Fig. 5From: Opinion mining for national security: techniques, domain applications, challenges and research opportunitiesOpinion mining techniques chartBack to article page