Computational Intelligence - February 2014 - 25

SenticNet

C&C

Levin++

SentiWorldNet

Analogical
Reasoning
Boxer

FRED
Machine Reader

Opinion Model Annotator

Sentiment Score
Computation Component

Topic and Opinion
Models Index

Sentiment Patterns
Learner

Topic Co-Reference
Resolution

Fuzzy Reasoner

Evolutionary Optimization
and Learning Mechanisms

Figure 4 The pipeline of components in Sentilo.

Drug_1 (N{Y}/N{Y}<1>) {_} 1 dealers_2 0
3,600_6 (N{Y}/N{Y}<1>) {_} 1 kilos_7 0
some_5 (NP[nb] {Y}/N{Y}<1>) {_} 1 kilos_7 0
colonel_11 (N{Y}/N{Y}<1>) {_} 1 said._12 0
the_10 ((NP{Y}\NP{Y}<1>) {_}/N{Z}<2>) {_} 2 said._12 0
the_10 ((NP{Y}\NP{Y}<1>) {_}/N{Z}<2>) {_} 1 narcotics,_9 0
of_8 ((NP{Y}\NP{Y}<1>) {_}/NP{Z}<2>) {_} 2 narcotics,_9 0
of_8 ((NP{Y}\NP{Y}<1>) {_}/NP{Z}<2>) {_} 1 kilos_7 0
lost_4 ((S[pt] {_}\NP{Y}<1>) {_}/NP{Z}<2>) {_} 2 kilos_7 0
have_3 ((S[dcl] {_}\NP{Y}<1>) {_}/(S[pt] {Z}<2>\NP{Y*}){Z}) {_} 2 lost_4 0
lost_4 ((S[pt] {_}\NP{Y}<1>) {_}/NP {Z}<2> {_} 1 dealers_2 0 ((S[dcl] {x}\NP{y}<28>) {x}/ (S[pt] {z}<29>
\NP{Y*}) {Z}) {x}
have_3 ((S[dcl] {_}\NP{Y}<1>) {_}/(S[pt] {Z}<2>\NP{Y*}){Z}) {_} 1 dealers_2 0
 DrugWdrugWNNWI-NPW0WN/N dealersWdealersWNNSWI-NPW0WN haveWhaveWVBPWIVPW0W (S[dcl]\NP) / (S[pt]\NP) lostWlostWVBNWI-VPW0W (S[pt]\NP) / NP someWsomeWDTWI-NPW0WNP[nb]/N
3,600W3,600WCDWI-NPW0WN/N kilosWkilosWNNSWI-NPW0WN ofWofWINWI-PPW0W(NP\NP)/NP
narcotics, Wnarcotics,WNNWI-NPW0WN theWtheWDTWB-NPW0W (NP\NP)/N colonelWcolonelWNNWI-NPW0WN\N
said.Wsaid.WNNW I-NP W0WN
Figure 5 The output of C&C for the sentence "Drug dealers have lost some 3,600 kilos of narcotics, the colonel said".

4. Sentilo: Identifying Holders and
Topics of an Opinion Sentence

From an implementation perspective, our approach (named
Sentilo) is realized as a pipeline of components depicted in Figure 4, where colored components indicate novel contributions.
Components in dashed boxes are currently being developed. To
the best of our knowledge, Sentilo is the first method for opinion mining that hybridizes formal semantics, NLP and typical
computational intelligence techniques.
In order to explain the pipeline, let us consider the following sentence from the corpus we have used for the evaluation

(presented in Section 5): Drug dealers have lost some 3,600 kilos of
narcotics, the colonel said.
The syntactic constructs (cf. Section 3) are provided by
C&C [16], a combinatory categorial parser that integrates
named entity recognition, a categorial equivalent of dependency relation extraction, and co-reference resolution. The output of C&C for the sample sentence is depicted in Figure 5.
The output of C&C is processed by Boxer [4], an opensource software that produces event-based, verb-centric, semantic representations of natural language complying with Discourse Representation Theory (DRT) semantics. DRT is a

February 2014 | Ieee ComputatIonal IntellIgenCe magazIne

25



Table of Contents for the Digital Edition of Computational Intelligence - February 2014

Computational Intelligence - February 2014 - Cover1
Computational Intelligence - February 2014 - Cover2
Computational Intelligence - February 2014 - 1
Computational Intelligence - February 2014 - 2
Computational Intelligence - February 2014 - 3
Computational Intelligence - February 2014 - 4
Computational Intelligence - February 2014 - 5
Computational Intelligence - February 2014 - 6
Computational Intelligence - February 2014 - 7
Computational Intelligence - February 2014 - 8
Computational Intelligence - February 2014 - 9
Computational Intelligence - February 2014 - 10
Computational Intelligence - February 2014 - 11
Computational Intelligence - February 2014 - 12
Computational Intelligence - February 2014 - 13
Computational Intelligence - February 2014 - 14
Computational Intelligence - February 2014 - 15
Computational Intelligence - February 2014 - 16
Computational Intelligence - February 2014 - 17
Computational Intelligence - February 2014 - 18
Computational Intelligence - February 2014 - 19
Computational Intelligence - February 2014 - 20
Computational Intelligence - February 2014 - 21
Computational Intelligence - February 2014 - 22
Computational Intelligence - February 2014 - 23
Computational Intelligence - February 2014 - 24
Computational Intelligence - February 2014 - 25
Computational Intelligence - February 2014 - 26
Computational Intelligence - February 2014 - 27
Computational Intelligence - February 2014 - 28
Computational Intelligence - February 2014 - 29
Computational Intelligence - February 2014 - 30
Computational Intelligence - February 2014 - 31
Computational Intelligence - February 2014 - 32
Computational Intelligence - February 2014 - 33
Computational Intelligence - February 2014 - 34
Computational Intelligence - February 2014 - 35
Computational Intelligence - February 2014 - 36
Computational Intelligence - February 2014 - 37
Computational Intelligence - February 2014 - 38
Computational Intelligence - February 2014 - 39
Computational Intelligence - February 2014 - 40
Computational Intelligence - February 2014 - 41
Computational Intelligence - February 2014 - 42
Computational Intelligence - February 2014 - 43
Computational Intelligence - February 2014 - 44
Computational Intelligence - February 2014 - 45
Computational Intelligence - February 2014 - 46
Computational Intelligence - February 2014 - 47
Computational Intelligence - February 2014 - 48
Computational Intelligence - February 2014 - 49
Computational Intelligence - February 2014 - 50
Computational Intelligence - February 2014 - 51
Computational Intelligence - February 2014 - 52
Computational Intelligence - February 2014 - 53
Computational Intelligence - February 2014 - 54
Computational Intelligence - February 2014 - 55
Computational Intelligence - February 2014 - 56
Computational Intelligence - February 2014 - 57
Computational Intelligence - February 2014 - 58
Computational Intelligence - February 2014 - 59
Computational Intelligence - February 2014 - 60
Computational Intelligence - February 2014 - 61
Computational Intelligence - February 2014 - 62
Computational Intelligence - February 2014 - 63
Computational Intelligence - February 2014 - 64
Computational Intelligence - February 2014 - Cover3
Computational Intelligence - February 2014 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com