Detection of Economy-Related Turkish Tweets Based on Machine Learning Approaches

Detection of Economy-Related Turkish Tweets Based on Machine Learning Approaches

Jale Bektaş
DOI: 10.4018/978-1-7998-8413-2.ch008
OnDemand:
(Individual Chapters)
Available
$33.75
List Price: $37.50
10% Discount:-$3.75
TOTAL SAVINGS: $3.75

Abstract

Conducting NLP for Turkish is a lot harder than other Latin-based languages such as English. In this study, by using text mining techniques, a pre-processing frame is conducted in which TF-IDF values are calculated in accordance with a linguistic approach on 7,731 tweets shared by 13 famous economists in Turkey, retrieved from Twitter. Then, the classification results are compared with four common machine learning methods (SVM, Naive Bayes, LR, and integration LR with SVM). The features represented by the TF-IDF are experimented in different N-grams. The findings show the success of a text classification problem is relative with the feature representation methods, and the performance superiority of SVM is better compared to other ML methods with unigram feature representation. The best results are obtained via the integration method of SVM with LR with the Acc of 82.9%. These results show that these methodologies are satisfying for the Turkish language.
Chapter Preview
Top

There exists a variety of ML algorithms and they all have a potential to show high speed, high performance operations. Thus, ML has been a go to strategy for a variety of researchers. In a study of comparative analysis for phishing detection, the objective is to train ML algorithms by categorizing the hyperlink specific features (Jain & Gupta, 2019), and it is found that more than 98.4% Accuracy is achieved in the logistic regression classifier. Furthermore, Ouaguid et al. (2018) lay out a framework consisting of two blockchains that allows the analysis of the desired permissions in an Android application, and acts as the registry for permissions. Lastly, Gou et al. (2017) provide a comparative analysis with ML for security threats and attacks in cloud computing and various solutions to deal with these problems.

Complete Chapter List

Search this Book:
Reset