[1] A. Souri, S. Hosseinpour, and A.M. Rahmani, “Personality classification based on profiles of social networks' users and the five-factor model of personality,” Hum. Centric Comput. Inf. Sci., vol. 8, p. 24, 2018, doi: 10.1186/s13673-018-0147-4.
[2] A. Ortigosa, R.M. Carro, and J.I. Quiroga, ”Predicting user personality by mining social interactions in Facebook,” J. Comput. Syst. Sci., vol. 80, no. 1, pp. 57-71, 2014, doi: 10.1016/j.jcss.2013.03.008.
[3] J. Golbeck, C. Robles, and K. Turner, “Predicting personality with social media”, In Int. Conf. Hum. Factors Comput. Syst. (CHI), Extended Abstracts Volume, Vancouver, BC, Canada, 2011, pp. 253-262, doi: 10.1145/1979742.1979614.
[4] P. Adamopoulos, A. Ghose, and V. Todri, “The Impact of User Personality Traits on Word of Mouth: Text-Mining Social Media Platforms,” Inf. Syst. Res., vol. 29, no. 3, pp. 612-640, 2018, doi: 10.1287/isre.2017.0768.
[5] R. Zarnoufi and M. Abik, “Big Five Personality Traits and Ensemble Machine Learning to Detect Cyber-Violence in Social Media,” in Learning and Analytics in Intelligent Systems, vol 7. Springer, Cham., 2020, doi: 10.1007/978-3-030-36778-7_21.
[6] R. Buettner, “Predicting user behavior in electronic markets based on personality-mining in large online social networks - A personality-based product recommender framework,” Electron. Mark., vol. 27, no. 3, pp. 247-265, 2017, doi: 10.1007/s12525-016-0228-z.
[7] J. Golbeck, C. Robles, M. Edmondson, and K. Turner, “Predicting Personality from Twitter,” in 3rd Int. Conf. Priv. Secur. Risk Trust, and 3rd Int. Conf. Soc. Comput., Boston, MA, USA, 2011, pp. 149-156, doi: 10.1109/PASSAT/SocialCom.2011.33.
[8] H. Wei, F. Zhang, N.J. Yuan, C. Cao, H. Fu, X. Xie, and W.Y. Ma, “Beyond the words: Predicting user personality from heterogeneous information”, in Proc. 10th ACM Int. conf. Web Search Data Mining, 2017, pp. 305-314, doi: 10.1145/3018661.301871.
[9] A. Guo, J. Ma, S. Tan, and G. Sun, “From affect, behavior, and cognition to personality: an integrated personal character model for individual-like intelligent artifacts,” World Wide Web, vol. 23, no. 2, pp. 1217-1239, 2020, doi: 10.1007/s11280-019-00713-w.
[10] A. Sengupta and A. Ghosh, “Mining social network data for predictive personality modelling by employing machine learning techniques”, in Comput. Adv. Commun. Circuits Syst., Lecture Notes in Electrical Engineering, vol 575, Springer, Singapore, 2020, doi: 10.1007/978-981-13-8687-9_11.
[11] M.A. Moreno-Armendariz, C. A. Duchanoy Mart?nez, H. Calvo, and M. Moreno-Sotelo, “Estimation of Personality Traits From Portrait Pictures Using the Five-Factor Model,” in IEEE Access, vol. 8, pp. 201649-201665, 2020, doi: 10.1109/ACCESS.2020.3034639.
[12] P. Etkin, L. Mezquita, F.J. Lopez-Fernandez, G. Ortet, and M.I. Ibanez, “Five Factor model of personality and structure of psychopathological symptoms in adolescents,” Pers. Individ. Differ., vol. 163, no. 1, p. 110063, 2020, doi: 10.1016/j.paid.2020.110063.
[13] C. Alonso and E. Romero, “Study of the Domains and Facets of the Five-Factor Model of Personality in Problematic Internet Use in Adolescents,” Int. J. Ment. Health Addiction, vol. 18, pp. 293–304, 2020, doi: 10.1007/s11469-018-9960-2.
[14] S.A. Murphy, P.A. Fisher, C. and Robie, “International comparison of gender differences in the five-factor model of personality: An investigation across 105 countries,” J. Res. Pers., vol. 90, p. 104047, 2021, doi: 10.1016/j.jrp.2020.104047.
[15] M. Goma-i-Freixanet, Y.M. Ortega, and A. Arnau, “The location of coping strategies within the Alternative Five Factor Model of personality,” New Ideas Psychol., vol. 60, p. 100834, 2021, doi: 10.1016/j.newideapsych.2020.100834.
[16] A.R. Sutin, D. Aschwanden, Y. Stephan, and A. Terracciano, “Five Factor Model personality traits and subjective cognitive failures,” Pers. Individ. Differ., vol. 155, p. 109741, 2020, doi: 10.1016/j.paid.2019.109741.
[17] Z. Wang, V. Joo, C. Tong and D. Chan, "Issues of Social Data Analytics with a New Method for Sentiment Analysis of Social Media Data," in IEEE 6th Int. Conf. Cloud Comput. Technol. Sci., Singapore, 2014, pp. 899-904, doi: 10.1109/CloudCom.2014.40.
[18] A.K. Nassirtoussi, S. Aghabozorgi, T.Y. Wah, and D.C.L. Ngo, “Text mining for market prediction: A systematic review,” Expert Syst. Appl., vol. 41, no. 16, pp. 7653-7670, 2014, doi: 10.1016/j.eswa.2014.06.009.
[19] S. Razzaghzadeh, P. Norouzi Kivi, and B. Panahi, “A hybrid algorithm based on Gossip architecture using SVM for task scheduling in cloud computing,” Soft Comput. J., vol. 9, no. 2, pp. 84-93, 2021, doi: 10.22052/scj.2021.242822.0 [In Persian].
[20] Z. Roozbahani, M. Yari, and R. Ghiasi, “Developing a Filter-Wrapper Feature Selection Method and its Application in Dimension Reduction of Gen Expression,” Soft Comput. J., vol. 6, no. 2, pp. 48-59, 2018, dor: 20.1001.1.23223707.1396.6.2.4.8 [In Persian].
[21] B.E. Boser, I.M. Guyon, and V.N. Vapnik, “A training algorithm for optimal margin classifiers,” in Proc. 5th Ann. Worksh. Comput. Learn. Theor., Pittsburgh, PA, USA, 1992, pp. 144-152, doi: 10.1145/130385.130401.
[22] A. Khosravi, H. Abdulmaleki, and M. Fayazi, “Predicting the academic status of admitted applicants based on educational and admission data using data mining techniquesn,” Soft Comput. J., vol. 9, no. 2, pp. 94-113, 2021, doi: 10.22052/scj.2021.242837.0 [In Persian].
[23] J.C. Waters, “Accuracy and precision in quantitative fluorescence microscopy,” J. Cell. Biol., vol. 185, no. 7, pp. 1135–1148, 2009, doi: 10.1083/jcb.200903097.