Академический Документы
Профессиональный Документы
Культура Документы
INTRODUCTION
1.1 Overview:
WORD of mouth (WOM) has always been influential on consumer
decision-making. Family and friend are usually asked for advice and
recommendations before any important purchase-decisions are made. These
recommendations can both have short as well as long term influence on consumer
decision-making. With the Web, WOM has greatly expanded. Anyone who wishes
to share their experiences, can now do so electronically. Social media, like Twitter
and Facebook allow for easy ways to exchange statements about products,
services, and brands. The term for this expanded form of WOM is electronic WOM
(EWOM). Over the last few years, EWOM has become increasingly popular.
1
For example, in the following sentence, taken from a restaurant review set,
the fine-grained aspects are “fish,” “rice,” and “seaweed” whereas the aspect
category is “food.” “My goodness, everything from the fish to the rice to the
seaweed was absolutely amazing.” As one can see, aspect categories are usually
implied, that is, the names of the categories are not explicitly mentioned in the
sentence. The same holds for fine-grained aspects: while most of them are referred
to explicitly in a sentence, some are only implied by a sentence.
For example, given the set of aspect categories (food, service, price,
ambience, and anecdotes/miscellaneous), two annotated sentences are as follows.
“The food was great.” → (food) “It is very overpriced and not very tasty.” → (price,
food) As shown in the above examples, aspect categories do not necessarily occur
as explicit terms in sentences. While in the first sentence food, is mentioned
explicitly, in the second sentence it is done implicitly. In our experiments all
sentences are assumed to have at least one aspect category present. Because it may
not always be clear which category applies to a sentence, due to incomplete domain
coverage of the categories and the wide variation of aspects a reviewer can use, a
“default” category is used.
2
An example of a sentence where a default category is used, is
presented below. Here, the second part of the sentence (“but everything else ... is
the pits.”) is too general to classify it as one of the other categories (i.e., food,
service, price, and ambience). “The food is outstanding, but everything else about
this restaurant is the pits.” → (food, anecdotes/miscellaneous) In this paper, both
an unsupervised and a supervised method are proposed that are able to find aspect
categories based on co-occurrence frequencies.
Chapter 1 : Introduction
Technologies used.
3
Chapter 6 : Deals with the Debugging Process of the proposed system
with the Tools used.
Chapter 7 : Here the results of the implemented modules along with
the respective screen shots are provided.
Chapter 8 : Here the Conclusions of the current application are
provided.
4
CHAPTER 2
Node Frame:
Performance Requirements:
ii.Error detection:
5
discovered by using validations to check input data. The system is designed to be a
user friendly one. In other words the system has been designed for the
communication of client and server effectively with the help of different routers.
Portability:
Reliability:
6
Reusability:
Robustness:
Testability:
Usability:
Security:
Software Specifications:
7
Hardware Specifications:
8
CHAPTER 3
SYSTEM ANALYSIS
9
3.3 Preliminary Investigation:
Request Clarification
Feasibility Study
Request Approval
Here our project is basically meant for users within the company
whose systems can be interconnected by the Local Area Network(LAN). In today’s
busy schedule man need everything should be provided in a readymade manner. So
taking into consideration of the vastly use of the net in day to day life, the
corresponding development of the portal came into existence.
10
Operational Feasibility
Economic Feasibility
Technical Feasibility
Operational Feasibility:
Operational Feasibility deals with the study of prospects of the
system to be developed. This system operationally eliminates all the tensions of the
Admin and helps him in effectively tracking the project progress. This kind of
automation will surely reduce the time and energy, which previously consumed in
manual work. Based on the study, the system is proved to be operationally feasible.
Economic Feasibility:
Technical Feasibility:
According to Roger S. Pressman, Technical Feasibility is the
assessment of the technical resources of the organization. The organization
needs IBM compatible machines with a graphical web browser connected to
the Internet and Intranet. The system is developed for platform Independent
environment. Java Server Pages, JavaScript, HTML, SQL server and WebLogic
Server are used to develop the system. The technical feasibility has been
carried out. The system is technically feasible for development and can be
developed with the existing facility.
11
3.3.3 Request Approval:
12
CHAPTER 4
SYSTEM DESIGN
4. 1 Introduction:
Input Design:
This system has input screens in almost all the modules. Error
messages are developed to alert the user whenever he commits some mistakes and
guides him in the right way so that invalid entries are not made. Let us see deeply
about this under module design.
Input design is the process of converting the user created input into
a computer-based format. The goal of the input design is to make the data entry
logical and free from errors. The error is in the input are controlled by the input
design. The application has been developed in user-friendly manner. The forms
13
have been designed in such a way during the processing the cursor is placed in the
position where must be entered. The user is also provided with in an option to select
an appropriate input from various alternatives related to the field in certain cases.
Output Design:
The application starts running when it is executed for the first time.
The server has to be started and then the internet explorer in used as the browser.
The project will run on the local area network so the server machine will serve as
the administrator while the other connected systems can act as the clients. The
developed system is highly user friendly and can be easily understood by anyone
using it even for the first time.
14
design methods into a unified method the unified modeling language, the version
1.0 for the Unified Modeling was released in January 1997 the main parts of UML
are based on the Booch, OMT and OOSE methods.
UML Specifying
Specifying means building models that are precise, unambiguous
and complete. In particular, the UML address the specification of all the important
analysis, design and implementation decisions that must be made in developing and
displaying a software intensive system.
UML Visualization
The UML includes both graphical and textual representation. It
makes easy to visualize the system and for better understanding.
UML Constructing:
UML Documenting:
15
Fig 4.1(a) Modeling a System Architecture using views of UML
The use case view of a system encompasses the use cases that describe the behavior
of the system as seen by its end users, analysts, and testers.
The design view of a system encompasses the classes, interfaces, and collaborations
that form the vocabulary of the problem and its solution.
The process view of a system encompasses the threads and processes that form the
system's concurrency and synchronization mechanisms.
The implementation view of a system encompasses the components and files that
are used to assemble and release the physical system. The deployment view of a
system encompasses the nodes that form the system's hardware topology on which
the system executes.
16
Fig 4.1(b) Types of UML diagrams
Things
Relationships
Diagrams
Things:
Things are the data abstractions that are first class citizens in a
model. Things are of 4 types Structural Things, Behavioral Thin , Grouping Things,
An notational Things
Relationships:
17
4.2 UML Diagrams
Structural
Behavioral Diagrams.
Structural Diagrams:
Behavioral Diagrams:
An actor is represents a user or another system that will interact with the
system you are modeling. A use case is an external view of the system that
18
represents some action the user might perform in order to complete a task.
Contents:
Use cases
Actors
Dependency, Generalization, and association relationships
System boundary
19
4.2.2 Class Diagram:
20
Product Admin
Add Category, Add Post , View All Posts , View Friend Request and
Response, View All Post Reviews, View Post Sentiment Analysis, View All
Methods Post Recommends, View Positive Reviews Results, View Negative Reviews
Results
Members Select Category, Title Name, Price for 1 Plate, Uses, Description, Select
Image, Title Owner, Title Published Date and Time
Login
Login (), Reset (), Register
Register ().
Methods
User Name, Password.
Methods Register (), Reset ()
User
View Your Profile, Search Friend, View Friend Request, View All My
Methods Friends, Search Post, View Recommended Posts, Manage Account,
Purchase Confirmation, View Purchased Products
Members
Select Category, Title Name, Price for 1 Plate, Uses, Description, Select
Image, Title Owner, Title Published Date and Time
21
4.2.3 Sequence Diagram
22
4.2.4 Data Flow Chart Diagram
23
4.2.5 Flow Chart Diagram
24
Figure 4.2.5 User Data Flow Diagram
25
CHAPTER 5
SYSTEM IMPLEMENTATION
5.1 Introduction
Implementation is the realization of an application, or execution of
a plan, idea, model, design, specification, standard, algorithm, or policy.
Java has been around since 1991, developed by a small team of Sun
Microsystems developers in a project originally called the Green project. The intent
of the project was to develop a platform-independent software technology that
would be used in the consumer electronics industry. The language that the team
created was originally called Oak.
26
It has only been since 1994 that Oak technology has been applied to
the Web. In 1994, two Sun developers created the first version of Hot Java, and
then called Web Runner, which is a graphical browser for the Web that exists today.
The browser was coded entirely in the Oak language, by this time called Java. Soon
after, the Java compiler was rewritten in the Java language from its original C code,
thus proving that Java could be used effectively as an application language. Sun
introduced Java in May 1995 at the Sun World 95 convention.
Simple
Architecture neutral
Object oriented
Portable
Distributed
High performance
Interpreted
Multithreaded
Robust
Dynamic
Secure
With most programming languages, you either compile or interpret a program so
that you can run it on your computer. The Java programming language is unusual
in that a program is both compiled and interpreted. With the compiler, first you
27
translate a program into an intermediate language called Java byte codes —the
platform-independent codes interpreted by the interpreter on the Java platform. The
interpreter parses and runs each Java byte code instruction on the computer.
Compilation happens just once; interpretation occurs each time the program is
executed. The following figure illustrates how this works.
28
The Java platform has two components:
You’ve already been introduced to the Java VM. It’s the base for the
Java platform and is ported onto various hardware-based platforms.
Native code is code that after you compile it, the compiled code runs
on a specific hardware platform. As a platform-independent environment, the Java
platform can be a bit slower than native code. However, smart compilers, well-
tuned interpreters, and just-in-time bytecode compilers can bring performance close
to that of native code without threatening portability.
29
Working of Java:
Swing:
Introduction to Swing:
Swing contains all the components. It’s a big library, but it’s
designed to have appropriate complexity for the task at hand – if something is
simple, you don’t have to write much code but as you try to do more your code
becomes increasingly complex. This means an easy entry point, but you’ve got the
power if you need it.
30
Benefits of Swing:
Swing could be called “orthogonality of use;” that is, once you pick
up the general ideas about the library you can apply them everywhere. Primarily
because of the Beans naming conventions.
5.2.2 J2EE :
Client – Server :
Over view:
31
server solution. The growth in the client server development tools from $200
million in 1992 to more than $1.2 billion in 1996.
The key client server idea is that client as user is essentially insulated
from the physical location and formats of the data needs for their application. With
the proper middleware, a client input from or report can transparently access and
manipulate both local database on the client machine and remote databases on one
or more servers. An added bonus is the client server opens the door to multi-vendor
database access indulging heterogeneous table joins.
Two prominent systems in existence are client server and file server
systems. It is essential to distinguish between client servers and file server systems.
Both provide shared network access to data but the comparison dens there! The file
server simply provides a remote disk drive that can be accessed by LAN
applications on a file by file basis. The client server offers full relational database
services such as SQL-Access, Record modifying, Insert, Delete with full relational
integrity backup/ restore performance for high volume of transactions, etc. the
client server middleware provides a flexible interface between client and server,
who does what, when and to whom.
32
Why Client Server?
Client server has evolved to solve a problem that has been around
since the earliest days of computing: how best to distribute your computing, data
generation and data storage resources in order to obtain efficient, cost effective
departmental an enterprise wide data processing. During mainframe era choices
were quite limited. A central machine housed both the CPU and DATA (cards,
tapes, drums and later disks). Access to these resources was initially confined to
batched runs that produced departmental reports at the appropriate intervals. A
strong central information service department ruled the corporation. The role of the
rest of the corporation limited to requesting new or more frequent reports and to
provide hand written forms from which the central data banks were created and
updated. The earliest client server solutions therefore could best be characterized
as “SLAVE-MASTER”.
The browser specific components are designed by using the HTML standards, and
the dynamism of the designed by concentrating on the constructs of the Java Server
Pages.
33
Communication or Database Connectivity Tier
JAVASCRIPT
<SCRIPTS>..</SCRIPT>
34
JavaScript statements
</SCRIPT>
JavaScript Vs Java
Java applets are generally displayed in a box within the web document;
JavaScript can affect any part of the Web document itself.
While JavaScript is best suited to simple applications and adding
interactive features to Web pages; Java can be used for incredibly
complex applications.
There are many other differences but the important thing to
remember is that JavaScript and Java are separate languages. They are both useful
for different things; in fact they can be used together to combine their advantages.
ADVANTAGES
35
Hyper Text Markup Language
36
<BODY>…</BODY> Contains all
tags and text in the HTML document
<FRAME>...</FRAME> Defines a
particular frame in a set of frames
37
ADVANTAGES:
A HTML document is small and hence easy to send over the net. It is
small because it does not include formatted information.
HTML is platform independent.
HTML tags are not case-sensitive.
Java Database Connectivity
What Is JDBC?
38
relational databases. It offers the ability to connect to almost all databases on almost
all platforms.
So why not just use ODBC from Java? The answer is that you can
use ODBC from Java, but this is best done with the help of JDBC in the form of
the JDBC-ODBC Bridge, which we will cover shortly. The question now becomes
"Why do you need JDBC?" There are several answers to this question:
ODBC is not appropriate for direct use from Java because it uses a C interface.
Calls from Java to native C code have a number of drawbacks in the security,
implementation, robustness, and automatic portability of applications.
A literal translation of the ODBC C API into a Java API would not be
desirable. For example, Java has no pointers, and ODBC makes copious use
of them, including the notoriously error-prone generic pointer "void *". You
can think of JDBC as ODBC translated into an object-oriented interface that
is natural for Java programmers.
ODBC is hard to learn. It mixes simple and advanced features together, and
it has complex options even for simple queries. JDBC, on the other hand, was
designed to keep simple things simple while allowing more advanced
capabilities where required.
A Java API like JDBC is needed in order to enable a "pure Java" solution.
When ODBC is used, the ODBC driver manager and drivers must be
manually installed on every client machine. When the JDBC driver is written
completely in Java, however, JDBC code is automatically installable,
portable, and secure on all Java platforms from network computers to
mainframes.
39
Two-tier and Three-tier Models
The JDBC API supports both two-tier and three-tier models for
database access. In the two-tier model, a Java applet or application talks directly to
the database. This requires a JDBC driver that can communicate with the particular
database management system being accessed. A user's SQL statements are
delivered to the database, and the results of those statements are sent back to the
user. The database may be located on another machine to which the user is
connected via a network. This is referred to as a client/server configuration, with
the user's machine as the client, and the machine housing the database as the server.
The network can be an Intranet, which, for example, connects employees within a
corporation, or it can be the Internet.
JAVA
Client machine
Application
DBMS-proprietary protocol
JDBC
Database server
DBMS
In the three-tier model, commands are sent to a "middle tier" of
services, which then send SQL statements to the database. The database processes
the SQL statements and sends the results back to the middle tier, which then sends
them to the user. MIS directors find the three-tier model very of updates that can
Java applet or
Client machine (GUI)
Html browser
Application
Server (Java) Server machine
JDBC
Database server
DBMS
40
be made to corporate data. Another advantage is that when there is a middle tier,
the user can employ an easy-to-use higher-level API which is translated by the
middle tier into the appropriate low-level calls. Finally, in many cases the three-tier
architecture can provide performance advantages.
Until now the middle tier has typically been written in languages
such as C or C++, which offer fast performance. However, with the introduction of
optimizing compilers that translate Java byte code into efficient machine-specific
code, it is becoming practical to implement the middle tier in Java. This is a big
plus, making it possible to take advantage of Java's robustness, multithreading, and
security features. JDBC is important to allow database access from a Java middle
tier.
The JDBC drivers that we are aware of at this time fit into one of
four categories:
JDBC-ODBC Bridge
If possible, use a Pure Java JDBC driver instead of the Bridge and
an ODBC driver. This completely eliminates the client configuration required by
ODBC. It also eliminates the potential that the Java VM could be corrupted by an
error in the native code brought in by the Bridge (that is, the Bridge native library,
the ODBC driver manager library, the ODBC driver library, and the database client
library).
41
What Is the JDBC- ODBC Bridge?
Features of JSP
Portability:
Java Server Pages files can be run on any web server or web-enabled
application server that provides support for them. Dubbed the JSP engine, this
support involves recognition, translation, and management of the Java Server Page
lifecycle and its interaction components.
Components
It was mentioned earlier that the Java Server Pages architecture can
include reusable Java components. The architecture also allows for the embedding
of a scripting language directly into the Java Server Pages file. The components
current supported include Java Beans, and Servlets.
42
Processing
Access Models:
In both of the above cases, the page could also contain any valid
Java code. Java Server Pages architecture encourages separation of content from
presentation.
The client sends a request to the web server for a JSP file by giving the name
of the JSP file within the form tag of a HTML page.
JSP engine is program which can understands the tags of the jsp and then it
converts those tags into a Servlet program and it is stored at the server side.
This Servlet is loaded in the memory and then it is executed and the result
is given back to the JavaWebServer and then it is transferred back to the
43
result is given back to the JavaWebServer and then it is transferred back to
the client.
JDBC connectivity
Manager transactions
44
45
5.2.3 Networking:
TCP/IP stack:
Fig :5.2.3.1
IP datagram’s :
UDP:
UDP is also connectionless and unreliable. What it adds to IP is a
checksum for the contents of the datagram and port numbers. These are used to give
a client/server model .
46
TCP:
TCP supplies logic to give a reliable connection-oriented protocol
above IP. It provides a virtual circuit that two processes can use to communicate.
Internet addresses:
In order to use a service, you must be able to find it. The Internet
uses an address scheme for machines so that they can be located. The address is a
32 bit integer which gives the IP address. This encodes a network ID and more
addressing. The network ID falls into various classes according to the size of the
network address.
Network address:
Class A uses 8 bits for the network address with 24 bits left over for
other addressing. Class B uses 16 bit network addressing. Class C uses 24 bit
network addressing and class D uses all 32.
Subnet address:
Internally, the UNIX network is divided into sub networks. Building
11 is currently on one sub network and uses 10-bit addressing, allowing 1024
different hosts.
Host address:
8 bits are finally used for host addresses within our subnet. This
places a limit of 256 machines that can be on the subnet.
47
Total address:
Fig :5.2.3.2
5.3 Modules:
48
B exists when both A and B have a direct relation with a third word C. This indicates
that A and B could be substitutes for each other, even though their semantics might
not be the same. Without checking for indirect relations, substitutes are usually not
found since they do not co-occur often together.
5.3.3 SENTIMENT ANALYSIS:
Sentiment analysis is a type of data mining that measures the
inclination of people’s opinions through natural language processing (NLP),
computational linguistics and text analysis, which are used to extract and analyze
subjective information from the Web - mostly social media and similar sources.
Algorithm :
Spreading Activation Algorithm: The data network structure used for the
spreading activation algorithm will consist of vertices that represent the notional
words, and links between two vertices representing a strictly positive co-occurrence
frequency. Each link represents the direct relation between two notional words and
receives weight equal to the conditional probability that word A co-occurs with
word B, given that B appears in a sentence. This also means that the links receive
direction as the conditional probability is not symmetric, making the data network
structure a co-occurrence digraph.
49
Clustering Algorithm: Clustering analysis has been an emerging research
issue in data mining due its variety of applications. With the advent of many data
clustering algorithms in the recent few years and its extensive use in wide variety
of applications, including image processing, computational biology, mobile
communication, medicine and economics, has lead to the popularity of this
algorithms. Main problem with the data clustering algorithms is that it cannot be
standardized. Algorithm developed may give best result with one type of data set
but may fail or give poor result with data set of other types. Although there has been
many attempts for standardizing the algorithms which can perform well in all case
of scenarios but till now no major accomplishment has been achieved. Many
clustering algorithms have been proposed so far. However, each algorithm has its
own merits and demerits and cannot work for all real situations.
50
5.4 Sample code :
REGISTRATION CODE :
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Product Category</title>
<style type="text/css">
<!--
.style4 {
font-size: 18px;
color: #FFFFFF;
-->
</style>
</head>
<body>
51
<div id="templatemo_top_panel">
<div id="templatemo_top_section">
</div>
<div id="templatemo_menu">
<ul>
</ul>
<div id="templatemo_content_panel">
<div id="templatemo_content_section">
<div id="templatemo_content_left">
<div id="left_column_section">
<div id="left_column_section_top"></div>
<div id="left_column_section_middle">
<div class="popular_post">
52
<h1>» <a href="View_Authorize_users.jsp">View and Authorizel Users </a>
</h1>
</div>
<div class="popular_post">
</div>
</div>
</div>
<div id="templatemo_content_right">
<div class="right_column_section">
<div class="right_column_section_title">
</div>
<div class="right_column_section_body">
<span class="style18">
<%
53
FileInputStream fs=null;
try {
while (params.hasMoreElements())
if(paramname.equalsIgnoreCase("categorie"))
categorie=multi.getParameter(paramname);
Statement st1=connection.createStatement();
ResultSet rs1=st1.executeQuery(query1);
if ( rs1.next() )
%>
</span>
</p>
<p> </p>
54
<p>
<%
else
if(!categorie.equals(""))
connection.createStatement().executeUpdate(strQuery2);
%><p class="style37">Category Added
Successfully..</p>
</p>
<p> </p>
<%
else
<p class="style37"> </p>
55
</p>
<%
catch (Exception e)
out.println(e.getMessage());
%>
</div>
</div>
<div class="right_column_section">
<div class="right_column_section_body"></div>
</div>
<div class="cleaner_with_height"> </div>
<div id="templatemo_bottom_panel">
<div id="templatemo_bottom_section"></div>
</div>
<div id="templatemo_footer_panel">
56
</div> <!-- end of footer panel -->
</body>
57
SAMPLE CODE 2 :
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>User Register</title>
<style type="text/css">
<!--
-->
</style>
</head>
<body>
<div id="templatemo_top_panel">
<div id="templatemo_top_section">
58
<div align="right">S<span class="style3">upervised and Unsupervised Aspect Category
Detection for <br />
</div>
<div id="templatemo_menu">
<ul>
</ul>
<div id="templatemo_content_panel">
<div id="templatemo_content_section">
<div id="templatemo_content_left">
<div id="login_section">
<div id="login_section_top"></div>
<div id="login_section_bottom"></div>
</div>
<div id="left_column_section">
<div id="left_column_section_top"></div>
<div id="left_column_section_title">Concepts</div>
<div id="left_column_section_middle">
<div class="popular_post">
59
</div>
<div class="popular_post">
<h1>»Consumer reviews</h1>
</div>
<div class="popular_post">
</div>
<div class="popular_post">
</div>
</div>
</div>
<div id="templatemo_content_right">
<div class="right_column_section">
<div class="right_column_section_title">
<div class="right_column_section_body">
<p class="style33">
</p>
<span class="style33">
</span>
60
<p class="style33">
</p>
<span class="style33">
</span>
<p class="style33">
</p>
<span class="style33">
</span>
<p class="style33">
</p>
<span class="style33">
</span>
<p class="style33">
</p>
<span class="style33">
</label>
</span>
<p class="style33">
61
<input id="dob" name="dob" class="text" />
</p>
<span class="style33">
</span>
<p class="style33">
<option>--Select--</option>
<option>MALE</option>
<option>FEMALE</option>
</select>
</p>
<span class="style33">
<label for="pincode"></label>
<label for="location"></label>
</span>
<p class="style33">
</p>
<p><br />
</p>
<p> </p>
</form>
<div class="cleaner"> B</div>
62
</div>
</div>
<div class="right_column_section">
<div class="right_column_section_body"></div>
</div>
<div class="right_column_section">
<div class="right_column_section_body">
</div>
</div>
<div class="cleaner_with_height"> </div>
<div id="templatemo_bottom_panel">
<div id="templatemo_bottom_section"></div>
</div>
<div id="templatemo_footer_panel">
</html>
63
CHAPTER 6
SYSTEM TESTING
6.1 Introduction:
Test objectives
64
The entry screen, messages and responses must not be delayed.
Features to be tested
UNIT TESTING
MODULE
TESTING
SYSTEM
TESTING
Integration Testing
ACCEPTANCE
User Testing TESTING
65
Unit testing:
Unit testing involves the design of test cases that validate that the
internal program logic is functioning properly, and that program inputs produce
valid outputs. All decision branches and internal code flow should be validated. It
is the testing of individual software units of the application .it is done after the
completion of an individual unit before integration. This is a structural testing, that
relies on knowledge of its construction and is invasive. Unit tests perform basic
tests at component level and test a specific business process, application, and/or
system configuration. Unit tests ensure that each unique path of a business process
performs accurately to the documented specifications and contains clearly defined
inputs and expected results.
Integration testing:
Functional test:
66
Functions : identified functions must be exercised.
System Testing:
67
Black Box Testing:
68
CHAPTER 7
RESULTS
Topology Construction
69
Login Form
70
Registration
71
User menu
72
73
User Menu
74
Search Post and View Response
75
76
77
78
79
80
81
82
CHAPTER 8
83
REFERENCES
P. F. Bone, “Word-of-mouth effects on short-term and long-term product
judgments,” J. Bus. Res., vol. 32, no. 3, pp. 213–223, 1995.
R. Feldman, “Techniques and applications for sentiment analysis,”
Commun. ACM, vol. 56, no. 4, pp. 82–89, 2013.
S. Sen and D. Lerman, “Why are you telling me this? An examination into
negative consumer reviews on the Web,” J. Interact. Marketing, vol. 21, no. 4, pp.
76–94, 2007.
B. Bickart and R. M. Shindler, “Internet forums as influential sources of
consumer information,” J. Consum. Res., vol. 15, no. 3, pp. 31–40, 2001.
D. Smith, S. Menon, and K. Sivakumar, “Online peer and editorial
recommendations, trust, and choice in virtual markets,” J. Interact. Marketing, vol.
19, no. 3, pp. 15–37, 2005.
M. Trusov, R. E. Bucklin, and K. Pauwels, “Effects of word-of-mouth
versus traditional marketing: Findings from an Internet social networking site,” J.
Marketing, vol. 73, no. 5, pp. 90–102, 2009.
M. T. Adjei, S. M. Noble, and C. H. Noble, “The influence of C2C
communications in online brand communities on customer purchase behavior,” J.
Acad. Marketing Sci., vol. 38, no. 5, pp. 634–653, 2010.
B. Pang and L. Lee, “Opinion mining and sentiment analysis,” Found.
Trends Inf. Retrieval, vol. 2, nos. 1–2, pp. 1–135, 2008.
C.-L. Liu, W.-H. Hsaio, C.-H. Lee, G.-C. Lu, and E. Jou, “Movie rating and
review summarization in mobile environment,” IEEE Trans. Syst., Man, Cybern.
C, Appl. Rev., vol. 42, no. 3, pp. 397–407, May 2012.
M. Pontiki et al., “SemEval-2014 Task 4: Aspect based sentiment analysis,”
in Proc. 8th Int. Workshop Semantic Eval. (SemEval), Dublin, Ireland, 2014, pp.
27–35.
S. Kiritchenko, X. Zhu, C. Cherry, and S. M. Mohammad, “NRCCananda-
2014: Detecting aspects and sentiment in customer reviews,” in Proc. 8th Int.
Workshop Semantic Eval. (SemEval), Dublin, Ireland, 2014, pp. 437–442.
84
T. Brychcin, M. Konkol, and J. Steinberger, “UWB: Machine learning
approach to aspect-based sentiment analysis,” in Proc. 8th Int. Workshop Semantic
Eval. (SemEval), Dublin, Ireland, 2014, pp. 817–822.
C. R. C. Brun, D. N. Popa, and C. Roux, “XRCE: Hybrid classification for
aspect-based sentiment analysis,” in Proc. 8th Int. Workshop Semantic Eval.
(SemEval), Dublin, Ireland, 2014, pp. 838–842.
G. Castellucci, S. Filice, D. Croce, and R. Basili, “UNITOR: Aspect based
sentiment analysis with structured learning,” in Proc. 8th Int. Workshop Semantic
Eval. (SemEval), Dublin, Ireland, 2014, pp. 761–767. [15] Z. Hai, K. Chang, and
J.-J. Kim, “Implicit feature identification via co-occurrence association rule
mining,” in Proc. 12th Int. Conf. Comput. Linguist. Intell. Text Process. (CICLing),
Tokyo, Japan, 2011, pp. 393–404. [16] K. Schouten and F. Frasincar, “Survey on
aspect-level sentiment analysis,” IEEE Trans. Knowl. Data Eng., vol. 28, no. 3, pp.
813–830, Mar. 2016.
Q. Su, K. Xiang, H. Wang, B. Sun, and S. Yu, “Using pointwise mutual
information to identify implicit features in customer reviews,” in Computer
Processing of Oriental Languages. Beyond the Orient: The Research Challenges
Ahead (LNCS 4285), Y. Matsumoto, R. Sproat, K.-F. Wong, and M. Zhang, Eds.
Berlin, Germany: Springer, 2006, pp. 22–30.
Q. Su et al., “Hidden sentiment association in Chinese Web opinion
mining,” in Proc. 17th Conf. World Wide Web (WWW), Beijing, China, 2008, pp.
959–968.
X. Zheng, Z. Lin, X. Wang, K.-J. Lin, and M. Song, “Incorporating
appraisal expression patterns into topic modeling for aspect and sentiment word
identification,” Knowl. Based Syst., vol. 61, no. 1, pp. 29–47, 2014. [20] W. Wang,
H. Xu, and W. Wan, “Implicit feature identification via hybrid association rule
mining,” Expert Syst. Appl. Int. J., vol. 40, no. 9, pp. 3518–3531, 2013.
Y. Zhang and W. Zhu, “Extracting implicit features in Online customer
reviews for opinion mining,” in Proc. 22nd Int. Conf. World Wide Web Companion
(WWW Companion), 2013, pp. 103–104.
G. Qiu, B. Liu, J. Bu, and C. Chen, “Opinion word expansion and target
85
extraction through double propagation,” Comput. Linguist., vol. 37, no. 1, pp. 9–
27, 2011.
K. Schouten, F. Frasincar, and F. de Jong, “COMMIT-P1WP3: A co-
occurrence based approach to aspect-level sentiment analysis,” in Proc. 8th Int.
Workshop Semantic Eval. (SemEval), Dublin, Ireland, 2014, pp. 203–207.
A. Garcia-Pablos, M. Cuadros, S. Gaines, and G. Rigau, “V3: Unsupervised
generation of domain aspect terms for aspect based sentiment analysis,” in Proc.
8th Int. Workshop Semantic Eval. (SemEval), Dublin, Ireland, 2014, pp. 833–837.
Z. Wu and M. Palmer, “Verbs semantics and lexical selection,” in Proc.
32nd Annu. Meeting Assoc. Comput. Linquistics, Las Cruces, NM, USA, 1994, pp.
133–138.
F. Crestani, “Application of spreading activation techniques in information
retrieval,” Artif. Intell. Rev., vol. 11, no. 6, pp. 453–482, 1997. [27] S. Bagchi, G.
Biswas, and K. Kawamura, “Task planning under uncertainty using a spreading
activation network,” IEEE Trans. Syst., Man, Cybern. A, Syst., Humans, vol. 30,
no. 6, pp. 639–650, Nov. 2000.
A. Katifori, C. Vassilakis, and A. Dix, “Ontologies and the brain: Using
spreading activation through ontologies to support personal interaction,” Cognitive
Syst. Res., vol. 11, no. 1, pp. 25–41, 2010.
C. D. Manning et al., “The Stanford CoreNLP natural language processing
toolkit,” in Proc. 52nd Annu. Meeting Assoc. Comput. Linguist. Syst.
Demonstrations, 2014, pp. 55–60. [Online]. Available:
http://www.aclweb.org/anthology/P/P14/P14-5010
M.-C. de Marneffe and C. D. Manning, “Stanford typed dependencies
manual,” Stanford NLP Group, Stanford University, Stanford, CA, USA, Tech.
Rep., Sep. 2008. [Online]. Available:
https://nlp.stanford.edu/software/dependencies_manual.pdf
Y. Tang, Y.-Q. Zhang, N. V. Chawla, and S. Krasser, “SVMs modeling for
highly imbalanced classification,” IEEE Trans. Syst., Man, Cybern. B, Cybern.,
vol. 39, no. 1, pp. 281–288, Feb. 2009.
86
87