Skip to content

Improving sentiment analysis of Arabic tweets

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Twitter popularity grew rapidly the last years and become a place where people express their opinions, views, feelings and ideas. This popularity and the vast amount of information triggered the interest of companies as well as researchers on sentiment analysis trying to export meaningful results from this information. Even if there is a tremendous amount of work on Latin originated languages, such as English, there is not much research available on native languages such as Arabic, Greek etc. This research aims to develop a new system able to bridge the gap in Arabic users and sentiment analysis by providing a novel dictionary able to classify Arabic Tweets with different Arabic dialects and emotions, as positive, negative or natural. The study provides a quantitative analysis to gain an in-depth understanding of the phenomenon under investigation and the findings of the study show that the designed system is very promising.
Original languageEnglish
Title of host publicationSecurity in Computing and Communications
EditorsSabu M. Thampi, Gregorio Martinez Perez, Ryan Ko, Danda B. Rawat
Place of PublicationSingapore
PublisherSpringer
Pages146-158
Number of pages13
ISBN (Electronic)978-981-15-4825-3
ISBN (Print)978-981-15-4824-6
DOIs
Publication statusPublished - 26 Apr 2020
Event7th International Symposium on Security in Computing and Communication - Trivandrum, India
Duration: 18 Dec 201921 Dec 2019

Publication series

NameCommunications in Computer and Information Science
PublisherSpringer
Volume1208
ISSN (Print)1865-0929
ISSN (Electronic)1865-0937

Conference

Conference7th International Symposium on Security in Computing and Communication
Abbreviated titleSSCC 2019
CountryIndia
CityTrivandrum
Period18/12/1921/12/19

Documents

  • Arabic_sentiment_analysis_springer

    Rights statement: his is a post-peer-review, pre-copyedit version of an article published in Security in Computing and Communications. The final authenticated version is available online at: http://dx.doi.org/10.1007/978-981-15-4825-3_12.

    Accepted author manuscript (Post-print), 178 KB, PDF document

    Due to publisher’s copyright restrictions, this document is not freely available to download from this website until: 26/04/21

Related information

Relations Get citation (various referencing formats)

ID: 21094593