Journal of Social and Political
Sciences
ISSN 2615-3718 (Online)
ISSN 2621-5675 (Print)
Published: 04 March 2024
Text Mining Algorithm Naive Bayes Classifier to Improve Quality Sentiment Analysis Passport Mobile Application
Wilonotomo, Budy Mulyawan, M. Ryanindityo, Muhammad Alvi Syahrin, Feni Yuli Triana
Immigration Polytechnic (Indonesia), Directorate General of Immigration (Indonesia)
Download Full-Text Pdf
10.31014/aior.1991.07.01.475
Pages: 169-178
Keywords: Text Mining, Algorithm, Naive Bayes Classifier, Sentiment Analysis, KDD, Mobile Passport
Abstract
Mobile Passport is an application that can be used as a digital service for people in Indonesia to apply for a new passport and an official online passport replacement from the Directorate General of Immigration replacing APAPO (Online Passport Service Application). User reviews of the Mobile Passport application are the output of big data generated as a result of the Internet of Things. The problem formulation in this research is how the implementation of the Naive Bayes text mining classifier algorithm can analyze the reviews contained in the Mobile Passport application as well as the accuracy, precision and recall values. This research uses the KDD (Knowledge Discovery and database) method which consists of data selection, data preprocessing, transformation, data mining, and evaluation using the R Studio tool. The resulting knowledge and information from this process is used as a useful knowledge base in decision making. The Naive Bayes classifier algorithm method in this research is used because of its reliability in handling data quickly and accurate predictions based on class probabilities, thus enabling research to obtain consistent and reliable results.
References
Alazab, M., Abu Khurma, R., Castillo, P. A., Abu-Salih, B., MartÃn, A., & Camacho, D. (2024). An effective networks intrusion detection approach based on hybrid Harris Hawks and multi-layer perceptron. Egyptian Informatics Journal, 25(November 2023), 100423. https://doi.org/10.1016/j.eij.2023.100423
Amarudin, Ferdiana, R., & Widyawan. (2024). B-DT Model: A Derivative Ensemble Method to Improve Performance of Intrusion Detection System. Journal of Advances in Information Technology, 15(1), 87–103. https://doi.org/10.12720/jait.15.1.87-103
APJII, A. P. J. I. I. (n.d.). APJII in Indonesia Digital Outlook. https://apjii.or.id/berita/d/apjii-di-indonesia-digital-outloook-2022_857
Ashar, A. R., & Maharani, C. (2022). Far from Home: Profile of pro-IS Deportees’ Mobility throughout 2016-2020 and Prevention Strategy of Indonesian Government. Journal of ASEAN Studies, 10(1), 81–105. https://doi.org/10.21512/jas.v10i1.7732
Behiry, M. H., & Aly, M. (2023). Cyberattack Detection in Wireless Sensor Networks using a Hybrid Feature Reduction Technique with AI and Machine Learning Methods. Journal of Big Data. https://doi.org/10.1186/s40537-023-00870-w
Chembakottu, B., Li, H., & Khomh, F. (2023). A large-scale exploratory study of android sports apps in the google play store. Information and Software Technology, 164(Heng Li). https://doi.org/10.1016/j.infsof.2023.107321
Farooqi, A. H., Akhtar, S., Rahman, H., Sadiq, T., & Abbass, W. (2023). Enhancing Network Intrusion Detection Using an Ensemble Voting Classifier for Internet of Things. Sensors, 24(1), 127. https://doi.org/10.3390/s24010127
Grotenhuis, Z., Mosteiro, P. J., & Leeuwenberg, A. M. (2024). Modest performance of text mining to extract health outcomes may be almost sufficient for high-quality prognostic model development. Computers in Biology and Medicine, 170(January), 108014. https://doi.org/10.1016/j.compbiomed.2024.108014
Hamzah, A. S. S. S. A., Saipan saipol, H. F., Nordin, S. Z., Shaffiei, Z. A., & Ohshima, N. (2024). Adopting Text Mining for Patent Analysis to Determine the Attribute and Segment in Automotive Industries. Journal of Advanced Research in Applied Sciences and Engineering Technology, 37(2), 94–103. https://doi.org/10.37934/araset.37.2.94103
Han, H., Asif, M., Awwad, E. M., Sarhan, N., Ghadi, Y. Y., & Xu, B. (2024). Innovative deep learning techniques for monitoring aggressive behavior in social media posts. Journal of Cloud Computing, 13(1). https://doi.org/10.1186/s13677-023-00577-6
Huo, H., Wang, C., Han, C., Yang, M., & Shang, W. L. (2024). Risk disclosure and entrepreneurial resource acquisition in crowdfunding digital platforms: Evidence from digital technology ventures. Information Processing and Management, 61(3), 103655. https://doi.org/10.1016/j.ipm.2024.103655
Kantar, O., & Kilimci, Z. H. (2023). Deep learning based hybrid gold index (XAU/USD) direction forecast model. Journal of the Faculty of Engineering and Architecture of Gazi University, 38(2), 1117–1128. https://doi.org/10.17341/gazimmfd.888456
Karthikeyan, M., Manimegalai, D., & RajaGopal, K. (2024). Firefly algorithm based WSN-IoT security enhancement with machine learning for intrusion detection. Scientific Reports, 14(1). https://doi.org/10.1038/s41598-023-50554-x
Lee, M., Lin, X., Chai, J. Z. Q., Lee, E. S., Smith, H., & Tudor Car, L. (2023). Smartphone apps for point-of-care information summaries: Systematic assessment of the quality and content. BMJ Evidence-Based Medicine, 28(5), 320–327. https://doi.org/10.1136/bmjebm-2022-112146
Liu, Y., Alias, A. H. bin, Haron, N. A., Bakar, N. A., & Wang, H. (2024). Technology status tracing and trends in construction robotics: A patent analysis. World Patent Information, 76(January), 102259. https://doi.org/10.1016/j.wpi.2023.102259
McConkey, R., & Olukoya, O. (2023). Runtime and Design Time Completeness Checking of Dangerous Android App Permissions Against GDPR. IEEE Access, 12(January), 1–1. https://doi.org/10.1109/access.2023.3347194
Nilashi, M., Abumalloh, R. A., Ahmadi, H., Samad, S., Alrizq, M., Abosaq, H., & Alghamdi, A. (2023). The nexus between quality of customer relationship management systems and customers’ satisfaction: Evidence from online customers’ reviews. Heliyon, 9(11), e21828. https://doi.org/10.1016/j.heliyon.2023.e21828
Nokkaew, M., Nongpong, K., Yeophantong, T., Ploykitikoon, P., Arjharn, W., Siritaratiwat, A., Narkglom, S., Wongsinlatam, W., Remsungnen, T., Namvong, A., & Surawanitkun, C. (2024). Analyzing online public opinion on Thailand-China high-speed train and Laos-China railway mega-projects using advanced machine learning for sentiment analysis. Social Network Analysis and Mining, 14(1), 1–15. https://doi.org/10.1007/s13278-023-01168-8
Perea-Khalifi, D., Irimia-Diéguez, A. I., & Palos-Sánchez, P. (2024). Exploring the determinants of the user experience in P2P payment systems in Spain: a text mining approach. Financial Innovation, 10(1). https://doi.org/10.1186/s40854-023-00496-0
Qureshi, A. A., Ahmad, M., Ullah, S., Yasir, M. N., Rustam, F., & Ashraf, I. (2023). Performance evaluation of machine learning models on large dataset of android applications reviews. Multimedia Tools and Applications, 82(24), 37197–37219. https://doi.org/10.1007/s11042-023-14713-6
Sadare, O., Melvin, T., Harvey, H., Vollebregt, E., & Gilbert, S. (2023). Can Apple and Google continue as health app gatekeepers as well as distributors and developers? Npj Digital Medicine, 6(1). https://doi.org/10.1038/s41746-023-00754-6
Shahpurkar, A., Patil, R., & Tangod, K. K. (2024). Class imbalance aware drift identification model for detecting diverse attack in streaming environment. Indonesian Journal of Electrical Engineering and Computer Science, 33(2), 981–989. https://doi.org/10.11591/ijeecs.v33.i2.pp981-989
Sinclair, R., Nodi, S., & Kabir, M. A. (2024). Evaluating mobile applications for estimating soil properties: Quality of current apps, limitations and future directions. Computers and Electronics in Agriculture, 216(December 2023), 108527. https://doi.org/10.1016/j.compag.2023.108527
Thiengburanathum, P., & Charoenkwan, P. (2023). SETAR: Stacking Ensemble Learning for Thai Sentiment Analysis Using RoBERTa and Hybrid Feature Representation. IEEE Access, 11(August), 92822–92837. https://doi.org/10.1109/ACCESS.2023.3308951
Xi, X., An, X., Zhang, G., & Liang, S. (2022). Spatial patterns, causes and characteristics of the cultural landscape of the Road of Tang Poetry based on text mining: take the Road of Tang Poetry in Eastern Zhejiang as an example. Heritage Science, 10(1), 1–28. https://doi.org/10.1186/s40494-022-00761-y
Yu, L., Xu, L., & Jiang, X. (2023). A High-Performance Multimodal Deep Learning Model for Detecting Minority Class Sample Attacks. Symmetry, 16(1), 42. https://doi.org/10.3390/sym16010042