{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T15:46:29Z","timestamp":1775231189127,"version":"3.50.1"},"reference-count":48,"publisher":"MDPI AG","issue":"5","license":[{"start":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T00:00:00Z","timestamp":1646265600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["POCI-01-0145-FEDER-29178"],"award-info":[{"award-number":["POCI-01-0145-FEDER-29178"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia","doi-asserted-by":"publisher","award":["UIDB\/00319\/2020"],"award-info":[{"award-number":["UIDB\/00319\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e Tecnologia","doi-asserted-by":"publisher","award":["UIDP\/00760\/2020"],"award-info":[{"award-number":["UIDP\/00760\/2020"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronics"],"abstract":"<jats:p>Argumentation-based dialogue models have shown to be appropriate for decision contexts in which it is intended to overcome the lack of interaction between decision-makers, either because they are dispersed, they are too many, or they are simply not even known. However, to support decision processes with argumentation-based dialogue models, it is necessary to have knowledge of certain aspects that are specific to each decision-maker, such as preferences, interests, and limitations, among others. Failure to obtain this knowledge could ruin the model\u2019s success. In this work, we sought to facilitate the information acquisition process by studying strategies to automatically predict the tourists\u2019 preferences (ratings) in relation to points of interest based on their reviews. We explored different Machine Learning methods to predict users\u2019 ratings. We used Natural Language Processing strategies to predict whether a review is positive or negative and the rating assigned by users on a scale of 1 to 5. We then applied supervised methods such as Logistic Regression, Random Forest, Decision Trees, K-Nearest Neighbors, and Recurrent Neural Networks to determine whether a tourist likes\/dislikes a given point of interest. We also used a distinctive approach in this field through unsupervised techniques for anomaly detection problems. The goal was to improve the supervised model in identifying only those tourists who truly like or dislike a particular point of interest, in which the main objective is not to identify everyone, but fundamentally not to fail those who are identified in those conditions. The experiments carried out showed that the developed models could predict with high accuracy whether a review is positive or negative but have some difficulty in accurately predicting the rating assigned by users. Unsupervised method Local Outlier Factor improved the results, reducing Logistic Regression false positives with an associated cost of increasing false negatives.<\/jats:p>","DOI":"10.3390\/electronics11050779","type":"journal-article","created":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T09:24:53Z","timestamp":1646299493000},"page":"779","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Anomaly Detection on Natural Language Processing to Improve Predictions on Tourist Preferences"],"prefix":"10.3390","volume":"11","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1502-780X","authenticated-orcid":false,"given":"Jorge","family":"Meira","sequence":"first","affiliation":[{"name":"GECAD\u2014Research Group on Intelligent Engineering and Computing for Advanced Innovation and Development, Institute of Engineering, Polytechnic of Porto, 4200-072 Porto, Portugal"},{"name":"CITIC\u2014Centro de Investigaci\u00f3n en Tecnolog\u00edas de la Informaci\u00f3n y las Comunicaciones, University of A Coruna, 15071 A Coruna, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1430-5465","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Carneiro","sequence":"additional","affiliation":[{"name":"GECAD\u2014Research Group on Intelligent Engineering and Computing for Advanced Innovation and Development, Institute of Engineering, Polytechnic of Porto, 4200-072 Porto, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0524-6427","authenticated-orcid":false,"given":"Ver\u00f3nica","family":"Bol\u00f3n-Canedo","sequence":"additional","affiliation":[{"name":"CITIC\u2014Centro de Investigaci\u00f3n en Tecnolog\u00edas de la Informaci\u00f3n y las Comunicaciones, University of A Coruna, 15071 A Coruna, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0950-0012","authenticated-orcid":false,"given":"Amparo","family":"Alonso-Betanzos","sequence":"additional","affiliation":[{"name":"CITIC\u2014Centro de Investigaci\u00f3n en Tecnolog\u00edas de la Informaci\u00f3n y las Comunicaciones, University of A Coruna, 15071 A Coruna, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3549-0754","authenticated-orcid":false,"given":"Paulo","family":"Novais","sequence":"additional","affiliation":[{"name":"ALGORITMI Centre, University of Minho, 4800-058 Guimaraes, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4417-8401","authenticated-orcid":false,"given":"Goreti","family":"Marreiros","sequence":"additional","affiliation":[{"name":"GECAD\u2014Research Group on Intelligent Engineering and Computing for Advanced Innovation and Development, Institute of Engineering, Polytechnic of Porto, 4200-072 Porto, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2022,3,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1007\/s10115-017-1093-6","article-title":"Dynamic argumentation in UbiGDSS","volume":"55","author":"Carneiro","year":"2018","journal-title":"Knowl. Inf. Syst."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"517","DOI":"10.1142\/S0219622018500542","article-title":"Arguing with behavior influence: A model for web-based group decision support systems","volume":"18","author":"Carneiro","year":"2019","journal-title":"Int. J. Inf. Technol. Decis. Mak."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Carneiro, J., Alves, P., Marreiros, G., and Novais, P. (2019, January 16\u201319). A multi-agent system framework for dialogue games in the group decision-making context. Proceedings of the World Conference on Information Systems and Technologies, Galicia, Spain.","DOI":"10.1007\/978-3-030-16181-1_41"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1007\/s13218-014-0307-2","article-title":"Strategic argumentation in multi-agent systems","volume":"28","author":"Thimm","year":"2014","journal-title":"KI-K\u00fcnstliche Intell."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"McBurney, P., and Parsons, S. (2009). Dialogue games for agent argumentation. Argumentation in Artificial Intelligence, Springer.","DOI":"10.1007\/978-0-387-98197-0_13"},{"key":"ref_6","unstructured":"Carneiro, J., Andrade, R., Alves, P., Concei\u00e7\u00e3o, L., Novais, P., and Marreiros, G. (2020, January 9\u201313). A consensus-based group decision support system using a multi-agent MicroServices approach. Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems, Auckland, New Zealand."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"735","DOI":"10.1016\/j.neucom.2020.04.100","article-title":"Group decision support systems for current times: Overcoming the challenges of dispersed group decision-making","volume":"423","author":"Carneiro","year":"2021","journal-title":"Neurocomputing"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1016\/j.neucom.2018.05.126","article-title":"Predicting satisfaction: Perceived decision quality by decision-makers in web-based group decision support systems","volume":"338","author":"Carneiro","year":"2019","journal-title":"Neurocomputing"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.inffus.2016.10.004","article-title":"A review of natural language processing techniques for opinion mining systems","volume":"36","author":"Sun","year":"2017","journal-title":"Inf. Fusion"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Chen, X., Xie, H., Cheng, G., Poon, L.K., Leng, M., and Wang, F.L. (2020). Trends and features of the applications of natural language processing techniques for clinical trials text analysis. Appl. Sci., 10.","DOI":"10.3390\/app10062157"},{"key":"ref_11","unstructured":"Thanaki, J. (2017). Python Natural Language Processing, Packt Publishing Ltd."},{"key":"ref_12","unstructured":"Wright, R.E. (1995). Logistic Regression, APA."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","article-title":"Random forests","volume":"45","author":"Breiman","year":"2001","journal-title":"Mach. Learn."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Quinlan, J.R. (1990). Probabilistic decision trees. Machine Learning, Elsevier.","DOI":"10.1016\/B978-0-08-051055-2.50011-0"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"238","DOI":"10.2307\/1403797","article-title":"Discriminatory analysis. Nonparametric discrimination: Consistency properties","volume":"57","author":"Fix","year":"1989","journal-title":"Int. Stat. Rev. Int. Stat."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","article-title":"Long short-term memory","volume":"9","author":"Hochreiter","year":"1997","journal-title":"Neural Comput."},{"key":"ref_17","unstructured":"Tax, D.M.J. (2021, October 01). One-Class Classification: Concept Learning in the Absence of Counter-Examples. Available online: https:\/\/www.proquest.com\/docview\/304771559."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., and Zhou, Z.H. (2008, January 15\u201319). Isolation forest. Proceedings of the 2008 Eighth IEEE International Conference on Data Mining, Pisa, Italy.","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., and Sander, J. (2000, January 16\u201318). LOF: Identifying density-based local outliers. Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, TX, USA.","DOI":"10.1145\/342009.335388"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1016\/j.jocs.2018.09.006","article-title":"Travelers decision making using online review in social network sites: A case on TripAdvisor","volume":"28","author":"Nilashi","year":"2018","journal-title":"J. Comput. Sci."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.dcm.2017.01.004","article-title":"Negative hotel reviews on TripAdvisor: A cross-linguistic analysis","volume":"16","author":"Cenni","year":"2017","journal-title":"Discourse Context Media"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MIS.2017.3121555","article-title":"Sentiment analysis in tripadvisor","volume":"32","author":"Valdivia","year":"2017","journal-title":"IEEE Intell. Syst."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"169446","DOI":"10.1109\/ACCESS.2019.2954861","article-title":"Multi-criteria review-based recommender system\u2013the state of the art","volume":"7","author":"Noah","year":"2019","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Kbaier, M.E.B.H., Masri, H., and Krichen, S. (November, January 30). A personalized hybrid tourism recommender system. Proceedings of the 2017 IEEE\/ACS 14th International Conference on Computer Systems and Applications (AICCSA), Hammamet, Tunisia.","DOI":"10.1109\/AICCSA.2017.12"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1018","DOI":"10.1007\/s11036-018-1059-2","article-title":"Efficient user profiling based intelligent travel recommender system for individual and group of users","volume":"24","author":"Logesh","year":"2019","journal-title":"Mob. Netw. Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1002\/asi.24552","article-title":"Serendipity in the city: User evaluations of urban recommender systems","volume":"73","author":"Smets","year":"2022","journal-title":"J. Assoc. Inf. Sci. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1016\/j.ins.2016.01.013","article-title":"Joint multi-grain topic sentiment: Modeling semantic aspects for online reviews","volume":"339","author":"Alam","year":"2016","journal-title":"Inf. Sci."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"463","DOI":"10.1016\/j.jmsy.2020.06.014","article-title":"Anomaly monitoring improves remaining useful life estimation of industrial machinery","volume":"56","author":"Aydemir","year":"2020","journal-title":"J. Manuf. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"107060","DOI":"10.1016\/j.cie.2020.107060","article-title":"Deep learning for diagnosis and classification of faults in industrial rotating machinery","volume":"153","author":"Souza","year":"2021","journal-title":"Comput. Ind. Eng."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"103289","DOI":"10.1016\/j.engappai.2019.103289","article-title":"A predictive model for the maintenance of industrial machinery in the context of industry 4.0","volume":"87","author":"Monroy","year":"2020","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/j.ins.2019.05.042","article-title":"Combining unsupervised and supervised learning in credit card fraud detection","volume":"557","author":"Carcillo","year":"2019","journal-title":"Inf. Sci."},{"key":"ref_32","first-page":"1060","article-title":"Credit card fraud detection using local outlier factor and isolation forest","volume":"7","author":"John","year":"2019","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_33","first-page":"102596","article-title":"Enhanced credit card fraud detection based on SVM-recursive feature elimination and hyper-parameters optimization","volume":"55","author":"Rtayli","year":"2020","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Gong, D., Liu, L., Le, V., Saha, B., Mansour, M.R., Venkatesh, S., and Hengel, A.V.d. (2019, January 27\u201328). Memorizing normality to detect anomaly: Memory-augmented deep autoencoder for unsupervised anomaly detection. Proceedings of the IEEE\/CVF International Conference on Computer Vision, Seoul, Korea.","DOI":"10.1109\/ICCV.2019.00179"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"101105","DOI":"10.1016\/j.aei.2020.101105","article-title":"Anomaly detection of defects on concrete structures with the convolutional autoencoder","volume":"45","author":"Chow","year":"2020","journal-title":"Adv. Eng. Inform."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"20200266","DOI":"10.1098\/rstb.2020.0266","article-title":"Real-time monitoring of COVID-19 dynamics using automated trend fitting and anomaly detection","volume":"376","author":"Jombart","year":"2021","journal-title":"Philos. Trans. R. Soc."},{"key":"ref_37","first-page":"419","article-title":"Unsupervised anomaly detection of healthcare providers using generative adversarial networks","volume":"12066","author":"Naidoo","year":"2020","journal-title":"Responsible Des. Implement. Use Inf. Commun. Technol."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"103181","DOI":"10.1016\/j.jbi.2019.103181","article-title":"A systematic review of aberration detection algorithms used in public health surveillance","volume":"94","author":"Yuan","year":"2019","journal-title":"J. Biomed. Inform."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","article-title":"A deep learning approach to network intrusion detection","volume":"2","author":"Shone","year":"2018","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Vinayakumar, R., Soman, K., and Poornachandran, P. (2017, January 13\u201316). Applying convolutional neural network for network intrusion detection. Proceedings of the 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India.","DOI":"10.1109\/ICACCI.2017.8126009"},{"key":"ref_41","unstructured":"Van, N.T., and Thinh, T.N. (2017, January 21\u201323). An anomaly-based network intrusion detection system using deep learning. Proceedings of the 2017 International Conference on System Science and Engineering (ICSSE), Ho Chi Minh City, Vietnam."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Althubiti, S.A., Jones, E.M., and Roy, K. (2018, January 21\u201323). Lstm for anomaly-based network intrusion detection. Proceedings of the 2018 28th International Telecommunication Networks and Applications Conference (ITNAC), Sydney, Australia.","DOI":"10.1109\/ATNAC.2018.8615300"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"47072","DOI":"10.1109\/ACCESS.2020.2977892","article-title":"Unsupervised anomaly detection of industrial robots using sliding-window convolutional variational autoencoder","volume":"8","author":"Chen","year":"2020","journal-title":"IEEE Access"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"113303","DOI":"10.1016\/j.dss.2020.113303","article-title":"Fraud detection: A systematic literature review of graph-based anomaly detection approaches","volume":"133","author":"Pourhabibi","year":"2020","journal-title":"Decis. Support Syst."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3417989","article-title":"Anomaly detection in road traffic using visual surveillance: A survey","volume":"53","author":"Santhosh","year":"2020","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"9645","DOI":"10.1109\/ACCESS.2019.2891315","article-title":"Drift-aware methodology for anomaly detection in smart grid","volume":"7","author":"Fenza","year":"2019","journal-title":"IEEE Access"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"4477","DOI":"10.1007\/s12652-019-01417-9","article-title":"Performance evaluation of unsupervised techniques in cyber-attack anomaly detection","volume":"11","author":"Meira","year":"2019","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_48","unstructured":"Bishop, C.M., and Nasrabadi, N.M. (2006). Pattern Recognition and Machine Learning, Springer."}],"container-title":["Electronics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-9292\/11\/5\/779\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:31:08Z","timestamp":1760135468000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-9292\/11\/5\/779"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,3]]},"references-count":48,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2022,3]]}},"alternative-id":["electronics11050779"],"URL":"https:\/\/doi.org\/10.3390\/electronics11050779","relation":{},"ISSN":["2079-9292"],"issn-type":[{"value":"2079-9292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,3]]}}}