![]() This is made as simple as possible, but deliberately limits what you can do. Once you have got authentication sorted out, we'll show you how to use NLTK's Twitter class. Alternatively, if you just want to play around with the Twitter data that is distributed as part of NLTK, head over to the section on using the twitter-samples corpus reader. If you have already obtained Twitter API keys as part of some earlier project, storing your keys explains how to save them to a file that NLTK will be able to find. We explain what's involved in the section First Steps. When you have registered your API keys, you can store them in a file on your computer, and then use them whenever you want. Most of the tasks that you might want to carry out with 'live' Twitter data require you to authenticate your request by registering for API keys. ![]() It was written as an IPython notebook, and if you have IPython installed, you can download the source of the notebook from the NLTK GitHub repository and run the notebook in interactive mode. This document is an overview of how to use NLTK to collect and process Twitter data.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |