew L. Williams, “A Fuzzy Approach to Text Classification With Two-Stage Training for Ambiguous Instances”, IEEE Transactions on Computational Social Systems, Volume: 6 , Issue: 2 , April 2019.