SlideShare a Scribd company logo
Bulletin of Electrical Engineering and Informatics
Vol. 10, No. 4, August 2021, pp. 2231~2236
ISSN: 2302-9285, DOI: 10.11591/eei.v10i4.2325 2231
Journal homepage: http://beei.org
Data mining applied about polygamy using sentiment analysis
on Twitters in Indonesian perception
Hertina, Muhammad Nurwahid, Haswir, Hendri Sayuti, Amri Darwis, Miftahur Rahman, Rado
Yendra, Muhammad Luthfi Hamzah
Department of Comparison of Mahzab and Law, Universitas Islam Negeri Sultan Syarif Kasim Riau, Indonesia
Article Info ABSTRACT
Article history:
Received Mar 2, 2020
Revised May 20, 2021
Accepted Jun 19, 2021
Polygamy remains one of the interesting key topics in various society,
especially Indonesia. Polygamy is the act of marrying multiple spouses that
means having more one wife at the same time, is common case in worldwide.
In this problem, the most of Muslim in Indonesia adopt Islamic law that let
men to do the polygamy with certain requirements. In worldwide
communities, this has been a prominent feature and has become the subject of
numerous books, heated debates, journal articles, discussion papers, and so
on. Furthermore, in Indonesia the polygamous marriage has recently become a
heated topic. Despite controversy, Indonesia’s law, of recent, allows people
for doing polygamy in certain conditions. Because the polygamy is often
debated, this study focuses on assessment of Indonesian’s perceptions through
sentiment analysis and would determine people’s perception about polygamy
issue from 500 tweets on Twitter. To conclude, it elucidates that the polygamy
in Indonesia is a normal thing and few assume the case is as negative thing.
Keywords:
Data mining
Polygamy
Sentiment analysis
Twitter
This is an open access article under the CC BY-SA license.
Corresponding Author:
Hertina
Department of Comparison of Mahzab and Law
Faculty of Sharia and Law Studies
Universitas Islam Negeri Sultan Syarif Kasim Riau, Indonesia
Email: hertina@uin-suska.ac.id
1. INTRODUCTION
Polygamy or polygyny is a marital relationship involving multiple wives [1]. Polygamy has become
the subject of heated debates in media social such as Twitter and Facebook. The majority of societies refuse
with negative comment, but only a few people are willing to respond this phenomenon positively. They who
agree with polygamy may think that the polygamy is a legal thing in Indonesia [2]. Even, proponents claim
that this thing is able to quell men’s innately high sex, and also is alternative in order that men having a wife
do not do the sex outside of marriage which is forbidden for Muslim [3]. Indeed, the percentage of men
having multiple wives is overall minuscule in around the world, but people permit polygamy is about eighty-
three percent [4]. The holy Qur’an which is as a life guideline owned by Muslims of course allows men to
marry multiple women with some conditions and also the men must be fair to their wives [5]. The polygamy
that has happened is tough to be verified due to many unregistered marriages throughout Indonesia [6]. In the
1970 s, the rate of polygamous marriage in Indonesia was about 2% [7]. If there were no growth until right
now, we would probably estimate about 4,800,000 polygamy. Furthermore, some researchers have showed
about negative impact of the polygamy. It can be seen in Africa that the majority of people against polygamy
because of economy challenge and less communication between children and new mothers [8]. The
polygamous marriages would affect to each family member since the children of polygamous families might
unrespect to their parents and also it is tough for husbands to be impartial, either his children or wives [9].
 ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 4, August 2021 : 2231 – 2236
2232
A study, women’s mental health, has said that many polygamous families are stressful [10] and able
to cause psychological troubles [11]. Despite of that, both men and women keep on involvement in
polygamous marriages. Indonesia as the largest Muslim population in the world has regulated the 1974
marriage law about polygamy. Some parties, especially the secular women organization oppose the policy of
polygamous marriages. Nevertheless, according to the marriage law, there is still the court which is used to
minimize the risk of divorcement and polygamy [12]. The public perspective view extracted from Twitter
database will be utilized in this study to determine what this case is positive, negative or neutral opinion in
society. This analysis uses “Analysis Sentiment” that utilizes data analysis to extract data used by people in
many social medias mainly Twitter [13]. Twitter is platform where many people around in the world express
their thoughts, opinions about something and even their daily activities in the form of sentence or phrase. In
the world, there are more 300 million users with 500 million tweets typed every day [14]. However,
analyzing unstructured data like tweets is a tough business and also extracting beneficial information from
twitter is an enormous challenge for scientists [15]. Therefore, a great technology is needed to treat a million
of tweets, to extract the data and to know people’s sentiments about polygamy. Even though there are various
applications that can be used, researchers chose R language or application to perform this case [16].
Sentimental analysis is a method to describe whether a text written by user is in positive, negative or neutral.
It means that basically this method is used to study emotion that is related to word and writing [17].
Sentiment analysis can be implemented using machine learning methods. Data in the form of text, for
example, tweets that are entered or inputted will be separated first. This process is also known as
tokenization. Tokenization is done to simplify the analysis process of a text sentence. After that, the
sentiment of the input can be determined by classifying the previously separated words with the lexicon
sentiment, thereby bringing out the polarity and subjectivity of the existing tweet [18].
2. RESEARCH METHOD
2.1. Connecting R programing to Twitter
R is a programming language and free software environment for statistical computing and graphics
supported by the R foundation for statistical computing. The R language is widely used among statisticians
and data miners for developing statistical software and data analysis [19]. It is able to download, plot, analyze
the data taken on Twitter, while relation between R, and Twitter applies protocol, open authorization (Oauth)
[20]. OAuth is an open-standard authorization protocol or framework that describes how unrelated servers
and services can safely allow authenticated access to their assets without actually sharing the initial, related,
single logon credential. In authentication parlance, this is known as secure, third-party, user-agent, delegated
authorization. OAuth scenario could be a user sending cloud-stored files to another user via email, when the
cloud storage and email systems are otherwise unrelated other than supporting the OAuth framework (e.g.,
Google Gmail and Microsoft OneDrive) [21]. One of the more useful downloadable packages is twitter
(http://cran.rproject.org/web/packages/twitteR/index.html).
2.2. Collection Twitter data
Firstly, the data on Twitter is collected and processed by R’s tool namely statement analysis. Twitter
account once registered and logged in, needs registering the application name on Twitter application
programming interface (API) to create an application which provide the four legal credentials (API_key,
API_secret, access_token, access_token_secret), [22], [23]. Then, these keys and tokens are used to extract
the data of Twitter to R [24]. There are some steps in registered application on Twitter API as showed in.
After that, run the following code (API_key, API_secret, access_token, access_token_secret) in R program to
set authorization used to extract Twitter data [25]. In general, there are 6 steps in collecting and managing
data in Twitter including:
a. Log on to Twitter Developers site and Sign in with your Twitter account
b. Go to apps.twitter.com
c. Generate a new application
d. Enter the details of your application
e. Create your access token
f. Make a note of OAuth settings
Figure 1 shows a pictorial view of the steps involved to registered in application on Twitter API.
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Data mining applied about polygamy using sentiment analysis on Twitters in Indonesian … (Hertina)
2233
Figure 1. Pictorial view to register in application on Twitter API
2.3. Sentiment analysis
This paper, therefore, will analyze people’ opinions about polygamy using sentiment analysis. The
sentiment analysis is the automated process to identify positive, negative and neutral opinions from text [26].
Sentiment analysis is widely used for getting insights from social media comments, survey responses, and
product reviews, and making data-driven decisions [27], [28]. This is the most unique function implemented
in the paper since it describes the on-going thoughts of variety of people. The step of sentiment analysis’s
processes is pointed out as shown in:
- Extract tweets using OAuth protocol are to collect the data from the tweets on any topic using polygamy
words.
- Cleaning of text using R Language is cleaned by removing unwanted expressions and words.
- Data modeling and transformation are a step after retrieving and cleaning the data transformed and
prepared in a structured format to retrieve sentiments.
- Retrieving sentiments are analysis of sentiments performed.
- Graphical representation is the last step, where the sentiments are plotted and visualized by graphs and
word cloud.
3. RESULTS AND DISCUSSION
Some tweets focusing on polygamy issues in Indonesia language detailly as shown in. On Twitter
there are many unwanted information in order that it needs to be cleaned that and to be regulated for useful
informations only. Furthermore, the tweets on Table 1 extracted and cleaned using program R are provided as
shown in:
[1384] "Berarti bapaknya poligami"
[1385] "Menggalakkan poligami secara amannnhehehehehehehe"
[1386] "Fyi Nabi Muhammad saw ga pernah poligami Beliau setia sampai akhir hayat ke istri pertamanya"
[1387] "Sing a songnDapatkah aku memeluknya menjadikan bintang di surgahhnnAh ga jadi deh surga
isinya boomber ama orang poligami"
[1388] "Mau di poligami"
Table 1. some tweets about polygamy including date, time and account
No. Tweets Date Time Account
1384 Berarti bapaknya poligami 8/28/2019 2:57:43 mbauppie_
1385 Menggalakkan poligami secara amannnhehehehehehehe 8/28/2019 2:50:25 Sazwan_Bensahar
1386
Fyi Nabi Muhammad saw ga pernah poligami Beliau setia
sampai akhir hayat ke istri pertamanya
8/28/2019 2:47:43 amatarpihgoy
1387
Sing a songnDapatkah aku memeluknya menjadikan
bintang di surgahhnnAh ga jadi deh surga isinya boomber
ama orang poligami
8/28/2019 2:40:49 DianVeei
1388 Mau di poligami 8/28/2019 2:36:06 wooshinx1_
A tag cloud (word cloud) is a novelty visual representation of tweets and used to visualize the
essential information from the tweets. On the Figure 2 the most frequently-used words are polygamy, islam,
nikah, halalkan, jilbab, dihujat, and dilarang. Every color and size of words describes the frequency of words
immediately responded by people.
Figure 3 gives the visualization of words used in the tweets. It can be seen that the words such as
poligami has the highest frequency followed by word suami and Istri. The major aim of this paper is to
analyze the sentiments of people about polygamy and also the sentiment analysis has given us the clear
 ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 4, August 2021 : 2231 – 2236
2234
illustration of public’s positive, negative or neutral sentiments. Furthermore, we can see that as of the Table 2
and Figure 4, neutral sentiment or perception is more dominant than positive or negative perception. It means
that the polygamy, of recent, becomes ordinary thing in Indonesia’s society.
Figure 2. Word cloud for most frequently-used words
Figure 3. Word frequency count histogram
Table 2. The number of positive, negative, and neutral sentiment form 1500 tweets
Sentiment analysis scores Number of tweets
-2 1
-1 63
0 1429
1 7
Bulletin of Electr Eng & Inf ISSN: 2302-9285 
Data mining applied about polygamy using sentiment analysis on Twitters in Indonesian … (Hertina)
2235
Figure 4. Sentiment analysis with positive, negative, and neutral sentiment
4. CONCLUSION
Polygamy is not a common thing in Indonesia’s cultures and even many people support that case,
despite some people also refuse that. Moreover, this paper has studied and analyzed sentiments in public
about polygamy and it uses three sentiment scores i.e. positive, negative, and neutral. In conclusion, this
analysis has shown that present polygamy is a normal thing in Indonesia. As has been said in above, the
sentiment analysis score of neutral is more dominant than the sentiment analysis score of positive or
negative.
ACKNOWLEDGEMENTS
The authors thank you in advance to rado research centre (RRC) and State Islamic University of
Sultan Syarif Kasim Riau for supporting this study.
REFERENCES
[1] A. Al-Krenawi, J. R. Graham, and S. Ben-Shimol-Jacobsen, “Attitudes toward and reasons for polygamy
differentiated by gender and age among Bedouin-Arabs of the Negev,” International Journal of Mental Health, vol.
35, no. 1, pp. 46-61, 2006, doi: 10.2753/IMH0020-7411350104.
[2] F. Fidiani, “Studies Penalties for Unregistered Marriage and Polygamy in Indonesia, Pakistan and Tunisia,”
SAKINA: Journal of Family, vol. 5, no. 1, 2021.
[3] M. R. Purwanto, T. Mukharrom, M. R. Syibly, and A. Nurozi, “Polygamy in Muslim Countries: A Comparative
Study in Tunisia, Saudi Arabia, and Indonesia,” 2nd Southeast Asian Academic Forum on Sustainable Development
(SEA-AFSID 2018), vol. 168, pp. 435-437, 2021, doi: 10.2991/aebmr.k.210305.082.
[4] T. D. Thobejane and T. Flora, “An exploration of polygamous marriages: A worldview,” Mediterranean Journal of
Social Sciences, vol. 5, no. 27, pp. 1058-1066, 2014, doi: 10.5901/mjss.2014.v5n27p1058.
[5] A. Yildirim and F. Yesil, “Syrian Woman’s View of Polygamy,” The Eurasia Proceedings of Educational and
Social Sciences, vol. 10, pp. 223-233, September 2018,
[6] M. Platt, “Patriarchal institutions and women’s agency in Indonesian marriages: Sasak women navigating dynamic
marital continuums,” La Trobe University, 2010.
[7] G. W. Jones, ''Marriage and divorce in Islamic South-East Asia,'' Kuala Lumpur: Oxford University Press, 1994.
[8] N. Jansen and V. Agadjanian, “Polygyny and Intimate Partner Violence in Mozambique,” Journal of Family Issues,
vol. 41, no. 3, pp. 338-358, 2020, doi: 10.1177/0192513X19876075.
[9] A. O. İbiloğlu, A. Atlı, and M. Özkan, “Diyarbakır ilinde çok eşliliğin aile üyeleri üzerindeki olumsuz etkilerinin
araştırılması,” Cukurova Medical Journal, vol. 43, no. 4, pp. 982-988, 2018, doi: 10.17826/cumj.396875.
[10] K. Chaleby, “Traditional Arabian marriages and mental health in a group of outpatient Saudis,” Acta Psychiatrica
Scandinavica, vol. 77, no. 2, pp. 139-142, 1988, doi: 10.1111/j.1600-0447.1988.tb05090.x.
[11] A. Al-Krenawi, “Women of polygamous marriages in primary health care centers,” Contemporary Family Therapy,
vol. 21, no. 3, pp. 417-430, 1999, doi: 10.1023/A:1021920601391.
[12] M. S. Fatimah Zuhrah, Muhammad Jailani, “Islamic Legal Protection of Child’s Rights in Polygamous Marriage in
Indonesia,” Psychology and Education Journal, vol. 58, no. 1, pp. 5195-5200, 2021, doi: 10.17762/pae.v58i1.1773.
[13] J. Carvalho and A. Plastino, ''On the evaluation and combination of state-of-the-art features in Twitter sentiment
 ISSN: 2302-9285
Bulletin of Electr Eng & Inf, Vol. 10, No. 4, August 2021 : 2231 – 2236
2236
analysis,'' Springer, Netherlands, vol. 54, no. 3., 2021, doi: 10.1007/s10462-020-09895-6.
[14] R. Bose, R. K. Dey, S. Roy, and D. Sarddar, ''Analyzing political sentiment using Twitter data,'' Springer,
Singapore, vol. 107, pp. 427-436 , 2019, doi: 10.1007/978-981-13-1747-7_41.
[15] U. Sivarajah, M. M. Kamal, Z. Irani, and V. Weerakkody, “Critical analysis of Big Data challenges and analytical
methods,” Journal of Business Research, vol. 70, pp. 263-286, January 2017, doi: 10.1016/j.jbusres.2016.08.001.
[16] V. Sharma, A. Agarwal, R. Dhir, and G. Sikka, "Sentiments mining and classification of music lyrics using
SentiWordNet," 2016 Symposium on Colossal Data Analysis and Networking (CDAN), 2016, pp. 1-6, doi:
10.1109/CDAN.2016.7570965.
[17] I. Keka and B. Çiço, "Statistical treatment for trend detection and analyzing of electrical load using programming
language R," 2015 4th Mediterranean Conference on Embedded Computing (MECO), 2015, pp. 216-219, doi:
10.1109/MECO.2015.7181906.
[18] U. Naseem, I. Razzak, K. Musial, and M. Imran, “Transformer based Deep Intelligent Contextual Embedding for
Twitter sentiment analysis,” Future Generation Computer Systems, vol. 113, pp. 58-69, 2020, doi:
10.1016/j.future.2020.06.050.
[19] P. Verma, A. M. U. D. Khanday, S. T. Rabani, M. H. Mir, and S. Jamwal, “Twitter sentiment analysis on Indian
government project using R.,” International Journal of Recent Technology and Engineering (IJRTE), vol. 8, no. 3,
pp. 8338-8341, September 2019, doi: 10.35940/ijrte.C6612.098319.
[20] A. Reinhart and C. R. Genovese, “Expanding the scope of statistical computing: Training statisticians to be
software engineers,” Journal of Statistics Education, pp. 1-23, 2019, doi: 10.1080/10691898.2020.1845109.
[21] M. Li, N. Turki, C. R. Izaguirre, C. DeMahy, B. L. Thibodeaux, and T. Gage, “Twitter as a tool for social
movement: An analysis of feminist activism on social media communities,” Journal of community psychology, vol.
49, no. 3, pp. 854-868, 2021, doi: 10.1002/jcop.22324.
[22] W. Budiharto and M. Meiliana, “Prediction and analysis of Indonesia Presidential election from Twitter using
sentiment analysis,” Journal of Big Data, vol. 5, no. 1, pp. 1-10, 2018, doi: 10.1186/s40537-018-0164-1.
[23] M. Trupthi, S. Pabboju, and G. Narasimha, "Sentiment Analysis on Twitter Using Streaming API," 2017 IEEE 7th
International Advance Computing Conference (IACC), 2017, pp. 915-919, doi: 10.1109/IACC.2017.0186.
[24] I. Sreeja, J. V. Sunny, and L. Jatian, “Twitter Sentiment Analysis on Airline Tweets in India Using R Language,”
Journal of Physics: Conference Series, vol. 1427, no. 1, p. 012003, 2020, doi: 10.1088/1742-6596/1427/1/012003.
[25] K. Gandhe, A. S. Varde, and X. Du, "Sentiment Analysis of Twitter Data with Hybrid Learning for Recommender
Applications," 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference
(UEMCON), 2018, pp. 57-63, doi: 10.1109/UEMCON.2018.8796661.
[26] A. Hasan, S. Moin, A. Karim, and S. Shamshirband, “Machine Learning-Based Sentiment Analysis for Twitter
Accounts,” Mathematical and Computational Applications, vol. 23, no. 1, p. 11, 2018, doi: 10.3390/mca23010011.
[27] H. Kaur, S. U. Ahsaan, B. Alankar, and V. Chang, “A Proposed Sentiment Analysis Deep Learning Algorithm for
Analyzing COVID-19 Tweets,” Information Systems Frontiers, April 2021, doi: 10.1007/s10796-021-10135-7.
[28] D. Zimbra, A. Abbasi, D. Zeng, and H. Chen, “The state-of-the-art in twitter sentiment analysis: A review and
benchmark evaluation,” ACM Transactions on Management Information Systems (TMIS), vol. 9, no. 2, pp. 1-29,
September 2018, doi: 10.1145/3185045.
Ad

More Related Content

What's hot (18)

Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
dbpublications
 
Data trawling and security strategies
Data trawling and security strategiesData trawling and security strategies
Data trawling and security strategies
Venkata Karthik Gullapalli
 
Top 10 Read Article in Computer Science & Information Technology: September 2021
Top 10 Read Article in Computer Science & Information Technology: September 2021Top 10 Read Article in Computer Science & Information Technology: September 2021
Top 10 Read Article in Computer Science & Information Technology: September 2021
AIRCC Publishing Corporation
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
IRJET Journal
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Cristian Driga
 
Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docx
Amir Khan
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
simba35
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
Associate Professor in VSB Coimbatore
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
Government
 
Privacy awareness full book-l
Privacy awareness full book-lPrivacy awareness full book-l
Privacy awareness full book-l
coedfvaliantvoora
 
The literature and write report on information system security part 1 of 5 p...
The literature and write report on information system security  part 1 of 5 p...The literature and write report on information system security  part 1 of 5 p...
The literature and write report on information system security part 1 of 5 p...
raufik tajuddin
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
Alexander Decker
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
Andy Jeter
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's Interests
CSCJournals
 
CBSE Open Textbook English
CBSE Open Textbook EnglishCBSE Open Textbook English
CBSE Open Textbook English
siddharth satyakam
 
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
IJECEIAES
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
simba35
 
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
Cyber bullying Detection based on Semantic-Enhanced Marginalized Denoising Au...
dbpublications
 
Top 10 Read Article in Computer Science & Information Technology: September 2021
Top 10 Read Article in Computer Science & Information Technology: September 2021Top 10 Read Article in Computer Science & Information Technology: September 2021
Top 10 Read Article in Computer Science & Information Technology: September 2021
AIRCC Publishing Corporation
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
IRJET Journal
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Capabilities of Cyber-Trerrorists - IT infrastructure and associated risks, H...
Cristian Driga
 
Chapter 3.docx
Chapter 3.docxChapter 3.docx
Chapter 3.docx
Amir Khan
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
simba35
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
Government
 
Privacy awareness full book-l
Privacy awareness full book-lPrivacy awareness full book-l
Privacy awareness full book-l
coedfvaliantvoora
 
The literature and write report on information system security part 1 of 5 p...
The literature and write report on information system security  part 1 of 5 p...The literature and write report on information system security  part 1 of 5 p...
The literature and write report on information system security part 1 of 5 p...
raufik tajuddin
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
Alexander Decker
 
Cyberbullying Resources
Cyberbullying ResourcesCyberbullying Resources
Cyberbullying Resources
Andy Jeter
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's Interests
CSCJournals
 
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
Forensic Tools Performance Analysis on Android-based Blackberry Messenger usi...
IJECEIAES
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
simba35
 

Similar to Data mining applied about polygamy using sentiment analysis on Twitters in Indonesian perception (20)

Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
The architecture social media and online newspaper credibility measurement fo...
The architecture social media and online newspaper credibility measurement fo...The architecture social media and online newspaper credibility measurement fo...
The architecture social media and online newspaper credibility measurement fo...
TELKOMNIKA JOURNAL
 
Online Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachOnline Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study Approach
IJECEIAES
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
ijsptm
 
Associating events with people on social networks using a priori
Associating events with people on social networks using a prioriAssociating events with people on social networks using a priori
Associating events with people on social networks using a priori
csandit
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
Anil Dhami
 
Interoperability framework for integrated e-health services
Interoperability framework for integrated e-health servicesInteroperability framework for integrated e-health services
Interoperability framework for integrated e-health services
journalBEEI
 
Big Data Emerging Technology: Insights into Innovative Environment for Online...
Big Data Emerging Technology: Insights into Innovative Environment for Online...Big Data Emerging Technology: Insights into Innovative Environment for Online...
Big Data Emerging Technology: Insights into Innovative Environment for Online...
eraser Juan José Calderón
 
Meliorating usable document density for online event detection
Meliorating usable document density for online event detectionMeliorating usable document density for online event detection
Meliorating usable document density for online event detection
IJICTJOURNAL
 
204
204204
204
vivatechijri
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
CSCJournals
 
Sentence embedding to improve rumour detection performance model
Sentence embedding to improve rumour detection performance modelSentence embedding to improve rumour detection performance model
Sentence embedding to improve rumour detection performance model
IAESIJAI
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
 
SAMUEL FULL PROJECT
SAMUEL FULL PROJECTSAMUEL FULL PROJECT
SAMUEL FULL PROJECT
Samuel Adekanmbi
 
Collaborative filtering content for parental control in mobile application ch...
Collaborative filtering content for parental control in mobile application ch...Collaborative filtering content for parental control in mobile application ch...
Collaborative filtering content for parental control in mobile application ch...
journalBEEI
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
IJECEIAES
 
My new proposal (1).docx
My new proposal (1).docxMy new proposal (1).docx
My new proposal (1).docx
AttaUrRahman78
 
Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...
Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...
Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...
Eswar Publications
 
9th
9th9th
9th
shruti bhola
 
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Integration of Bayesian Theory and Association Rule Mining in Predicting User...
Editor IJCATR
 
The architecture social media and online newspaper credibility measurement fo...
The architecture social media and online newspaper credibility measurement fo...The architecture social media and online newspaper credibility measurement fo...
The architecture social media and online newspaper credibility measurement fo...
TELKOMNIKA JOURNAL
 
Online Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study ApproachOnline Data Preprocessing: A Case Study Approach
Online Data Preprocessing: A Case Study Approach
IJECEIAES
 
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
A SMART WIZARD SYSTEM SUITABLE FOR USE WITH INTERNET MOBILE DEVICES TO ADJUST...
ijsptm
 
Associating events with people on social networks using a priori
Associating events with people on social networks using a prioriAssociating events with people on social networks using a priori
Associating events with people on social networks using a priori
csandit
 
Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...Impact of trust, security and privacy concerns in social networking: An explo...
Impact of trust, security and privacy concerns in social networking: An explo...
Anil Dhami
 
Interoperability framework for integrated e-health services
Interoperability framework for integrated e-health servicesInteroperability framework for integrated e-health services
Interoperability framework for integrated e-health services
journalBEEI
 
Big Data Emerging Technology: Insights into Innovative Environment for Online...
Big Data Emerging Technology: Insights into Innovative Environment for Online...Big Data Emerging Technology: Insights into Innovative Environment for Online...
Big Data Emerging Technology: Insights into Innovative Environment for Online...
eraser Juan José Calderón
 
Meliorating usable document density for online event detection
Meliorating usable document density for online event detectionMeliorating usable document density for online event detection
Meliorating usable document density for online event detection
IJICTJOURNAL
 
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage TechnologyComprehensive Social Media Security Analysis & XKeyscore Espionage Technology
Comprehensive Social Media Security Analysis & XKeyscore Espionage Technology
CSCJournals
 
Sentence embedding to improve rumour detection performance model
Sentence embedding to improve rumour detection performance modelSentence embedding to improve rumour detection performance model
Sentence embedding to improve rumour detection performance model
IAESIJAI
 
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKSSECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Zac Darcy
 
Collaborative filtering content for parental control in mobile application ch...
Collaborative filtering content for parental control in mobile application ch...Collaborative filtering content for parental control in mobile application ch...
Collaborative filtering content for parental control in mobile application ch...
journalBEEI
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks Policy resolution of shared data in online social networks
Policy resolution of shared data in online social networks
IJECEIAES
 
My new proposal (1).docx
My new proposal (1).docxMy new proposal (1).docx
My new proposal (1).docx
AttaUrRahman78
 
Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...
Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...
Psychoanalysis of Online Behavior and Cyber Conduct of Chatters in Chat Rooms...
Eswar Publications
 
Ad

More from journalBEEI (20)

Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
journalBEEI
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
journalBEEI
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
journalBEEI
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
journalBEEI
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
journalBEEI
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
journalBEEI
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
journalBEEI
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
journalBEEI
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
journalBEEI
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
journalBEEI
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
journalBEEI
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
journalBEEI
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
journalBEEI
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
journalBEEI
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
journalBEEI
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
journalBEEI
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
journalBEEI
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
journalBEEI
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
journalBEEI
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
journalBEEI
 
Square transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipherSquare transposition: an approach to the transposition process in block cipher
Square transposition: an approach to the transposition process in block cipher
journalBEEI
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
journalBEEI
 
Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...Supervised machine learning based liver disease prediction approach with LASS...
Supervised machine learning based liver disease prediction approach with LASS...
journalBEEI
 
A secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networksA secure and energy saving protocol for wireless sensor networks
A secure and energy saving protocol for wireless sensor networks
journalBEEI
 
Plant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural networkPlant leaf identification system using convolutional neural network
Plant leaf identification system using convolutional neural network
journalBEEI
 
Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...Customized moodle-based learning management system for socially disadvantaged...
Customized moodle-based learning management system for socially disadvantaged...
journalBEEI
 
Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...Understanding the role of individual learner in adaptive and personalized e-l...
Understanding the role of individual learner in adaptive and personalized e-l...
journalBEEI
 
Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...Prototype mobile contactless transaction system in traditional markets to sup...
Prototype mobile contactless transaction system in traditional markets to sup...
journalBEEI
 
Wireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithmWireless HART stack using multiprocessor technique with laxity algorithm
Wireless HART stack using multiprocessor technique with laxity algorithm
journalBEEI
 
Implementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antennaImplementation of double-layer loaded on octagon microstrip yagi antenna
Implementation of double-layer loaded on octagon microstrip yagi antenna
journalBEEI
 
The calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human headThe calculation of the field of an antenna located near the human head
The calculation of the field of an antenna located near the human head
journalBEEI
 
Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...Exact secure outage probability performance of uplinkdownlink multiple access...
Exact secure outage probability performance of uplinkdownlink multiple access...
journalBEEI
 
Design of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting applicationDesign of a dual-band antenna for energy harvesting application
Design of a dual-band antenna for energy harvesting application
journalBEEI
 
Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...Transforming data-centric eXtensible markup language into relational database...
Transforming data-centric eXtensible markup language into relational database...
journalBEEI
 
Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)Key performance requirement of future next wireless networks (6G)
Key performance requirement of future next wireless networks (6G)
journalBEEI
 
Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...Noise resistance territorial intensity-based optical flow using inverse confi...
Noise resistance territorial intensity-based optical flow using inverse confi...
journalBEEI
 
Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...Modeling climate phenomenon with software grids analysis and display system i...
Modeling climate phenomenon with software grids analysis and display system i...
journalBEEI
 
An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...An approach of re-organizing input dataset to enhance the quality of emotion ...
An approach of re-organizing input dataset to enhance the quality of emotion ...
journalBEEI
 
Parking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentationParking detection system using background subtraction and HSV color segmentation
Parking detection system using background subtraction and HSV color segmentation
journalBEEI
 
Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...Quality of service performances of video and voice transmission in universal ...
Quality of service performances of video and voice transmission in universal ...
journalBEEI
 
Ad

Recently uploaded (20)

fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Process Parameter Optimization for Minimizing Springback in Cold Drawing Proc...
Journal of Soft Computing in Civil Engineering
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Journal of Soft Computing in Civil Engineering
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
Smart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptxSmart_Storage_Systems_Production_Engineering.pptx
Smart_Storage_Systems_Production_Engineering.pptx
rushikeshnavghare94
 
Value Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous SecurityValue Stream Mapping Worskshops for Intelligent Continuous Security
Value Stream Mapping Worskshops for Intelligent Continuous Security
Marc Hornbeek
 
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdfMAQUINARIA MINAS CEMA 6th Edition (1).pdf
MAQUINARIA MINAS CEMA 6th Edition (1).pdf
ssuser562df4
 
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G..."Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
"Feed Water Heaters in Thermal Power Plants: Types, Working, and Efficiency G...
Infopitaara
 
Data Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptxData Structures_Searching and Sorting.pptx
Data Structures_Searching and Sorting.pptx
RushaliDeshmukh2
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
ELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdfELectronics Boards & Product Testing_Shiju.pdf
ELectronics Boards & Product Testing_Shiju.pdf
Shiju Jacob
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
Introduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptxIntroduction to Zoomlion Earthmoving.pptx
Introduction to Zoomlion Earthmoving.pptx
AS1920
 
theory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptxtheory-slides-for react for beginners.pptx
theory-slides-for react for beginners.pptx
sanchezvanessa7896
 
DSP and MV the Color image processing.ppt
DSP and MV the  Color image processing.pptDSP and MV the  Color image processing.ppt
DSP and MV the Color image processing.ppt
HafizAhamed8
 
International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)International Journal of Distributed and Parallel systems (IJDPS)
International Journal of Distributed and Parallel systems (IJDPS)
samueljackson3773
 
QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)QA/QC Manager (Quality management Expert)
QA/QC Manager (Quality management Expert)
rccbatchplant
 
Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.Fort night presentation new0903 pdf.pdf.
Fort night presentation new0903 pdf.pdf.
anuragmk56
 
Artificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptxArtificial Intelligence (AI) basics.pptx
Artificial Intelligence (AI) basics.pptx
aditichinar
 
Metal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistryMetal alkyne complexes.pptx in chemistry
Metal alkyne complexes.pptx in chemistry
mee23nu
 

Data mining applied about polygamy using sentiment analysis on Twitters in Indonesian perception

  • 1. Bulletin of Electrical Engineering and Informatics Vol. 10, No. 4, August 2021, pp. 2231~2236 ISSN: 2302-9285, DOI: 10.11591/eei.v10i4.2325 2231 Journal homepage: http://beei.org Data mining applied about polygamy using sentiment analysis on Twitters in Indonesian perception Hertina, Muhammad Nurwahid, Haswir, Hendri Sayuti, Amri Darwis, Miftahur Rahman, Rado Yendra, Muhammad Luthfi Hamzah Department of Comparison of Mahzab and Law, Universitas Islam Negeri Sultan Syarif Kasim Riau, Indonesia Article Info ABSTRACT Article history: Received Mar 2, 2020 Revised May 20, 2021 Accepted Jun 19, 2021 Polygamy remains one of the interesting key topics in various society, especially Indonesia. Polygamy is the act of marrying multiple spouses that means having more one wife at the same time, is common case in worldwide. In this problem, the most of Muslim in Indonesia adopt Islamic law that let men to do the polygamy with certain requirements. In worldwide communities, this has been a prominent feature and has become the subject of numerous books, heated debates, journal articles, discussion papers, and so on. Furthermore, in Indonesia the polygamous marriage has recently become a heated topic. Despite controversy, Indonesia’s law, of recent, allows people for doing polygamy in certain conditions. Because the polygamy is often debated, this study focuses on assessment of Indonesian’s perceptions through sentiment analysis and would determine people’s perception about polygamy issue from 500 tweets on Twitter. To conclude, it elucidates that the polygamy in Indonesia is a normal thing and few assume the case is as negative thing. Keywords: Data mining Polygamy Sentiment analysis Twitter This is an open access article under the CC BY-SA license. Corresponding Author: Hertina Department of Comparison of Mahzab and Law Faculty of Sharia and Law Studies Universitas Islam Negeri Sultan Syarif Kasim Riau, Indonesia Email: [email protected] 1. INTRODUCTION Polygamy or polygyny is a marital relationship involving multiple wives [1]. Polygamy has become the subject of heated debates in media social such as Twitter and Facebook. The majority of societies refuse with negative comment, but only a few people are willing to respond this phenomenon positively. They who agree with polygamy may think that the polygamy is a legal thing in Indonesia [2]. Even, proponents claim that this thing is able to quell men’s innately high sex, and also is alternative in order that men having a wife do not do the sex outside of marriage which is forbidden for Muslim [3]. Indeed, the percentage of men having multiple wives is overall minuscule in around the world, but people permit polygamy is about eighty- three percent [4]. The holy Qur’an which is as a life guideline owned by Muslims of course allows men to marry multiple women with some conditions and also the men must be fair to their wives [5]. The polygamy that has happened is tough to be verified due to many unregistered marriages throughout Indonesia [6]. In the 1970 s, the rate of polygamous marriage in Indonesia was about 2% [7]. If there were no growth until right now, we would probably estimate about 4,800,000 polygamy. Furthermore, some researchers have showed about negative impact of the polygamy. It can be seen in Africa that the majority of people against polygamy because of economy challenge and less communication between children and new mothers [8]. The polygamous marriages would affect to each family member since the children of polygamous families might unrespect to their parents and also it is tough for husbands to be impartial, either his children or wives [9].
  • 2.  ISSN: 2302-9285 Bulletin of Electr Eng & Inf, Vol. 10, No. 4, August 2021 : 2231 – 2236 2232 A study, women’s mental health, has said that many polygamous families are stressful [10] and able to cause psychological troubles [11]. Despite of that, both men and women keep on involvement in polygamous marriages. Indonesia as the largest Muslim population in the world has regulated the 1974 marriage law about polygamy. Some parties, especially the secular women organization oppose the policy of polygamous marriages. Nevertheless, according to the marriage law, there is still the court which is used to minimize the risk of divorcement and polygamy [12]. The public perspective view extracted from Twitter database will be utilized in this study to determine what this case is positive, negative or neutral opinion in society. This analysis uses “Analysis Sentiment” that utilizes data analysis to extract data used by people in many social medias mainly Twitter [13]. Twitter is platform where many people around in the world express their thoughts, opinions about something and even their daily activities in the form of sentence or phrase. In the world, there are more 300 million users with 500 million tweets typed every day [14]. However, analyzing unstructured data like tweets is a tough business and also extracting beneficial information from twitter is an enormous challenge for scientists [15]. Therefore, a great technology is needed to treat a million of tweets, to extract the data and to know people’s sentiments about polygamy. Even though there are various applications that can be used, researchers chose R language or application to perform this case [16]. Sentimental analysis is a method to describe whether a text written by user is in positive, negative or neutral. It means that basically this method is used to study emotion that is related to word and writing [17]. Sentiment analysis can be implemented using machine learning methods. Data in the form of text, for example, tweets that are entered or inputted will be separated first. This process is also known as tokenization. Tokenization is done to simplify the analysis process of a text sentence. After that, the sentiment of the input can be determined by classifying the previously separated words with the lexicon sentiment, thereby bringing out the polarity and subjectivity of the existing tweet [18]. 2. RESEARCH METHOD 2.1. Connecting R programing to Twitter R is a programming language and free software environment for statistical computing and graphics supported by the R foundation for statistical computing. The R language is widely used among statisticians and data miners for developing statistical software and data analysis [19]. It is able to download, plot, analyze the data taken on Twitter, while relation between R, and Twitter applies protocol, open authorization (Oauth) [20]. OAuth is an open-standard authorization protocol or framework that describes how unrelated servers and services can safely allow authenticated access to their assets without actually sharing the initial, related, single logon credential. In authentication parlance, this is known as secure, third-party, user-agent, delegated authorization. OAuth scenario could be a user sending cloud-stored files to another user via email, when the cloud storage and email systems are otherwise unrelated other than supporting the OAuth framework (e.g., Google Gmail and Microsoft OneDrive) [21]. One of the more useful downloadable packages is twitter (http://cran.rproject.org/web/packages/twitteR/index.html). 2.2. Collection Twitter data Firstly, the data on Twitter is collected and processed by R’s tool namely statement analysis. Twitter account once registered and logged in, needs registering the application name on Twitter application programming interface (API) to create an application which provide the four legal credentials (API_key, API_secret, access_token, access_token_secret), [22], [23]. Then, these keys and tokens are used to extract the data of Twitter to R [24]. There are some steps in registered application on Twitter API as showed in. After that, run the following code (API_key, API_secret, access_token, access_token_secret) in R program to set authorization used to extract Twitter data [25]. In general, there are 6 steps in collecting and managing data in Twitter including: a. Log on to Twitter Developers site and Sign in with your Twitter account b. Go to apps.twitter.com c. Generate a new application d. Enter the details of your application e. Create your access token f. Make a note of OAuth settings Figure 1 shows a pictorial view of the steps involved to registered in application on Twitter API.
  • 3. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Data mining applied about polygamy using sentiment analysis on Twitters in Indonesian … (Hertina) 2233 Figure 1. Pictorial view to register in application on Twitter API 2.3. Sentiment analysis This paper, therefore, will analyze people’ opinions about polygamy using sentiment analysis. The sentiment analysis is the automated process to identify positive, negative and neutral opinions from text [26]. Sentiment analysis is widely used for getting insights from social media comments, survey responses, and product reviews, and making data-driven decisions [27], [28]. This is the most unique function implemented in the paper since it describes the on-going thoughts of variety of people. The step of sentiment analysis’s processes is pointed out as shown in: - Extract tweets using OAuth protocol are to collect the data from the tweets on any topic using polygamy words. - Cleaning of text using R Language is cleaned by removing unwanted expressions and words. - Data modeling and transformation are a step after retrieving and cleaning the data transformed and prepared in a structured format to retrieve sentiments. - Retrieving sentiments are analysis of sentiments performed. - Graphical representation is the last step, where the sentiments are plotted and visualized by graphs and word cloud. 3. RESULTS AND DISCUSSION Some tweets focusing on polygamy issues in Indonesia language detailly as shown in. On Twitter there are many unwanted information in order that it needs to be cleaned that and to be regulated for useful informations only. Furthermore, the tweets on Table 1 extracted and cleaned using program R are provided as shown in: [1384] "Berarti bapaknya poligami" [1385] "Menggalakkan poligami secara amannnhehehehehehehe" [1386] "Fyi Nabi Muhammad saw ga pernah poligami Beliau setia sampai akhir hayat ke istri pertamanya" [1387] "Sing a songnDapatkah aku memeluknya menjadikan bintang di surgahhnnAh ga jadi deh surga isinya boomber ama orang poligami" [1388] "Mau di poligami" Table 1. some tweets about polygamy including date, time and account No. Tweets Date Time Account 1384 Berarti bapaknya poligami 8/28/2019 2:57:43 mbauppie_ 1385 Menggalakkan poligami secara amannnhehehehehehehe 8/28/2019 2:50:25 Sazwan_Bensahar 1386 Fyi Nabi Muhammad saw ga pernah poligami Beliau setia sampai akhir hayat ke istri pertamanya 8/28/2019 2:47:43 amatarpihgoy 1387 Sing a songnDapatkah aku memeluknya menjadikan bintang di surgahhnnAh ga jadi deh surga isinya boomber ama orang poligami 8/28/2019 2:40:49 DianVeei 1388 Mau di poligami 8/28/2019 2:36:06 wooshinx1_ A tag cloud (word cloud) is a novelty visual representation of tweets and used to visualize the essential information from the tweets. On the Figure 2 the most frequently-used words are polygamy, islam, nikah, halalkan, jilbab, dihujat, and dilarang. Every color and size of words describes the frequency of words immediately responded by people. Figure 3 gives the visualization of words used in the tweets. It can be seen that the words such as poligami has the highest frequency followed by word suami and Istri. The major aim of this paper is to analyze the sentiments of people about polygamy and also the sentiment analysis has given us the clear
  • 4.  ISSN: 2302-9285 Bulletin of Electr Eng & Inf, Vol. 10, No. 4, August 2021 : 2231 – 2236 2234 illustration of public’s positive, negative or neutral sentiments. Furthermore, we can see that as of the Table 2 and Figure 4, neutral sentiment or perception is more dominant than positive or negative perception. It means that the polygamy, of recent, becomes ordinary thing in Indonesia’s society. Figure 2. Word cloud for most frequently-used words Figure 3. Word frequency count histogram Table 2. The number of positive, negative, and neutral sentiment form 1500 tweets Sentiment analysis scores Number of tweets -2 1 -1 63 0 1429 1 7
  • 5. Bulletin of Electr Eng & Inf ISSN: 2302-9285  Data mining applied about polygamy using sentiment analysis on Twitters in Indonesian … (Hertina) 2235 Figure 4. Sentiment analysis with positive, negative, and neutral sentiment 4. CONCLUSION Polygamy is not a common thing in Indonesia’s cultures and even many people support that case, despite some people also refuse that. Moreover, this paper has studied and analyzed sentiments in public about polygamy and it uses three sentiment scores i.e. positive, negative, and neutral. In conclusion, this analysis has shown that present polygamy is a normal thing in Indonesia. As has been said in above, the sentiment analysis score of neutral is more dominant than the sentiment analysis score of positive or negative. ACKNOWLEDGEMENTS The authors thank you in advance to rado research centre (RRC) and State Islamic University of Sultan Syarif Kasim Riau for supporting this study. REFERENCES [1] A. Al-Krenawi, J. R. Graham, and S. Ben-Shimol-Jacobsen, “Attitudes toward and reasons for polygamy differentiated by gender and age among Bedouin-Arabs of the Negev,” International Journal of Mental Health, vol. 35, no. 1, pp. 46-61, 2006, doi: 10.2753/IMH0020-7411350104. [2] F. Fidiani, “Studies Penalties for Unregistered Marriage and Polygamy in Indonesia, Pakistan and Tunisia,” SAKINA: Journal of Family, vol. 5, no. 1, 2021. [3] M. R. Purwanto, T. Mukharrom, M. R. Syibly, and A. Nurozi, “Polygamy in Muslim Countries: A Comparative Study in Tunisia, Saudi Arabia, and Indonesia,” 2nd Southeast Asian Academic Forum on Sustainable Development (SEA-AFSID 2018), vol. 168, pp. 435-437, 2021, doi: 10.2991/aebmr.k.210305.082. [4] T. D. Thobejane and T. Flora, “An exploration of polygamous marriages: A worldview,” Mediterranean Journal of Social Sciences, vol. 5, no. 27, pp. 1058-1066, 2014, doi: 10.5901/mjss.2014.v5n27p1058. [5] A. Yildirim and F. Yesil, “Syrian Woman’s View of Polygamy,” The Eurasia Proceedings of Educational and Social Sciences, vol. 10, pp. 223-233, September 2018, [6] M. Platt, “Patriarchal institutions and women’s agency in Indonesian marriages: Sasak women navigating dynamic marital continuums,” La Trobe University, 2010. [7] G. W. Jones, ''Marriage and divorce in Islamic South-East Asia,'' Kuala Lumpur: Oxford University Press, 1994. [8] N. Jansen and V. Agadjanian, “Polygyny and Intimate Partner Violence in Mozambique,” Journal of Family Issues, vol. 41, no. 3, pp. 338-358, 2020, doi: 10.1177/0192513X19876075. [9] A. O. İbiloğlu, A. Atlı, and M. Özkan, “Diyarbakır ilinde çok eşliliğin aile üyeleri üzerindeki olumsuz etkilerinin araştırılması,” Cukurova Medical Journal, vol. 43, no. 4, pp. 982-988, 2018, doi: 10.17826/cumj.396875. [10] K. Chaleby, “Traditional Arabian marriages and mental health in a group of outpatient Saudis,” Acta Psychiatrica Scandinavica, vol. 77, no. 2, pp. 139-142, 1988, doi: 10.1111/j.1600-0447.1988.tb05090.x. [11] A. Al-Krenawi, “Women of polygamous marriages in primary health care centers,” Contemporary Family Therapy, vol. 21, no. 3, pp. 417-430, 1999, doi: 10.1023/A:1021920601391. [12] M. S. Fatimah Zuhrah, Muhammad Jailani, “Islamic Legal Protection of Child’s Rights in Polygamous Marriage in Indonesia,” Psychology and Education Journal, vol. 58, no. 1, pp. 5195-5200, 2021, doi: 10.17762/pae.v58i1.1773. [13] J. Carvalho and A. Plastino, ''On the evaluation and combination of state-of-the-art features in Twitter sentiment
  • 6.  ISSN: 2302-9285 Bulletin of Electr Eng & Inf, Vol. 10, No. 4, August 2021 : 2231 – 2236 2236 analysis,'' Springer, Netherlands, vol. 54, no. 3., 2021, doi: 10.1007/s10462-020-09895-6. [14] R. Bose, R. K. Dey, S. Roy, and D. Sarddar, ''Analyzing political sentiment using Twitter data,'' Springer, Singapore, vol. 107, pp. 427-436 , 2019, doi: 10.1007/978-981-13-1747-7_41. [15] U. Sivarajah, M. M. Kamal, Z. Irani, and V. Weerakkody, “Critical analysis of Big Data challenges and analytical methods,” Journal of Business Research, vol. 70, pp. 263-286, January 2017, doi: 10.1016/j.jbusres.2016.08.001. [16] V. Sharma, A. Agarwal, R. Dhir, and G. Sikka, "Sentiments mining and classification of music lyrics using SentiWordNet," 2016 Symposium on Colossal Data Analysis and Networking (CDAN), 2016, pp. 1-6, doi: 10.1109/CDAN.2016.7570965. [17] I. Keka and B. Çiço, "Statistical treatment for trend detection and analyzing of electrical load using programming language R," 2015 4th Mediterranean Conference on Embedded Computing (MECO), 2015, pp. 216-219, doi: 10.1109/MECO.2015.7181906. [18] U. Naseem, I. Razzak, K. Musial, and M. Imran, “Transformer based Deep Intelligent Contextual Embedding for Twitter sentiment analysis,” Future Generation Computer Systems, vol. 113, pp. 58-69, 2020, doi: 10.1016/j.future.2020.06.050. [19] P. Verma, A. M. U. D. Khanday, S. T. Rabani, M. H. Mir, and S. Jamwal, “Twitter sentiment analysis on Indian government project using R.,” International Journal of Recent Technology and Engineering (IJRTE), vol. 8, no. 3, pp. 8338-8341, September 2019, doi: 10.35940/ijrte.C6612.098319. [20] A. Reinhart and C. R. Genovese, “Expanding the scope of statistical computing: Training statisticians to be software engineers,” Journal of Statistics Education, pp. 1-23, 2019, doi: 10.1080/10691898.2020.1845109. [21] M. Li, N. Turki, C. R. Izaguirre, C. DeMahy, B. L. Thibodeaux, and T. Gage, “Twitter as a tool for social movement: An analysis of feminist activism on social media communities,” Journal of community psychology, vol. 49, no. 3, pp. 854-868, 2021, doi: 10.1002/jcop.22324. [22] W. Budiharto and M. Meiliana, “Prediction and analysis of Indonesia Presidential election from Twitter using sentiment analysis,” Journal of Big Data, vol. 5, no. 1, pp. 1-10, 2018, doi: 10.1186/s40537-018-0164-1. [23] M. Trupthi, S. Pabboju, and G. Narasimha, "Sentiment Analysis on Twitter Using Streaming API," 2017 IEEE 7th International Advance Computing Conference (IACC), 2017, pp. 915-919, doi: 10.1109/IACC.2017.0186. [24] I. Sreeja, J. V. Sunny, and L. Jatian, “Twitter Sentiment Analysis on Airline Tweets in India Using R Language,” Journal of Physics: Conference Series, vol. 1427, no. 1, p. 012003, 2020, doi: 10.1088/1742-6596/1427/1/012003. [25] K. Gandhe, A. S. Varde, and X. Du, "Sentiment Analysis of Twitter Data with Hybrid Learning for Recommender Applications," 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), 2018, pp. 57-63, doi: 10.1109/UEMCON.2018.8796661. [26] A. Hasan, S. Moin, A. Karim, and S. Shamshirband, “Machine Learning-Based Sentiment Analysis for Twitter Accounts,” Mathematical and Computational Applications, vol. 23, no. 1, p. 11, 2018, doi: 10.3390/mca23010011. [27] H. Kaur, S. U. Ahsaan, B. Alankar, and V. Chang, “A Proposed Sentiment Analysis Deep Learning Algorithm for Analyzing COVID-19 Tweets,” Information Systems Frontiers, April 2021, doi: 10.1007/s10796-021-10135-7. [28] D. Zimbra, A. Abbasi, D. Zeng, and H. Chen, “The state-of-the-art in twitter sentiment analysis: A review and benchmark evaluation,” ACM Transactions on Management Information Systems (TMIS), vol. 9, no. 2, pp. 1-29, September 2018, doi: 10.1145/3185045.