Human Perception Based on Textual Analysis

PDF (1096KB), PP.84-93

Views: 0 Downloads: 0

Author(s)

Md. Asadul Hoque Chowdhury 1,* Farhana Yeasmin Munmun 1 Shahidul Islam Ifte 1 Turya Gain 1 Dip Nandi 2

1. American International University-Bangladesh, Dhaka, Bangladesh

2. Faculty of Science and Technology, American International University-Bangladesh, Dhaka, Bangladesh

* Corresponding author.

DOI: https://doi.org/10.5815/ijisa.2024.06.05

Received: 12 May 2024 / Revised: 16 Jul. 2024 / Accepted: 6 Sep. 2024 / Published: 8 Dec. 2024

Index Terms

Text Mining, Human Perception Analysis, Algorithmic Comparison, Customer Support, Twitter Dataset, Decision Trees, KNN, Naive Bayes, GLM

Abstract

The complex process by which humans use their senses to clarify and understand the world around them is referred to as human perception. Analyzing human perception is important for comprehension of how humans think, feel, and act, which is helpful in a variety of contexts and ultimately promotes improved understanding, communication, and engagement. This study examines the field of text mining-based human perception analysis using a precisely chosen dataset of Twitter customer service discussions. Decision Trees, KNN, Naive Bayes, and GLM are four different algorithms that are methodically examined to determine which is the most effective method for understanding and predicting human perception from textual data. After an exhaustive analysis, the Decision Tree algorithm is shown to be the best performer, closely followed by Naive Bayes. The human perception analysis of text mining, including the methodology, findings, and implications, is described in depth. 

Cite This Paper

Md. Asadul Hoque Chowdhury, Farhana Yeasmin Munmun, Shahidul Islam Ifte, Turya Gain, Dip Nandi, "Human Perception Based on Textual Analysis", International Journal of Intelligent Systems and Applications(IJISA), Vol.16, No.6, pp.84-93, 2024. DOI:10.5815/ijisa.2024.06.05

Reference

[1]Jaramillo, I. E., Chola, C., Jeong, J., Oh, J., Jung, H., Lee, J., Lee, W. H., & Kim, T. (2023). Human Activity Prediction Based on Forecasted IMU Activity Signals by Sequence-to-Sequence Deep Neural Networks. Sensors, 23(14), 6491. https://doi.org/10.3390/s23146491 
[2]Gutierrez, E., Karwowski, W., Fiok, K., Davahli, M.R., Liciaga, T. and Ahram, T. (2021). Analysis of Human Behavior by Mining Textual Data: Current Research Topics and Analytical Techniques. Symmetry, 13(7), p.1276. doi: https://doi.org/10.3390/sym13071276
[3]Bagrow, J.P., Liu, X. and Mitchell, L. (2019). Information flow reveals prediction limits in online social activity. Nature Human Behaviour, 3(2), pp.122–128. doi: https://doi.org/10.1038/s41562-018-0510-5
[4]Farboodi, M., Jarosch, G., & Shimer, R. (2021). Internal and external effects of social distancing in a pandemic. Journal of Economic Theory, 196, 105293. https://doi.org/10.1016/j.jet.2021.105293 
[5]Flek, L., Carpenter, J., Giorgi, S., Ungar, L.H. and Preoţiuc-Pietro, D. (2016). Analyzing Biases in Human Perception of User Age and Gender from Text. doi: https://doi.org/10.18653/v1/p16-1080.
[6]Grgic-Hlaca, N., Redmiles, E.M., Gummadi, K.P. and Weller, A. (2018). Human Perceptions of Fairness in Algorithmic Decision Making. Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW ’18. doi: https://doi.org/10.1145/3178876.3186138 
[7]Humphreys, A. and Wang, R.J.-H. (2017). Automated Text Analysis for Consumer Research. Journal of Consumer Research, 44(6), pp.1274–1306. doi: https://doi.org/10.1093/jcr/ucx104
[8]Schumann, J.F., Srinivasan, A.R., Kober, J., Markkula, G. and Zgonnikov, A. (2023). Using Models Based on Cognitive Theory to Predict Human Behavior in Traffic: A Case Study. [online] arXiv.org. doi: https://doi.org/10.48550/arXiv.2305.15187 
[9]EKMAN, P. and FRIESEN, W. 1981. The Repertoire of Nonverbal Behavior: Categories, Origins, Usage, and Coding. In: Kendon, A. ed. Nonverbal Communication, Interaction, and Gesture: Selections from SEMIOTICA. Berlin, Boston: De Gruyter Mouton, pp. 57-106. https://doi.org/10.1515/9783110880021.57
[10]Parsons, T. and Bales, R. (1955) ‘Role Differentiation in Small Decision-Making Groups’, in Family, socialization and interaction process. New York: Free Pr. u.a. Available at: https://www.taylorfrancis.com/chapters/edit/10.4324/9781315824307-5/role-differentiation-small-decision-making-groups-robert-bales-philip-slater 
[11]Pennebaker, J. W., & King, L. A. (1999). Linguistic styles: Language use as an individual difference. Journal of Personality and Social Psychology, 77(6), 1296–1312. https://doi.org/10.1037/0022-3514.77.6.1296
[12]Lockhart, J.W. and Weiss, G.M. (2014) ‘Limitations with activity recognition methodology & data sets’, Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication [Preprint]. doi:10.1145/2638728.2641306
[13]Park, J., Song, C., Kim, M., & Kim, S. Activity Prediction Based on Deep Learning Techniques. Applied Sciences, 13(9), 5684. https://doi.org/10.3390/app13095684  
[14]Gleeson, T.A. (1957) ‘ON LIMITATIONS TO PREDICTION’, Cover Journal of the Atmospheric Sciences Journal of the Atmospheric Sciences [Preprint]. doi:https://doi.org/10.1175/1520-0469(1957)014<0304:OLTP>2.0.CO;2
[15]Li, K. and Fu, Y. (2014). Prediction of Human Activity by Discovering Temporal Sequence Patterns. IEEE Transactions on Pattern Analysis and Machine Intelligence, 36(8), pp.1644–1657. doi: https://doi.org/10.1109/tpami.2013.2297321
[16]Vrigkas, M., Nikou, C., & Kakadiaris, I. A. (2015). A Review of Human Activity Recognition Methods. Frontiers in Robotics and AI, 2, 160288. https://doi.org/10.3389/frobt.2015.00028 
[17]A. Zamichos, M. Tsourma, S. Papadopoulos, A. Drosou and D. Tzovaras, "User Profile-aware Daily Activity Prediction," 2023 24th International Conference on Digital Signal Processing (DSP), Rhodes (Rodos), Greece, 2023, pp. 1-5, doi: 10.1109/DSP58604.2023.10167947  
[18]Minh Dang, L., Min, K., Wang, H., Jalil Piran, M., Hee Lee, C., & Moon, H. (2020). Sensor-based and vision-based human activity recognition: A comprehensive survey. Pattern Recognition, 108, 107561. https://doi.org/10.1016/j.patcog.2020.107561
[19]Janarthanan Ramadoss, J. Venkatesh, Shubham Joshi, Piyush Kumar Shukla, Sajjad Shaukat Jamal, Majid Altuwairiqi, Basant Tiwari, "Computer Vision for Human-Computer Interaction Using Noninvasive Technology", Scientific Programming, vol. 2021, Article ID 3902030, 15 pages, 2021. https://doi.org/10.1155/2021/3902030 
[20]A. Gupta, K. Gupta, K. Gupta and K. Gupta, "A Survey on Human Activity Recognition and Classification," 2020 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 2020, pp. 0915-0919, doi: 10.1109/ICCSP48568.2020.9182416
[21]Surbhi Anand, Rinkle Rani, “Data Mining Types and Techniques: A Survey”, International Journal of Research in IT & Management, Vol. 2, No. 2, 2012
[22]Williams, G.J. (2006). Data Mining: Theory, Methodology, Techniques, and Applications. [online] Google Books. Springer Science & Business Media. Available at: https://books.google.com.bd/books/about/Data_Mining.html?id=dXo2g3kFxKsC&redir_esc=y [Accessed 18 Nov. 2023]
[23]S., Vijayarani, Mrs., M., Muthulakshmi. (2013). Comparative Study on Classification MetaAlgorithms. International Journal of Innovative Research in Computer and Communication Engineering, 1(8), 1768-1774
[24]Smyth, P. (2000). Data mining: data analysis on a grand scale? Statistical Methods in Medical Research, 9(4), pp.309–327. doi: https://doi.org/10.1177/096228020000900402
[25]Tan, A.H., 1999, April. Text mining: The state of the art and the challenges. In Proceedings of the pakdd 1999 workshop on knowledge disocovery from advanced databases (Vol. 8, pp. 65-70)
[26]Dyrmishi, S., Ghamizi, S. and Cordy, M. (2023). How do humans perceive adversarial text? A reality check on the validity and naturalness of word-based adversarial attacks. [online]arXiv.org. doi: https://doi.org/10.48550/arXiv.2305.15587.
[27]Kumar, L. and Bhatia, P.K., 2013. Text mining: concepts, process and applications. Journal of Global Research in Computer Science, 4(3), pp.36-39
[28]Atefeh, Khazaei, Ghoujdi. (2013). Exploit Prediction and Vulnerability Clustering Using Text Mining
[29]IJSREM. (n.d.). Using Text Mining Techniques for Extracting Information. [online] Available at: https://ijsrem.com/download/using-text-mining-techniques-for-extracting-information/ [Accessed 19 Nov. 2023]
[30]Cheng, C.-H. and Chen, H.-H. (2019). Sentimental text mining based on an additional features method for text classification. PLOS ONE, 14(6), p.e0217591. doi: https://doi.org/10.1371/journal.pone.0217591.
[31]https://www.kaggle.com/datasets/thoughtvector/customer-support-on-twitter
[32]UNext. (2021). Text Mining Algorithms: A Comprehensive Overview (2021). [online] Available at: https://u-next.com/blogs/data-science/text-mining-algorithms/ 
[33]Sharma, A. (2020). Random Forest vs Decision Tree | Which Is Right for You? [online] Analytics Vidhya. Available at: https://www.analyticsvidhya.com/blog/2020/05/decision-tree-vs-random-forest-algorithm/#:~:text=A
[34]www.sciencedirect.com. (n.d.). Text Mining Algorithm - an overview | ScienceDirect Topics. [online] Available at: https://www.sciencedirect.com/topics/mathematics/text-mining-algorithm