IEEE Computational Intelligence Magazine - February 2020 - 69

which allows word embeddings to be
fine-tuned during the training.

TABLE II Dataset statistics.

V. Experiments, Results and
Analysis

DATASETS

DOMAIN

TRAIN

DEV

TEST

EMOTION ANALYSIS (WASSA-2017) [7]

ANGER

857

84

760

FEAR

1,147

110

995

JOY

823

79

714

SADNESS

786

74

673

MICROBLOGS

1,700

-

800

NEWS

1,142

-

491

A. Dataset

We evaluate our model on the datasets
of eighth Workshop on Computational
Approaches to Subjectivity, Sentiment and
Social Media Analysis shared task on emotion intensity (EmoInt-2017) [7] for emotion analysis.The datasets of SemEval-2017
shared task on 'Fine-Grained Sentiment
Analysis on Financial Microblogs and
News' [8], are used for sentiment analysis.
The EmoInt-2017 datasets [7] contain
generic tweets representing four emotions, i.e., joy, fear, anger and sadness.
Datasets of SemEval-2017 [8] comprise of financial texts from microblogs
(Twitter and StockTwits) and news
(Yahoo finance). For the experimental
purpose, we perform five-fold cross validation for model tuning and hyperparameter selection. According to the respective
description papers, SemEval-2017 dataset
[8] was manually annotated by three
human financial experts while Emotion
Intensity [7] dataset was created using the
Best-Worst Scaling technique [52]. Detailed statistics of both the datasets are
presented in Table II.
B. Preprocessing

We use NLTK [53] for tokenization.
Since the contents were derived from
the Internet, pre-processing is of paramount importance due to lack of proper
grammar and structures. Since URLs,
user names and numbers usually do not
carry any polar sentiments, we replace
these with the tags: ,  and
, respectively. For example, we
replace 'www.twitter.com' by  and '@
JonSnow' by . After stripping off
excess white spaces, all the characters
were converted to lowercase. Additionally, all HTML entities were converted to
their corresponding unicode characters
such as '&' was replaced by 'and'.
Hashtags carry meaningful information
and are relevant to extract underlying
emotions and sentiments. We first stripoff # symbol from the hashtags and then

SENTIMENT ANALYSIS (SEMEVAL-2017) [8]

split the resulting token into constituent
words. For example, '#GreatDayEver' is
converted to 'Great Day Ever'. We
employ python-based WordSegment 1
module for the segmentation of hashtags.
Finally, we perform normalization of
noisy text by employing the following
set of heuristics in line with [54].
❏ Elongation of a valid word: To convey their state of emotions or sentiments, users tend to express through
elongation of a valid word, e.g., 'joooyy',
'gooood', etc. We define a heuristics that
identifies all such elongated words and
process them into valid dictionary
words by iteratively dropping the consecutive sequence of characters. For
example 'joooyy' and 'gooood' are converted to 'joy' and 'good', respectively.
❏ Frequent noisy term: Due to the
character limit in Twitter, usage of
abbreviations and slang terms in
tweets are in common practice among
users, e.g., 'grt', 'g8' for 'great'. To
handle such cases we created a dictionary of commonly used abbreviations and slang terms along with
their expanded valid forms. We then
perform a lookup in the dictionary
for each token in a tweet and on the
success we use its expanded valid
form for further processing. We compile the dictionary of the frequent
noisy term by consulting the datasets
of WNUT-2015 shared task on Twitter Lexical Normalization [55].
❏ Verb present participle: By careful
inspection of tweets, it is observed
that users have a common practice to
skip the characters 'g' or 'i' from the
present participle form of a verb, i.e.,
'ing' form of the verb. For example,
1

https://github.com/grantjenks/wordsegment

'enjoying' is written as 'enjoyin' or
'enjoyng'. We correct these cases by
applying a heuristics that considers
all the verbs that end with either 'in'
or 'ng' and convert them into valid
present participle form of the verb.
❏ Expand contraction: Twitter users
generally tend to merge two words by
introducing an apostrophe (') symbol
in place of few in between character
sequences, e.g., the contraction "i've"
belongs to valid words "i have". Such
practice saves a few crucial characters
in a tweet and can be utilized for extra
words. We create a list of such contractions and their expanded forms by
consulting the WNUT-2015 datasets
[55].We apply a heuristic that identifies
contracted tokens in a tweet and converts them to its normalized form.
C. Experiments

For evaluation of the proposed models,
we employ the Pearson correlation
coefficient and cosine similarity score
for the problems of emotion intensity
and sentiment score, respectively. The
choice of evaluation metrics was derived
from the guidelines of the shared tasks
on EmoInt-2017 [7] and SemEval-2017
[8]. Pearson correlation coefficient measures the linear correlation between the
actual and predicted scores, whereas the
cosine similarity score measures the
degree of agreement between the actual
and predicted values.
We separately train and tune all the
deep learning systems (CNN, LSTM
and GRU) over different word embeddings-pretrained, financial and the
DAWE. As mentioned earlier, we do not
employ financial word embedding for
the generic emotion analysis task. The
network architecture (dimensions, layers,

FEBRUARY 2020 | IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE

69


http://www.twitter.com

IEEE Computational Intelligence Magazine - February 2020

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - February 2020

Contents
IEEE Computational Intelligence Magazine - February 2020 - Cover1
IEEE Computational Intelligence Magazine - February 2020 - Cover2
IEEE Computational Intelligence Magazine - February 2020 - Contents
IEEE Computational Intelligence Magazine - February 2020 - 2
IEEE Computational Intelligence Magazine - February 2020 - 3
IEEE Computational Intelligence Magazine - February 2020 - 4
IEEE Computational Intelligence Magazine - February 2020 - 5
IEEE Computational Intelligence Magazine - February 2020 - 6
IEEE Computational Intelligence Magazine - February 2020 - 7
IEEE Computational Intelligence Magazine - February 2020 - 8
IEEE Computational Intelligence Magazine - February 2020 - 9
IEEE Computational Intelligence Magazine - February 2020 - 10
IEEE Computational Intelligence Magazine - February 2020 - 11
IEEE Computational Intelligence Magazine - February 2020 - 12
IEEE Computational Intelligence Magazine - February 2020 - 13
IEEE Computational Intelligence Magazine - February 2020 - 14
IEEE Computational Intelligence Magazine - February 2020 - 15
IEEE Computational Intelligence Magazine - February 2020 - 16
IEEE Computational Intelligence Magazine - February 2020 - 17
IEEE Computational Intelligence Magazine - February 2020 - 18
IEEE Computational Intelligence Magazine - February 2020 - 19
IEEE Computational Intelligence Magazine - February 2020 - 20
IEEE Computational Intelligence Magazine - February 2020 - 21
IEEE Computational Intelligence Magazine - February 2020 - 22
IEEE Computational Intelligence Magazine - February 2020 - 23
IEEE Computational Intelligence Magazine - February 2020 - 24
IEEE Computational Intelligence Magazine - February 2020 - 25
IEEE Computational Intelligence Magazine - February 2020 - 26
IEEE Computational Intelligence Magazine - February 2020 - 27
IEEE Computational Intelligence Magazine - February 2020 - 28
IEEE Computational Intelligence Magazine - February 2020 - 29
IEEE Computational Intelligence Magazine - February 2020 - 30
IEEE Computational Intelligence Magazine - February 2020 - 31
IEEE Computational Intelligence Magazine - February 2020 - 32
IEEE Computational Intelligence Magazine - February 2020 - 33
IEEE Computational Intelligence Magazine - February 2020 - 34
IEEE Computational Intelligence Magazine - February 2020 - 35
IEEE Computational Intelligence Magazine - February 2020 - 36
IEEE Computational Intelligence Magazine - February 2020 - 37
IEEE Computational Intelligence Magazine - February 2020 - 38
IEEE Computational Intelligence Magazine - February 2020 - 39
IEEE Computational Intelligence Magazine - February 2020 - 40
IEEE Computational Intelligence Magazine - February 2020 - 41
IEEE Computational Intelligence Magazine - February 2020 - 42
IEEE Computational Intelligence Magazine - February 2020 - 43
IEEE Computational Intelligence Magazine - February 2020 - 44
IEEE Computational Intelligence Magazine - February 2020 - 45
IEEE Computational Intelligence Magazine - February 2020 - 46
IEEE Computational Intelligence Magazine - February 2020 - 47
IEEE Computational Intelligence Magazine - February 2020 - 48
IEEE Computational Intelligence Magazine - February 2020 - 49
IEEE Computational Intelligence Magazine - February 2020 - 50
IEEE Computational Intelligence Magazine - February 2020 - 51
IEEE Computational Intelligence Magazine - February 2020 - 52
IEEE Computational Intelligence Magazine - February 2020 - 53
IEEE Computational Intelligence Magazine - February 2020 - 54
IEEE Computational Intelligence Magazine - February 2020 - 55
IEEE Computational Intelligence Magazine - February 2020 - 56
IEEE Computational Intelligence Magazine - February 2020 - 57
IEEE Computational Intelligence Magazine - February 2020 - 58
IEEE Computational Intelligence Magazine - February 2020 - 59
IEEE Computational Intelligence Magazine - February 2020 - 60
IEEE Computational Intelligence Magazine - February 2020 - 61
IEEE Computational Intelligence Magazine - February 2020 - 62
IEEE Computational Intelligence Magazine - February 2020 - 63
IEEE Computational Intelligence Magazine - February 2020 - 64
IEEE Computational Intelligence Magazine - February 2020 - 65
IEEE Computational Intelligence Magazine - February 2020 - 66
IEEE Computational Intelligence Magazine - February 2020 - 67
IEEE Computational Intelligence Magazine - February 2020 - 68
IEEE Computational Intelligence Magazine - February 2020 - 69
IEEE Computational Intelligence Magazine - February 2020 - 70
IEEE Computational Intelligence Magazine - February 2020 - 71
IEEE Computational Intelligence Magazine - February 2020 - 72
IEEE Computational Intelligence Magazine - February 2020 - 73
IEEE Computational Intelligence Magazine - February 2020 - 74
IEEE Computational Intelligence Magazine - February 2020 - 75
IEEE Computational Intelligence Magazine - February 2020 - 76
IEEE Computational Intelligence Magazine - February 2020 - 77
IEEE Computational Intelligence Magazine - February 2020 - 78
IEEE Computational Intelligence Magazine - February 2020 - 79
IEEE Computational Intelligence Magazine - February 2020 - 80
IEEE Computational Intelligence Magazine - February 2020 - 81
IEEE Computational Intelligence Magazine - February 2020 - 82
IEEE Computational Intelligence Magazine - February 2020 - 83
IEEE Computational Intelligence Magazine - February 2020 - 84
IEEE Computational Intelligence Magazine - February 2020 - 85
IEEE Computational Intelligence Magazine - February 2020 - 86
IEEE Computational Intelligence Magazine - February 2020 - 87
IEEE Computational Intelligence Magazine - February 2020 - 88
IEEE Computational Intelligence Magazine - February 2020 - 89
IEEE Computational Intelligence Magazine - February 2020 - 90
IEEE Computational Intelligence Magazine - February 2020 - 91
IEEE Computational Intelligence Magazine - February 2020 - 92
IEEE Computational Intelligence Magazine - February 2020 - 93
IEEE Computational Intelligence Magazine - February 2020 - 94
IEEE Computational Intelligence Magazine - February 2020 - 95
IEEE Computational Intelligence Magazine - February 2020 - 96
IEEE Computational Intelligence Magazine - February 2020 - 97
IEEE Computational Intelligence Magazine - February 2020 - 98
IEEE Computational Intelligence Magazine - February 2020 - 99
IEEE Computational Intelligence Magazine - February 2020 - 100
IEEE Computational Intelligence Magazine - February 2020 - Cover3
IEEE Computational Intelligence Magazine - February 2020 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com