SlideShare uma empresa Scribd logo
1 de 16
Detection and Extracting of Emergency
          Knowledge from Twitter Streams

         Bernhard Klein, Xabier Laiseca, Diego Casado-
        Mansilla, Diego Lopez-de-Ipiña and Alejandro Prada
                             Nespral
6th International Conference on Ubiquitous Computing and Ambient Intelligence
     Session 10: Key application domains: eEmergency, eLearning, eTraining
                               5. December, 2012



                                           Social
                                           Awareness
                                           Based
                                           Emergency
                                           Situation
                                           Solver

     UCAmI 2012                     B. Klein                      1/17
Outline


1. Problem Description
2. Research Field
3. Architecture of Analysis Tool
4. Semantic Social Network Analysis
5. Recent Advances
6. Conclusions




  UCAmI 2012             B. Klein     2/17
Objective


   Trends Detection  Event Knowledge Extraction
     ≠ Counting of Keywords
      Aggregation + Interpretation of post content!


   Problems:
        Big data
        Noisy + short posts
        Real-time support




     UCAmI 2012                B. Klein                3/17
Twitter Examples

► Good    examples:

► Bad   examples:




► Crawling     reality:




  UCAmI 2012              B. Klein   4/17
Research Field
                                           • SensePlace2
     • Hacer and Muraki, 2011              • TweetTracker
     • Sudha et al., 2011                  • Twitcident
                                            Emergency
         Corpus Analysis                    Support
                                            Tools



                           Microblogging



   SNA-Techniques                          Clustering-Techniques
• Mendozza et al., 2010
                                           • Becker et al, 2011
                                           • Marcus et al, 2011
                        NLP-Techniques     • Pohl et al, 2012
                    • Sudha et al, 2011
                    • Abel et al, 2011

       UCAmI 2012                            B. Klein              5/17
SABESS Web system




 UCAmI 2012    B. Klein   6/17
Opensource Implementation
              • Emergency message filter based on emergency taxonomy
              • Language filter e.g. english or spanish
              • Slang reduction (punctation + letter repititions)




 UCAmI 2012                B. Klein                       7/17
Social Network Analysis

► Objective:   Filtering after tweet credibility




  UCAmI 2012                B. Klein               8/17
Observed Problems

   “Slow” Graph Calculations
     Replace   betweeness centrality with user data
       a) followers count ~ influence
       b) friend count ~ knowledge access
       c) number of posts ~ experience


   “Sparse” Social Network
     Replace  SNA with Sentiment Analysis:
       Punctation-, letter- and word repititions
        Tweet credibility < Informative tweet!
          (see also Sudha et al., 2011)



    UCAmI 2012                            B. Klein     9/17
Natural language procesing

► Objective:   Content enrichment




                        • Big Improvement with “slang reduction” !!

  UCAmI 2012              B. Klein                         10/17
Other Knowledge Sources

   Hierarchical Knowledge Structure
    1. Textual location
       a) Named Entity Location
       b) Regular Expression e.g. address
          (Requires reverse coding!)
    2. Tweet metadata
       a) GPS tagged tweets
       b) Place tagged tweets
          (Author location can be different!)
    3. User profile data
       a) Home location                    Increasing reliability!



    UCAmI 2012                   B. Klein                  11/17
Recent Advances: Event Detection

► Objective:     Group tweets into emergency events

   How to describe an emergency event?
       Emergency type, location (range), time (progress),
        person/organization data, text descriptions, number of
        tweets
       Global reporting standard “Common Alert Protocol”.

   Example:




    UCAmI 2012                 B. Klein               12/17
Recent Advances: Clustering

► Incremental         DBSCAN

                            SANDY HURRICANE RELIEF VOLUNTEER EFFORTS
                            SANDY HURRICANE VICTIMS VOLUNTEER
                            SANDY HURRICANE VICTIMS VOLUNTEER EFFORT GRASSROOTS
                            SANDY HURRICANE VICTIMS VOLUNTEER NEWS EFFORT GRASSROOTS
Sandy, 180                  SANDY HURRICANE VICTIMS POLICE
Fukuschima, 170             SANDY HURRICANE VICTIMS RELIEF
….                          SANDY HURRICANE VICTIMS             Locations:
Ambulance, 80               SANDY HURRICANE VICTIMS RELIEF DISASTER PrincetonHall
                                                                e.g.
…..                         SANDY HURRICANE RELIEF
                            SANDY HURRICANE RELIEF
                            SANDY HURRICANE RELIEF DISASTER
                            SANDY VOLUNTEER

Online
                                                                        Conversations:
Dictionary                                                              ConversationID=83
                  Hashtags:
                  #TylerPerryFire
                                           Attachments:
                                           http://t.co/kqF7Xy8t




    UCAmI 2012                             B. Klein                                13/17
Common Alert Protocol

  Whenever clusters become modified,
  generate new alert message??
                                            Alert



                                CAP
                                Info
                                            Place




                                            Urls,
                                            Figs
      Cluster of tweets


 UCAmI 2012                      B. Klein           14/17
Conclusions

   Real-time analysis of noisy tweets
    ► Big data problem, 2 phase analysis
        Emergency message filtering
        Slang and language filtering
    ► Semantic Social Network Analysis
        POS/Noun tags, NER/Location tags
        Community centrality/follower count tags
    ► Tweet clustering
        Group tweets after hashtags, attachments and
         conversations
        Group tweets after emergency specific keywords
    ► Common Alert Protocol

    UCAmI 2012              B. Klein              15/17
Contact:       Bernhard Klein,
                     Email: bernhard.klein@deusto.es
                     Deusto Intitute of Technology,
                     University of Deusto,
 th International Conference on Ubiquitous Computing and Ambient Intelligence
6
                     Avda. Universidades, 24 | 48007 Bilbao |
       Session 10: Key application domains: eEmergency, eLearning, eTraining
                     Spain        5. December, 2012




     UCAmI 2012                    B. Klein                    16/17

Mais conteúdo relacionado

Semelhante a UCAmI 2012 - Detection and Extracting of Emergency Knowledge from Twitter Streams

From Research to Applications: What Can We Extract with Social Media Sensing?
From Research to Applications: What Can We Extract with Social Media Sensing?From Research to Applications: What Can We Extract with Social Media Sensing?
From Research to Applications: What Can We Extract with Social Media Sensing?Yiannis Kompatsiaris
 
Identifying and Responding to Emerging Technologies
Identifying and Responding to Emerging TechnologiesIdentifying and Responding to Emerging Technologies
Identifying and Responding to Emerging Technologieslisbk
 
A Virtuous Cycle of Semantics and Participation
A Virtuous Cycle of Semantics and ParticipationA Virtuous Cycle of Semantics and Participation
A Virtuous Cycle of Semantics and ParticipationDavide Eynard
 
"AI" for Blockchain Security (Case Study: Cosmos)
"AI" for Blockchain Security (Case Study: Cosmos)"AI" for Blockchain Security (Case Study: Cosmos)
"AI" for Blockchain Security (Case Study: Cosmos)npinto
 
Open Science Data Cloud - CCA 11
Open Science Data Cloud - CCA 11Open Science Data Cloud - CCA 11
Open Science Data Cloud - CCA 11Robert Grossman
 
Module 1 - Data Around Us .pptx
Module 1 - Data Around Us .pptxModule 1 - Data Around Us .pptx
Module 1 - Data Around Us .pptxesta2310819
 
Evolution of Open at University of Michigan
Evolution of Open at University of MichiganEvolution of Open at University of Michigan
Evolution of Open at University of MichiganKathleen Ludewig Omollo
 
NYAI #27: Cognitive Architecture & Natural Language Processing w/ Dr. Catheri...
NYAI #27: Cognitive Architecture & Natural Language Processing w/ Dr. Catheri...NYAI #27: Cognitive Architecture & Natural Language Processing w/ Dr. Catheri...
NYAI #27: Cognitive Architecture & Natural Language Processing w/ Dr. Catheri...Maryam Farooq
 
CSCW in Times of Social Media
CSCW in Times of Social MediaCSCW in Times of Social Media
CSCW in Times of Social MediaHendrik Drachsler
 
Shaping future research environments: digital challenges and opportunities
Shaping future research environments: digital challenges and opportunitiesShaping future research environments: digital challenges and opportunities
Shaping future research environments: digital challenges and opportunitiesJisc
 
Everbridge Webinar - Ten Years After 9/11
Everbridge Webinar - Ten Years After 9/11Everbridge Webinar - Ten Years After 9/11
Everbridge Webinar - Ten Years After 9/11Everbridge, Inc.
 
May 2009
May 2009May 2009
May 2009linioti
 
Content Architecture for Rapid Knowledge Reuse-congility2011
Content Architecture for Rapid Knowledge Reuse-congility2011Content Architecture for Rapid Knowledge Reuse-congility2011
Content Architecture for Rapid Knowledge Reuse-congility2011Don Day
 
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...sam lessin
 
Future of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningFuture of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningMelanie Swan
 
Engl313 ada project4_slidedoc2
Engl313 ada project4_slidedoc2Engl313 ada project4_slidedoc2
Engl313 ada project4_slidedoc2ScottDorsch
 
ACS Summer Institute - Emerging Roles of Librarians - 14_0731
ACS Summer Institute - Emerging Roles of Librarians - 14_0731ACS Summer Institute - Emerging Roles of Librarians - 14_0731
ACS Summer Institute - Emerging Roles of Librarians - 14_0731jeffreylancaster
 
Credibility and Relevance of User-Generated Content on Crisis Events
Credibility and Relevance of User-Generated Content on Crisis EventsCredibility and Relevance of User-Generated Content on Crisis Events
Credibility and Relevance of User-Generated Content on Crisis Eventsfoostermann
 
Planning and Managing Digital Library & Archive Projects
Planning and Managing Digital Library & Archive ProjectsPlanning and Managing Digital Library & Archive Projects
Planning and Managing Digital Library & Archive Projectsac2182
 

Semelhante a UCAmI 2012 - Detection and Extracting of Emergency Knowledge from Twitter Streams (20)

From Research to Applications: What Can We Extract with Social Media Sensing?
From Research to Applications: What Can We Extract with Social Media Sensing?From Research to Applications: What Can We Extract with Social Media Sensing?
From Research to Applications: What Can We Extract with Social Media Sensing?
 
Identifying and Responding to Emerging Technologies
Identifying and Responding to Emerging TechnologiesIdentifying and Responding to Emerging Technologies
Identifying and Responding to Emerging Technologies
 
A Virtuous Cycle of Semantics and Participation
A Virtuous Cycle of Semantics and ParticipationA Virtuous Cycle of Semantics and Participation
A Virtuous Cycle of Semantics and Participation
 
"AI" for Blockchain Security (Case Study: Cosmos)
"AI" for Blockchain Security (Case Study: Cosmos)"AI" for Blockchain Security (Case Study: Cosmos)
"AI" for Blockchain Security (Case Study: Cosmos)
 
Open Science Data Cloud - CCA 11
Open Science Data Cloud - CCA 11Open Science Data Cloud - CCA 11
Open Science Data Cloud - CCA 11
 
Module 1 - Data Around Us .pptx
Module 1 - Data Around Us .pptxModule 1 - Data Around Us .pptx
Module 1 - Data Around Us .pptx
 
Evolution of Open at University of Michigan
Evolution of Open at University of MichiganEvolution of Open at University of Michigan
Evolution of Open at University of Michigan
 
NYAI #27: Cognitive Architecture & Natural Language Processing w/ Dr. Catheri...
NYAI #27: Cognitive Architecture & Natural Language Processing w/ Dr. Catheri...NYAI #27: Cognitive Architecture & Natural Language Processing w/ Dr. Catheri...
NYAI #27: Cognitive Architecture & Natural Language Processing w/ Dr. Catheri...
 
CSCW in Times of Social Media
CSCW in Times of Social MediaCSCW in Times of Social Media
CSCW in Times of Social Media
 
Shaping future research environments: digital challenges and opportunities
Shaping future research environments: digital challenges and opportunitiesShaping future research environments: digital challenges and opportunities
Shaping future research environments: digital challenges and opportunities
 
Everbridge Webinar - Ten Years After 9/11
Everbridge Webinar - Ten Years After 9/11Everbridge Webinar - Ten Years After 9/11
Everbridge Webinar - Ten Years After 9/11
 
May 2009
May 2009May 2009
May 2009
 
Content Architecture for Rapid Knowledge Reuse-congility2011
Content Architecture for Rapid Knowledge Reuse-congility2011Content Architecture for Rapid Knowledge Reuse-congility2011
Content Architecture for Rapid Knowledge Reuse-congility2011
 
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
ACM ICPC Regional Finals Talk re: drop.io, privacy, entrepreneurship by sam l...
 
Future of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep LearningFuture of AI: Blockchain and Deep Learning
Future of AI: Blockchain and Deep Learning
 
Engl313 ada project4_slidedoc2
Engl313 ada project4_slidedoc2Engl313 ada project4_slidedoc2
Engl313 ada project4_slidedoc2
 
The Commons
The CommonsThe Commons
The Commons
 
ACS Summer Institute - Emerging Roles of Librarians - 14_0731
ACS Summer Institute - Emerging Roles of Librarians - 14_0731ACS Summer Institute - Emerging Roles of Librarians - 14_0731
ACS Summer Institute - Emerging Roles of Librarians - 14_0731
 
Credibility and Relevance of User-Generated Content on Crisis Events
Credibility and Relevance of User-Generated Content on Crisis EventsCredibility and Relevance of User-Generated Content on Crisis Events
Credibility and Relevance of User-Generated Content on Crisis Events
 
Planning and Managing Digital Library & Archive Projects
Planning and Managing Digital Library & Archive ProjectsPlanning and Managing Digital Library & Archive Projects
Planning and Managing Digital Library & Archive Projects
 

Último

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 

Último (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 

UCAmI 2012 - Detection and Extracting of Emergency Knowledge from Twitter Streams

  • 1. Detection and Extracting of Emergency Knowledge from Twitter Streams Bernhard Klein, Xabier Laiseca, Diego Casado- Mansilla, Diego Lopez-de-Ipiña and Alejandro Prada Nespral 6th International Conference on Ubiquitous Computing and Ambient Intelligence Session 10: Key application domains: eEmergency, eLearning, eTraining 5. December, 2012 Social Awareness Based Emergency Situation Solver UCAmI 2012 B. Klein 1/17
  • 2. Outline 1. Problem Description 2. Research Field 3. Architecture of Analysis Tool 4. Semantic Social Network Analysis 5. Recent Advances 6. Conclusions UCAmI 2012 B. Klein 2/17
  • 3. Objective  Trends Detection  Event Knowledge Extraction ≠ Counting of Keywords  Aggregation + Interpretation of post content!  Problems:  Big data  Noisy + short posts  Real-time support UCAmI 2012 B. Klein 3/17
  • 4. Twitter Examples ► Good examples: ► Bad examples: ► Crawling reality: UCAmI 2012 B. Klein 4/17
  • 5. Research Field • SensePlace2 • Hacer and Muraki, 2011 • TweetTracker • Sudha et al., 2011 • Twitcident Emergency Corpus Analysis Support Tools Microblogging SNA-Techniques Clustering-Techniques • Mendozza et al., 2010 • Becker et al, 2011 • Marcus et al, 2011 NLP-Techniques • Pohl et al, 2012 • Sudha et al, 2011 • Abel et al, 2011 UCAmI 2012 B. Klein 5/17
  • 6. SABESS Web system UCAmI 2012 B. Klein 6/17
  • 7. Opensource Implementation • Emergency message filter based on emergency taxonomy • Language filter e.g. english or spanish • Slang reduction (punctation + letter repititions) UCAmI 2012 B. Klein 7/17
  • 8. Social Network Analysis ► Objective: Filtering after tweet credibility UCAmI 2012 B. Klein 8/17
  • 9. Observed Problems  “Slow” Graph Calculations  Replace betweeness centrality with user data a) followers count ~ influence b) friend count ~ knowledge access c) number of posts ~ experience  “Sparse” Social Network  Replace SNA with Sentiment Analysis: Punctation-, letter- and word repititions Tweet credibility < Informative tweet! (see also Sudha et al., 2011) UCAmI 2012 B. Klein 9/17
  • 10. Natural language procesing ► Objective: Content enrichment • Big Improvement with “slang reduction” !! UCAmI 2012 B. Klein 10/17
  • 11. Other Knowledge Sources  Hierarchical Knowledge Structure 1. Textual location a) Named Entity Location b) Regular Expression e.g. address (Requires reverse coding!) 2. Tweet metadata a) GPS tagged tweets b) Place tagged tweets (Author location can be different!) 3. User profile data a) Home location Increasing reliability! UCAmI 2012 B. Klein 11/17
  • 12. Recent Advances: Event Detection ► Objective: Group tweets into emergency events  How to describe an emergency event?  Emergency type, location (range), time (progress), person/organization data, text descriptions, number of tweets  Global reporting standard “Common Alert Protocol”.  Example: UCAmI 2012 B. Klein 12/17
  • 13. Recent Advances: Clustering ► Incremental DBSCAN SANDY HURRICANE RELIEF VOLUNTEER EFFORTS SANDY HURRICANE VICTIMS VOLUNTEER SANDY HURRICANE VICTIMS VOLUNTEER EFFORT GRASSROOTS SANDY HURRICANE VICTIMS VOLUNTEER NEWS EFFORT GRASSROOTS Sandy, 180 SANDY HURRICANE VICTIMS POLICE Fukuschima, 170 SANDY HURRICANE VICTIMS RELIEF …. SANDY HURRICANE VICTIMS Locations: Ambulance, 80 SANDY HURRICANE VICTIMS RELIEF DISASTER PrincetonHall e.g. ….. SANDY HURRICANE RELIEF SANDY HURRICANE RELIEF SANDY HURRICANE RELIEF DISASTER SANDY VOLUNTEER Online Conversations: Dictionary ConversationID=83 Hashtags: #TylerPerryFire Attachments: http://t.co/kqF7Xy8t UCAmI 2012 B. Klein 13/17
  • 14. Common Alert Protocol Whenever clusters become modified, generate new alert message?? Alert CAP Info Place Urls, Figs Cluster of tweets UCAmI 2012 B. Klein 14/17
  • 15. Conclusions  Real-time analysis of noisy tweets ► Big data problem, 2 phase analysis  Emergency message filtering  Slang and language filtering ► Semantic Social Network Analysis  POS/Noun tags, NER/Location tags  Community centrality/follower count tags ► Tweet clustering  Group tweets after hashtags, attachments and conversations  Group tweets after emergency specific keywords ► Common Alert Protocol UCAmI 2012 B. Klein 15/17
  • 16. Contact: Bernhard Klein, Email: bernhard.klein@deusto.es Deusto Intitute of Technology, University of Deusto, th International Conference on Ubiquitous Computing and Ambient Intelligence 6 Avda. Universidades, 24 | 48007 Bilbao | Session 10: Key application domains: eEmergency, eLearning, eTraining Spain 5. December, 2012 UCAmI 2012 B. Klein 16/17