SlideShare a Scribd company logo
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
TWEET SEGMENTATION AND ITS APPLICATION TO NAMED ENTITY
RECOGNITION
ABSTRACT:
Twitter has attracted millions of users to share and disseminate most up-to-date
information, resulting in large volumes of data produced everyday. However, many applications
in Information Retrieval (IR) and Natural Language Processing (NLP) suffer severely from the
noisy and short nature of tweets. In this paper, we propose a novel framework for tweet
segmentation in a batch mode, called HybridSeg. By splitting tweets into meaningful segments,
the semantic or context information is well preserved and easily extracted by the downstream
applications. HybridSeg finds the optimal segmentation of a tweet by maximizing the sum of the
stickiness scores of its candidate segments. The stickiness score considers the probability of a
segment being a phrase in English (i.e., global context) and the probability of a segment being a
phrase within the batch of tweets (i.e., local context). For the latter, we propose and evaluate two
models to derive local context by considering the linguistic features and term-dependency in a
batch of tweets, respectively. HybridSeg is also designed to iteratively learn from confident
segments as pseudo feedback. Experiments on two tweet data sets show that tweet segmentation
quality is significantly improved by learning both global and local contexts compared with using
global context alone. Through analysis and comparison, we show that local linguistic features are
more reliable for learning local context compared with term-dependency. As an application, we
show that high accuracy is achieved in named entity recognition by applying segment-based
part-of-speech (POS) tagging.
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
EXISTING SYSTEM:
 Many existing NLP techniques heavily rely on linguistic features, such as POS tags of the
surrounding words, word capitalization, trigger words (e.g., Mr., Dr.), and gazetteers.
These linguistic features, together with effective supervised learning algorithms (e.g.,
hidden markov model (HMM) and conditional random field (CRF)), achieve very good
performance on formal text corpus. However, these techniques experience severe
performance deterioration on tweets because of the noisy and short nature of the latter.
 In Existing System, to improve POS tagging on tweets, Ritter et al. train a POS tagger by
using CRF model with conventional and tweet-specific features. Brown clustering is
applied in their work to deal with the ill-formed words.
DISADVANTAGES OF EXISTING SYSTEM:
 Given the limited length of a tweet (i.e., 140 characters) and no restrictions on its writing
styles, tweets often contain grammatical errors, misspellings, and informal abbreviations.
 The error-prone and short nature of tweets often make the word-level language models
for tweets less reliable.
PROPOSED SYSTEM:
 In this paper, we focus on the task of tweet segmentation. The goal of this task is to split
a tweet into a sequence of consecutive n-grams, each of which is called a segment. A
segment can be a named entity (e.g., a movie title “finding nemo”), a semantically
meaningful information unit (e.g., “officially released”), or any other types of phrases
which appear “more than by chance”
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 To achieve high quality tweet segmentation, we propose a generic tweet segmentation
framework, named HybridSeg. HybridSeg learns from both global and local contexts, and
has the ability of learning from pseudo feedback.
 Global context. Tweets are posted for information sharing and communication. The
named entities and semantic phrases are well preserved in tweets.
 Local context. Tweets are highly time-sensitive so that many emerging phrases like “She
Dancin” cannot be found in external knowledge bases. However, considering a large
number of tweets published within a short time period (e.g., a day) containing the phrase,
it is not difficult to recognize “She Dancin” as a valid and meaningful segment. We
therefore investigate two local contexts, namely local linguistic features and local
collocation.
ADVANTAGES OF PROPOSED SYSTEM:
 Our work is also related to entity linking (EL). EL is to identify the mention of a named
entity and link it to an entry in a knowledge base like Wikipedia.
 Through our framework, we demonstrate that local linguistic features are more reliable
than term-dependency in guiding the segmentation process. This finding opens
opportunities for tools developed for formal text to be applied to tweets which are
believed to be much more noisy than formal text.
 Helps in preserving Semantic meaning of tweets.
ALGORITHM EXPLANATION:
 As an application of tweet segmentation, we propose and evaluate two segment-based
NER algorithms. Both algorithms are unsupervised in nature and take tweet segments as
input.
 One algorithm exploits co-occurrence of named entities in targeted Twitter streams by
applying random walk (RW) with the assumption that named entities are more likely to
co-occur together.
1.
#13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6.
Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602,
Project Titles: http://shakastech.weebly.com/2015-2016-titles
Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com
 The other algorithm utilizes Part-of-Speech (POS) tags of the constituent words in
segments.
SYSTEM ARCHITECTURE:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium IV 2.4 GHz.
 Hard Disk : 40 GB.
 Floppy Drive : 1.44 Mb.
 Monitor : 15 VGA Colour.
 Mouse : Logitech.
 Ram : 512 Mb.
SOFTWARE REQUIREMENTS:
 Operating system : Windows XP/7.
 Coding Language : JAVA/J2EE
 IDE : Netbeans 7.4
 Database : MYSQL

More Related Content

PDF
Tweet segmentation and its application to named entity recognition
PDF
Tweet segmentation and its application to named entity recognition.
PDF
Tweet Segmentation and Its Application to Named Entity Recognition
PPTX
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
PDF
IRJET- Fake News Detection and Rumour Source Identification
PDF
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
PDF
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
PPTX
Odsc 2019 entity_reputation_knowledge_graph
Tweet segmentation and its application to named entity recognition
Tweet segmentation and its application to named entity recognition.
Tweet Segmentation and Its Application to Named Entity Recognition
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
IRJET- Fake News Detection and Rumour Source Identification
IRJET- Tweet Segmentation and its Application to Named Entity Recognition
FAKE NEWS DETECTION WITH SEMANTIC FEATURES AND TEXT MINING
Odsc 2019 entity_reputation_knowledge_graph

What's hot (20)

PDF
Big Data Analytics- USE CASES SOLVED USING NETWORK ANALYSIS TECHNIQUES IN GEPHI
PDF
Learning to detect phishing ur ls
PDF
Final Poster for Engineering Showcase
PDF
IRJET- Fake News Detection
PPT
Social Trust-aware Recommendation System: A T-Index Approach
PDF
IRJET- A Pragmatic Supervised Learning Methodology of Hate Speech Detection i...
PPTX
Big Data Analysis- Live DATA PRESENTATION- Bitcoin Alpha trust network
PDF
Phishing detection in ims using domain ontology and cba an innovative rule ...
PDF
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
PPTX
tweet segmentation
PDF
IRJET- Fake Profile Identification using Machine Learning
PDF
Using hash tag graph based topic model to connect semantically-related words ...
PPTX
A Comparative Analysis of Different Feature Set on the Performance of Differe...
PDF
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
PDF
Fake News Detection using Machine Learning
PDF
USING HASHTAG GRAPH-BASED TOPIC MODEL TO CONNECT SEMANTICALLY-RELATED WORDS W...
PPTX
PDF
Link prediction
PDF
IRJET- Fake News Detection using Logistic Regression
PDF
IRJET - Fake News Detection using Machine Learning
Big Data Analytics- USE CASES SOLVED USING NETWORK ANALYSIS TECHNIQUES IN GEPHI
Learning to detect phishing ur ls
Final Poster for Engineering Showcase
IRJET- Fake News Detection
Social Trust-aware Recommendation System: A T-Index Approach
IRJET- A Pragmatic Supervised Learning Methodology of Hate Speech Detection i...
Big Data Analysis- Live DATA PRESENTATION- Bitcoin Alpha trust network
Phishing detection in ims using domain ontology and cba an innovative rule ...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
tweet segmentation
IRJET- Fake Profile Identification using Machine Learning
Using hash tag graph based topic model to connect semantically-related words ...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
Fake News Detection using Machine Learning
USING HASHTAG GRAPH-BASED TOPIC MODEL TO CONNECT SEMANTICALLY-RELATED WORDS W...
Link prediction
IRJET- Fake News Detection using Logistic Regression
IRJET - Fake News Detection using Machine Learning
Ad

Similar to Tweet segmentation and its application to named entity recognition (20)

DOCX
Interpreting the public sentiment variations ons on twitter
DOCX
Entity linking with a knowledge baseissues, techniques, and solutions
DOCX
Cloud based multimedia content protection system
PPTX
Discover How Scientific Data is Used for the Public Good with Natural Languag...
DOCX
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
DOCX
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
PDF
Smart Solutions for Question Duplication: Deep Learning in Action
PDF
A Hybrid Method of Long Short-Term Memory and AutoEncoder Architectures for S...
PDF
STOCKGRAM : DEEP LEARNING MODEL FOR DIGITIZING FINANCIAL COMMUNICATIONS VIA N...
PDF
STOCKGRAM : DEEP LEARNING MODEL FOR DIGITIZING FINANCIAL COMMUNICATIONS VIA N...
DOCX
Deep feature based text clustering and its explanation
PDF
Cyber bullying detection and analysis.ppt.pdf
DOC
Poster Abstracts
PDF
S180304116124
PDF
Building a recommendation system based on the job offers extracted from the w...
PDF
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
PDF
14420-Article Text-17938-1-2-20201228.pdf
DOCX
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
PDF
Meaning as Collective Use: Predicting Semantic Hashtag Categories on Twitter
DOCX
Deepfake Detection on Social Media Leveraging Deep Learning and FastText Embe...
Interpreting the public sentiment variations ons on twitter
Entity linking with a knowledge baseissues, techniques, and solutions
Cloud based multimedia content protection system
Discover How Scientific Data is Used for the Public Good with Natural Languag...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Enabling fine grained multi-keyword search supporting classified sub-dictiona...
Smart Solutions for Question Duplication: Deep Learning in Action
A Hybrid Method of Long Short-Term Memory and AutoEncoder Architectures for S...
STOCKGRAM : DEEP LEARNING MODEL FOR DIGITIZING FINANCIAL COMMUNICATIONS VIA N...
STOCKGRAM : DEEP LEARNING MODEL FOR DIGITIZING FINANCIAL COMMUNICATIONS VIA N...
Deep feature based text clustering and its explanation
Cyber bullying detection and analysis.ppt.pdf
Poster Abstracts
S180304116124
Building a recommendation system based on the job offers extracted from the w...
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
14420-Article Text-17938-1-2-20201228.pdf
Identifying Hot Topic Trends in Streaming Text Data Using News Sequential Evo...
Meaning as Collective Use: Predicting Semantic Hashtag Categories on Twitter
Deepfake Detection on Social Media Leveraging Deep Learning and FastText Embe...
Ad

More from Shakas Technologies (20)

DOCX
A Review on Deep-Learning-Based Cyberbullying Detection
DOCX
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
DOCX
A Novel Framework for Credit Card.
DOCX
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
DOCX
NS2 Final Year Project Titles 2023- 2024
DOCX
MATLAB Final Year IEEE Project Titles 2023-2024
DOCX
Latest Python IEEE Project Titles 2023-2024
DOCX
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
DOCX
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
DOCX
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
DOCX
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
DOCX
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
DOCX
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
DOCX
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
DOCX
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
DOCX
Fighting Money Laundering With Statistics and Machine Learning.docx
DOCX
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
DOCX
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
DOCX
Effective Software Effort Estimation Leveraging Machine Learning for Digital ...
A Review on Deep-Learning-Based Cyberbullying Detection
A Personal Privacy Data Protection Scheme for Encryption and Revocation of Hi...
A Novel Framework for Credit Card.
A Comparative Analysis of Sampling Techniques for Click-Through Rate Predicti...
NS2 Final Year Project Titles 2023- 2024
MATLAB Final Year IEEE Project Titles 2023-2024
Latest Python IEEE Project Titles 2023-2024
EMOTION RECOGNITION BY TEXTUAL TWEETS CLASSIFICATION USING VOTING CLASSIFIER ...
CYBER THREAT INTELLIGENCE MINING FOR PROACTIVE CYBERSECURITY DEFENSE
Detecting Mental Disorders in social Media through Emotional patterns-The cas...
COMMERCE FAKE PRODUCT REVIEWS MONITORING AND DETECTION
CO2 EMISSION RATING BY VEHICLES USING DATA SCIENCE
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Optimizing Numerical Weather Prediction Model Performance Using Machine Learn...
Nature-Based Prediction Model of Bug Reports Based on Ensemble Machine Learni...
Multi-Class Stress Detection Through Heart Rate Variability A Deep Neural Net...
Fighting Money Laundering With Statistics and Machine Learning.docx
Explainable Artificial Intelligence for Patient Safety A Review of Applicatio...
Ensemble Deep Learning-Based Prediction of Fraudulent Cryptocurrency Transact...
Effective Software Effort Estimation Leveraging Machine Learning for Digital ...

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Spectroscopy.pptx food analysis technology
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
The AUB Centre for AI in Media Proposal.docx
Building Integrated photovoltaic BIPV_UPV.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Dropbox Q2 2025 Financial Results & Investor Presentation
Chapter 3 Spatial Domain Image Processing.pdf
Understanding_Digital_Forensics_Presentation.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Network Security Unit 5.pdf for BCA BBA.
Per capita expenditure prediction using model stacking based on satellite ima...
Machine learning based COVID-19 study performance prediction
Unlocking AI with Model Context Protocol (MCP)
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Review of recent advances in non-invasive hemoglobin estimation
Spectroscopy.pptx food analysis technology
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf

Tweet segmentation and its application to named entity recognition

  • 1. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com TWEET SEGMENTATION AND ITS APPLICATION TO NAMED ENTITY RECOGNITION ABSTRACT: Twitter has attracted millions of users to share and disseminate most up-to-date information, resulting in large volumes of data produced everyday. However, many applications in Information Retrieval (IR) and Natural Language Processing (NLP) suffer severely from the noisy and short nature of tweets. In this paper, we propose a novel framework for tweet segmentation in a batch mode, called HybridSeg. By splitting tweets into meaningful segments, the semantic or context information is well preserved and easily extracted by the downstream applications. HybridSeg finds the optimal segmentation of a tweet by maximizing the sum of the stickiness scores of its candidate segments. The stickiness score considers the probability of a segment being a phrase in English (i.e., global context) and the probability of a segment being a phrase within the batch of tweets (i.e., local context). For the latter, we propose and evaluate two models to derive local context by considering the linguistic features and term-dependency in a batch of tweets, respectively. HybridSeg is also designed to iteratively learn from confident segments as pseudo feedback. Experiments on two tweet data sets show that tweet segmentation quality is significantly improved by learning both global and local contexts compared with using global context alone. Through analysis and comparison, we show that local linguistic features are more reliable for learning local context compared with term-dependency. As an application, we show that high accuracy is achieved in named entity recognition by applying segment-based part-of-speech (POS) tagging.
  • 2. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com EXISTING SYSTEM:  Many existing NLP techniques heavily rely on linguistic features, such as POS tags of the surrounding words, word capitalization, trigger words (e.g., Mr., Dr.), and gazetteers. These linguistic features, together with effective supervised learning algorithms (e.g., hidden markov model (HMM) and conditional random field (CRF)), achieve very good performance on formal text corpus. However, these techniques experience severe performance deterioration on tweets because of the noisy and short nature of the latter.  In Existing System, to improve POS tagging on tweets, Ritter et al. train a POS tagger by using CRF model with conventional and tweet-specific features. Brown clustering is applied in their work to deal with the ill-formed words. DISADVANTAGES OF EXISTING SYSTEM:  Given the limited length of a tweet (i.e., 140 characters) and no restrictions on its writing styles, tweets often contain grammatical errors, misspellings, and informal abbreviations.  The error-prone and short nature of tweets often make the word-level language models for tweets less reliable. PROPOSED SYSTEM:  In this paper, we focus on the task of tweet segmentation. The goal of this task is to split a tweet into a sequence of consecutive n-grams, each of which is called a segment. A segment can be a named entity (e.g., a movie title “finding nemo”), a semantically meaningful information unit (e.g., “officially released”), or any other types of phrases which appear “more than by chance”
  • 3. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  To achieve high quality tweet segmentation, we propose a generic tweet segmentation framework, named HybridSeg. HybridSeg learns from both global and local contexts, and has the ability of learning from pseudo feedback.  Global context. Tweets are posted for information sharing and communication. The named entities and semantic phrases are well preserved in tweets.  Local context. Tweets are highly time-sensitive so that many emerging phrases like “She Dancin” cannot be found in external knowledge bases. However, considering a large number of tweets published within a short time period (e.g., a day) containing the phrase, it is not difficult to recognize “She Dancin” as a valid and meaningful segment. We therefore investigate two local contexts, namely local linguistic features and local collocation. ADVANTAGES OF PROPOSED SYSTEM:  Our work is also related to entity linking (EL). EL is to identify the mention of a named entity and link it to an entry in a knowledge base like Wikipedia.  Through our framework, we demonstrate that local linguistic features are more reliable than term-dependency in guiding the segmentation process. This finding opens opportunities for tools developed for formal text to be applied to tweets which are believed to be much more noisy than formal text.  Helps in preserving Semantic meaning of tweets. ALGORITHM EXPLANATION:  As an application of tweet segmentation, we propose and evaluate two segment-based NER algorithms. Both algorithms are unsupervised in nature and take tweet segments as input.  One algorithm exploits co-occurrence of named entities in targeted Twitter streams by applying random walk (RW) with the assumption that named entities are more likely to co-occur together.
  • 4. 1. #13/ 19, 1st Floor, Municipal Colony, Kangayanellore Road, Gandhi Nagar, vellore – 6. Off: 0416-2247353 / 6066663 Mo: +91 9500218218 /8870603602, Project Titles: http://shakastech.weebly.com/2015-2016-titles Website: www.shakastech.com, Email - id: shakastech@gmail.com, info@shakastech.com  The other algorithm utilizes Part-of-Speech (POS) tags of the constituent words in segments. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL