Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Mining Social Media Data using Naive Bayes Algorithm

Published on June 2015 by Swapnaja Suryawanshi, Ekta Pawar, Pranali Shendekar, Kajal Lokhande, Apeksha Mengade
National Conference on Emerging Trends in Advanced Communication Technologies
Foundation of Computer Science USA
NCETACT2015 - Number 3
June 2015
Authors: Swapnaja Suryawanshi, Ekta Pawar, Pranali Shendekar, Kajal Lokhande, Apeksha Mengade
7e0d1c67-a87a-4674-bb05-7841eccdd23e

Swapnaja Suryawanshi, Ekta Pawar, Pranali Shendekar, Kajal Lokhande, Apeksha Mengade . Mining Social Media Data using Naive Bayes Algorithm. National Conference on Emerging Trends in Advanced Communication Technologies. NCETACT2015, 3 (June 2015), 18-19.

@article{
author = { Swapnaja Suryawanshi, Ekta Pawar, Pranali Shendekar, Kajal Lokhande, Apeksha Mengade },
title = { Mining Social Media Data using Naive Bayes Algorithm },
journal = { National Conference on Emerging Trends in Advanced Communication Technologies },
issue_date = { June 2015 },
volume = { NCETACT2015 },
number = { 3 },
month = { June },
year = { 2015 },
issn = 0975-8887,
pages = { 18-19 },
numpages = 2,
url = { /proceedings/ncetact2015/number3/20997-2038/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Emerging Trends in Advanced Communication Technologies
%A Swapnaja Suryawanshi
%A Ekta Pawar
%A Pranali Shendekar
%A Kajal Lokhande
%A Apeksha Mengade
%T Mining Social Media Data using Naive Bayes Algorithm
%J National Conference on Emerging Trends in Advanced Communication Technologies
%@ 0975-8887
%V NCETACT2015
%N 3
%P 18-19
%D 2015
%I International Journal of Computer Applications
Abstract

Online services provide a range of opportunities for understanding human behavior through the large aggregate data sets that there operation collects. Social network services have become a viable source of information for users. Studying the characteristics of such popular message is important for a number of tasks such as, breaking news detection, personalized message recommendation, others. We formulate the task into the classification problem and study two of its variants by investigating a wide spectrum of features based on the contents of messages, temporal information, metadata of messages and users, as well as structural properties of the user's social graph on large scale dataset. Students' informal conversations on social media shed light into their educational experiences opinions, feelings, and concerns about the learning process. Data from such instrumented environments can provide valuable knowledge to inform student learning. Analyzing such data, however, can be challenging. The complexity of students' experiences reflected from social media content requires human interpretation. However, the growing scale of data demands automatic data analysis techniques. In this paper, we developed a workflow to integrate both qualitative analysis and large-scale data mining techniques. We focused on engineering students' Twitter posts to understand issues and problems in their educational experiences.

References
  1. E. Goffman, The Presentation of Self in Everyday Life. Lightning Source Inc, 1959.
  2. E. Pearson, "All the World Wide Web's a Stage: The performance of identity in online social networks," First Monday, vol. 14, no. 3, pp. 1–7, 2009.
  3. J. M. DiMicco and D. R. Millen, "Identity management: multiple presentations of self in facebook," in Proceedings of the 2007 international ACM conference on Supporting group work, 2007, pp. 383–386.
  4. M. Vorvoreanu and Q. Clark, "Managing identity across social networks," in Poster session at the 2010 ACM Conference on Computer Supported Cooperative Work, 2010.
  5. M. Vorvoreanu, Q. M. Clark, and G. A. Boisvenue, "Online Identity Management Literacy for Engineering and Technology Students," Journal of Online Engineering Education, vol. 3, no. 1, 2012.
  6. M. Ito, H. Horst, M. Bittanti, danah boyd, B. Herr-Stephenson, P. G. Lange, S. Baumer, R. Cody, D. Mahendran, K. Martinez, D. Perkel, C. Sims, and L. Tripp, "Living and Learning with New Media: Summary of Findings from the Digital Youth Project," The John D. and Catherine T. MacAuthur Foundation, Nov. 2008.
  7. D. Gaffney, "#iranElection: Quantifying Online Activism," in WebSci10: Extending the Frontier of Society On-Line, Raleigh, NC, 2010.
  8. S. Jamison-Powell, C. Linehan, L. Daley, A. Garbett, and S. Lawson, "'I can't get no sleep': Discussing #insomnia on Twitter," in Proceedings of the 2012 ACM annual conference on Human Factors in Computing Systems, 2012, pp. 1501–1510.
  9. M. J. Culnan, P. J. McHugh, and J. I. Zubillaga, "How large US companies can use Twitter and other social media to gain business value," MIS Quarterly Executive, vol. 9, no. 4, pp. 243–259, 2010.
  10. M. E. Hambrick, J. M. Simmons, G. P. Greenhalgh, and T. C. Greenwell, "Understanding professional athletes' use of Twitter: A content analysis of athlete tweets," International Journal of Sport Communication, vol. 3, no. 4, pp. 454–471, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Social Media Classification Educations Computer And Educations