SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD25350 | Volume – 3 | Issue – 5 | July - August 2019 Page 445
Expelling Information of Events from Critical
Public Space using Social Sensor Big Data
Samatha P. K, Dr. Mohamed Rafi
Department of Studies in Computer Science & Engineering, University BDT College of Engineering
(A Constuent College of VTU, Belgavi), Davangere, Karnataka, India
How to cite this paper: Samatha P. K | Dr.
Mohamed Rafi "Expelling Information of
Events from Critical Public Space using
Social Sensor Big Data" Published in
International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-5, August
2019, pp.445-448,
https://doi.org/10.31142/ijtsrd25350
Copyright © 2019 by author(s) and
International Journalof Trendin Scientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
ABSTRACT
Open foundation frameworks give a significant numberoftheadministrations
that are basic to the wellbeing, working, andsecurityof society.A considerable
lot of these frameworks, in any case, need persistent physical sensor checking
to have the option to recognize disappointment occasions or harm that has
struck these frameworks. We propose the utilization of social sensor
enormous information to recognize these occasions. We center around two
primary framework frameworks, transportation and vitality, and use
information from Twitter streams to identify harm to spans, expressways, gas
lines, and power foundation. Through a three-step filtering approach and
assignment to geographical cells, we are able to filter out noise in this data to
produce relevant geo-located tweets identifying failure events. Applying the
strategy to real-world data, we demonstrate the ability of our approach to
utilize social sensor big data to detect damage and failure events in these
critical public infrastructures.
KEYWORDS: Social Sensors, Big Data, Data Processing, Critical Infrastructure,
Event Detection
INTRODUCTION
This includes energy systems that power nearly all devices, controls, and
equipment, as well as transportation systems that enable the movement of
people and goods across both short and long distances. Failure of or damage
that has occurred to these infrastructures, whether from deterioration and
aging, or from severe loads due to hazards such as natural disasters, poses
significant risks to populations around the world.
Recognizingtheseharm ordisappointmentoccasionsisbasic
both to limit the negative effects of these occasions, e.g., by
rerouting vehicles from bombed spans, and to quicken our
capacity to recuperate from these occasions, e.g., by finding
the degree of intensity blackouts for arrangement of fix
teams. Huge numbers of these frameworks, bethatasitmay,
need ceaseless physical sensor observing to have the option
to distinguish these harm or disappointment occasions.
Scaffolds, for instance, are commonly subject to just yearly
reviews, and not many are instrumented with physical
sensors that would most likely identify harm that may
happen whenever. Furthermore, foundations that contain
checking capacities, for example, vitality frameworks, may
have broad systems of physical sensors at a concentrated
level, yet less so at the dissemination level. In this way,while
power plants are intently observed, maps of blackouts
depend on individual reports.
In this paper, we propose the utilization of social sensors to
recognize harm and disappointment occasions ofbasicopen
foundation. As of late, there has been an investigation of the
utilization of information from social sensors to distinguish
occasions for which physical sensors are inadequate. This
incorporates the utilization of Twitter information streams
to identify cataclysmic events (Sakaki et al., 2010) or the
utilization of writings to oversee crisis reaction (Caragea et
al., 2011). In this paper, we utilize the LITMUS system – a
structure intended to identify avalanches utilizing a multi-
administration creation approach (Musaev et al., 2014a,
2014b) – to recognize open framework disappointment
occasions. We center around two fundamental frameworks:
transportation (extensions and thruways) and vitality (gas
lines and power). The remainderofthepaperissorted outas
pursues. Segment 2 gives anoutlineof themethodologyused
to distinguish frameworkdisappointmentoccasionsutilizing
social sensor information.
Literature Survey
In case of emergencies (e.g., earthquakes, flooding), rapid
responses are needed in order to address victims’ requests
for help. Social media used around crises involves self-
organizing behavior that can produce accurate results
[1] Often in advance of official communications. This allows
affected population to send tweets or text messages, and
hence, make them heard. The ability to classify tweets and
text messages automatically, together with the ability to
deliver the relevant information to the appropriate
personnel are essential for enabling the personnel to timely
and efficiently work to address the most urgent needs, and
to understand the emergency situation better. In this study,
we developed a reusable information technology
infrastructure, called Enhanced Messaging for the
Emergency Response Sector (EMERSE). The components of
IJTSRD25350
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25350 | Volume – 3 | Issue – 5 | July - August 2019 Page 446
EMERSE are: (i) an iPhone application; (ii) a Twitter crawler
component; (iii) machine translation; and (iv) Automatic
message classification. While each component is important
in itself and deserves a detailed analysis, in this paper we
focused on the automatic classification component, which
classifies and aggregates tweets and textmessagesaboutthe
Haiti disaster relief so that they can be easily accessed by
non-governmental organizations, relief workers, people in
Haiti, and their friends and families.
They propose and evaluate a probabilistic frame work
[2] For estimating a Twitter user’s city-level location based
purely on the content of the user’s tweets, even in the
absence of any other geospatial cues. By augmenting the
massive human-powered sensing capabilitiesof Twitter and
related micro blogging services with content-derived
location information, this framework can overcome the
sparsity of geoenabled features in these services and enable
new location based personalized information services, the
targeting of regional advertisements, and so on. Three ofthe
key features of the proposed approach are:
(i)its reliance purely on tweet content, meaning no need for
user IP information, private login information, or external
knowledge bases; (ii) a classification component for
automatically identifying words in tweetswith astronglocal
geo-scope; and (iii) a lattice-based neighborhood smoothing
model for refining a user’s location estimate. The system
estimates k possible locations for each user in descending
order of confidence. On average we find that the location
estimates converge quickly (needing just 100s of tweets),
placing 51% of Twitter users within 100 milesof theiractual
location
People in the locality of earthquakes are publishing
anecdotal information about the shaking within seconds of
their occurrences via social network technologies, such as
Twitter. In contrast, depending on the size and location of
the earthquake, scientific alerts can take between two to
twenty minutes to publish. We describe TED (Twitter
Earthquake Detector)
[3] A system that adopts social network technologies to
augment earthquake response products and the delivery of
hazard information. The TED system analyzes data from
these social networks for multiple purposes: 1) to integrate
citizen reports of earthquakes with corresponding scientific
reports 2) to infer the public level of interest in an
earthquake for tailoring outputs disseminated via social
network technologies and 3) to explore the possibility of
rapid detection of a probable earthquake, within seconds of
its occurrence, helping tofill thegapbetween theearthquake
origin time and the presence of quantitative scientific data.
Little research exists on one of themostcommon,oldest, and
most utilized forms of online social geographic information
[4] The “location” field found inmostvirtualcommunityuser
profiles. We performed the first in-depth study of user
behavior with regard to the location field in Twitter user
profiles. We found that 34% of users did not provide real
location information,frequentlyincorporatingfakelocations
or sarcastic comments that can fool traditional geographic
information tools. When users did input their location, they
almost never specified it at a scale any more detailed than
their city. In order to determine whether or not natural user
behaviors have a real effect on the “locatability” of users, we
performed a simple machine learning experiment to
determine whether we can identify a user’s location by only
looking at what that user tweets. We found that a user’s
country and state can in fact be determined easily with
decent accuracy, indicating that users implicitly reveal
location information, with or without realizing it.
Implications for location-based services and privacy are
discussed
Micro blogging sites such as Twitter can play a vital role in
spreading information during “natural” or man-made
disasters
[5] But the volume and velocity of tweets posted during
crises today tend to be extremely high, making it hard for
disaster-affected communities and professional emergency
responders to process the information in a timely manner.
Furthermore, posts tend to vary highly in terms of their
subjects and usefulness; from messages that are entirelyoff-
topic or personal in nature, to messages containing critical
information that augments situational awareness. Finding
actionable information can accelerate disasterresponse and
alleviate both property and human losses. In this paper, we
describe automatic methods for extractinginformation from
micro blog posts. Specifically, we focus on extracting
valuable “information nuggets”, brief, self-contained
information items relevant to disaster response. Our
methods leverage machine learning methods for classifying
posts and information extraction. Our results, validated over
one large disaster-related dataset, reveal that a careful
design can yield an effective system,pavingthewayfor more
sophisticated data analysis and visualization systems
Methodology
An overview of the approach is shown in Figure 1. The
sensor data source is Twitter. For the results presented in
this paper, these are tweets pulled over the period of one
month.
We use October 2018 as our evaluation period. It is noted
that data from any other time period can be used within this
framework. To detect infrastructure damage or failure
events, all Twitter data is run through a series of filters to
obtain a subset of relevant data. This filtering is done in
three phases. First, we filter by search terms, which we have
developed for various events of interest, e.g., “bridge
collapse” to detect damage to bridge infrastructure. Second,
as social sensor data is often noisy, withitemscontainingthe
search terms but unrelated to the event of interest, data is
filtered using stop words. Using a simple exclusion rule
based on the presence of stop words, this filters out the
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25350 | Volume – 3 | Issue – 5 | July - August 2019 Page 447
irrelevant data. An example for detecting bridge collapses is
the stop word “friendship” that refers to the collapse of a
bridge or connection between two people. Third, data is
filtered based on geolocation.Althoughmostsocialnetworks
enable users to geotag their locations, e.g., when they send a
tweet, studies have shown that lessthan 0.42%oftweets use
this functionality (Cheng et al., 2010). In addition, users may
purposely input incorrect location information in their
Twitter profiles (Hecht et al., 2011). As geolocating tweets is
an important component in being able to identify specific
infrastructure damage events, including their location, the
data must be additionally filtered. In this study, the Stanford
coreNLP toolkit (Manning et al., 2014) is used along with
geocoding (Google, 2016) to geolocate the tweet. This
assigns each filtered tweet to latitude and longitude and
corresponding 2.5-minute by 2.5-minute cell as proposed in
Musaev et al., 2014, based on a grid mapped to the surface of
the Earth. Once all relevant tweets are mapped to their
respective cells, all tweets in a single cell are assessed to
identify the infrastructure damage and failure events.Inthis
paper, we focus on the results for tweets relating to damage
detection in four infrastructures: bridge, highway, gas line,
and power infrastructure.
Below diagram Refers to the use cases of admin
IMPLEMENTATION
Location of harm and disappointment occasions to open
framework is executed utilizing information mining AI
system, for example, sifting, Decision tree arrangement
procedures. Here we are actualized cooperative separating
procedure to channel on pursuit things dependent on basic
data which is available in the substance of twitter dataset.
Characterization method is utilized to arrange the
recognized sifted component into gathering which are
identified with one another dependent regarding thematter
which we are considered. At that point bunch is going to
frame the gathering of comparative components like on
client's gathering and relies upon subject gathering etc...,
The inspiration for collective separating originates from the
possibility that individuals regularlygetthebestsuggestions
from somebody with tastes like themselves. Cooperative
sifting envelops strategies for coordinating individuals with
comparative interests and making suggestions on this
premise.
Communitarian separatingcalculationsregularlyrequire(1)
clients' dynamic investment, (2) asimplemethod tospeak to
clients' interests, and (3) calculations that can match
individuals with comparative premiums.
Normally, the work process of a community sifting
framework is:
A client communicates his or her inclinations by rating
things (for example books, films or CDs) of the framework.
These appraisals can be seen asan estimatedportrayalofthe
client's enthusiasm for the relating space. The framework
coordinates this current client's evaluations against other
clients' and finds the general population with most
"comparative" tastes. With comparable clients, the
framework prescribes things that the comparative clients
have evaluated exceedingly yet not yet being appraised by
this client (apparently the nonattendance of rating is
frequently considered as the newness of a thing).
Characterization is strategy to order our information intoan
ideal and particular number of classes where we can allocate
name to each class. Here are utilized choice tree grouping
method to settle on choice on accessible information things
and characterize them as indicated by basic data. Choice
Tree is easy to comprehend and envision, requires little
information planning, and can deal with both numerical and
all out information.
Iterative Model
In the HITS method, a link is used to represent the
hyperlinks between web pages. Inour TD-HITS method,
however, a link represents an operational relationship
between a user and a post, such as publishing or
commenting. For example, given a post in an undirected
Name Input Output Remarks
Select data
file
Browsing
data file
Display data
content
Success
Error message
if entered data
is invalid.
Success
Analyze
Selected
data set
File
Display data in
Proper format
For further
processing
Success
fully show
formatted
data
Find out
properties/
attributes
Formatted
Data
Attribute list
All
attributes
list
Processing
Queries
Data
Attributes
E
Query Result E
Query
Result E
Test Case: Admin
Network setundirect edges between posts, the n posts and
their connections are interpreted Recorded to construct a
matrix, denoted as A, to maintain the links between the user
and his/her posts. Rows of A denote posts, and of A columns
denote users. As shown in Fig. , the TD-HITS method creates
direct link between users and their posts, with regard to the
corresponding individual user’s operations. In addition, in
this project, we extend the HITS algorithm to exploit the
inseparable connection between users and their
corresponding posts for the purpose of extractingonlyhigh-
quality posts and influential users.
RESULT
Result on the studies is carried outwith largenumberof data
set collected from twitter dataset. Classification is done on
the dataset with filtering resulting in different categories f
data is available on different subjects .Here some of critical
terms are considered like Bridges, Transports, Gas links like
this we are considered a dataset processed according
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD25350 | Volume – 3 | Issue – 5 | July - August 2019 Page 448
requirements and resulted in 98 percent accuracy using
machine learning technique.
Example of bridges gases and sports of datasets categorized.
Fig1: Home Screen
Fig2: Analyzing the Dataset based on Categories
Fig3: Analyzed Data based On User Categories
CONCLUSION
Detection of damage and failure events to public
infrastructure is critical to the abilityof communitiesaround
the world to minimize the risks associated with both natural
and man-made disasters and to recover more quickly and
efficiently from the negative effects of these hazards. As
many of our public infrastructure systems are notphysically
monitored to the degree necessary to provide relevant,
detailed information about thestatesof thesesystemsinreal
time, social sensor data is used to perform this assessment
and detect damage events. In this paper, we describe an
approach to use social sensor big data to identify public
infrastructure damage events. This includes a three step
filtering approach, whereby data is firstfilteredusingsearch
terms relevant to the event of interest.Next,noiseinthedata
is filtered out using an exclusion rule based on the presence
of stop words. Finally, data is filtered based on geolocation,
resulting in each relevantfiltered dataitembeingassigned to
a 2.5-minute by 2.5-minute cell in a grid mapped to the
surface of the Earth.
REFERENCES
[1] Caragea, C., McNeese, N., Jaiswal, A., Traylor, G.,Kim, H.,
Mitra, P., Wu, D., Tapia, A.H., Giles, L., Jansen, B.J.,Yen,J.,
2011. Classifying text messages for the Haiti
earthquake. In ISCRAM ’11, Lisbon, Portugal.
[2] Cheng, Z., Caverlee, J., Lee, K., 2010. You are where you
tweet: A content-based approach to geo-locating
Twitter users. In CIKM’10, Toronto, Canada. Google,
https://developers.google.com/maps/documentation/
geocoding/intro, accessed on 2/5/2016.
[3] Guy, M., Earle, P., Ostrum, C., Gruchalla, K., Horvath, S.,
2010. Integration anddisseminationofcitizen reported
and seismically derived earthquake information via
social network technologies. In IDA’10, Tuscon,
Arizona.
[4] Hecht, B., Hong, L., Suh, B., Chi, E.H., 2011. Tweets from
Justin Bieber’s heart: The dynamics of the “location”
field in user profiles. In CHI ’11, Vancouver, Canada.
[5] Imran, M., Elbassuoni, S., Castillo, C., Diaz, F., Meier, P.,
2013. Extracting information nuggets from disaster
related messages in social media. In ISCRAM ’13,
Baden-Baden, Germany.

Mais conteúdo relacionado

Mais procurados

PommierCatherine_HM598Unit6_Capstonefinal
PommierCatherine_HM598Unit6_CapstonefinalPommierCatherine_HM598Unit6_Capstonefinal
PommierCatherine_HM598Unit6_Capstonefinal
Catherine Pommier
 
14Dec_Orkins_Kiernan-2
14Dec_Orkins_Kiernan-214Dec_Orkins_Kiernan-2
14Dec_Orkins_Kiernan-2
William Orkins
 
Stanford Info Seminar: Unfollowing and Emotion on Twitter
Stanford Info Seminar: Unfollowing and Emotion on TwitterStanford Info Seminar: Unfollowing and Emotion on Twitter
Stanford Info Seminar: Unfollowing and Emotion on Twitter
mor
 
palen-crisisinformatics
palen-crisisinformaticspalen-crisisinformatics
palen-crisisinformatics
Sophia B Liu
 
Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...
Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...
Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...
Artificial Intelligence Institute at UofSC
 
Bayesian Model Fusion for Forecasting Civil Unrest
Bayesian Model Fusion for Forecasting Civil UnrestBayesian Model Fusion for Forecasting Civil Unrest
Bayesian Model Fusion for Forecasting Civil Unrest
Parang Saraf
 

Mais procurados (20)

IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
Mapping Interpersonal Risk Communication networks: Some Evidences from Twitt...
Mapping Interpersonal Risk Communication networks:  Some Evidences from Twitt...Mapping Interpersonal Risk Communication networks:  Some Evidences from Twitt...
Mapping Interpersonal Risk Communication networks: Some Evidences from Twitt...
 
PommierCatherine_HM598Unit6_Capstonefinal
PommierCatherine_HM598Unit6_CapstonefinalPommierCatherine_HM598Unit6_Capstonefinal
PommierCatherine_HM598Unit6_Capstonefinal
 
Dynamics of a Scandal: The Centrelink Robodebt Affair on Twitter
Dynamics of a Scandal: The Centrelink Robodebt Affair on TwitterDynamics of a Scandal: The Centrelink Robodebt Affair on Twitter
Dynamics of a Scandal: The Centrelink Robodebt Affair on Twitter
 
Big Data from Social Media and Crowdsourcing in Emergencies
Big Data from Social Media and Crowdsourcing in EmergenciesBig Data from Social Media and Crowdsourcing in Emergencies
Big Data from Social Media and Crowdsourcing in Emergencies
 
Who’s in the Gang? Revealing Coordinating Communities in Social Media
Who’s in the Gang? Revealing Coordinating Communities in Social MediaWho’s in the Gang? Revealing Coordinating Communities in Social Media
Who’s in the Gang? Revealing Coordinating Communities in Social Media
 
No misunderstandings during Earthquakes
No misunderstandings during EarthquakesNo misunderstandings during Earthquakes
No misunderstandings during Earthquakes
 
2014 may iaem bulletin jifx
2014 may iaem bulletin jifx2014 may iaem bulletin jifx
2014 may iaem bulletin jifx
 
"Big Data for Development: Opportunities and Challenges"
"Big Data for Development: Opportunities and Challenges" "Big Data for Development: Opportunities and Challenges"
"Big Data for Development: Opportunities and Challenges"
 
14Dec_Orkins_Kiernan-2
14Dec_Orkins_Kiernan-214Dec_Orkins_Kiernan-2
14Dec_Orkins_Kiernan-2
 
Stanford Info Seminar: Unfollowing and Emotion on Twitter
Stanford Info Seminar: Unfollowing and Emotion on TwitterStanford Info Seminar: Unfollowing and Emotion on Twitter
Stanford Info Seminar: Unfollowing and Emotion on Twitter
 
OCHA Think Brief - Hashtag Standards for emergencies
OCHA Think Brief - Hashtag Standards for emergenciesOCHA Think Brief - Hashtag Standards for emergencies
OCHA Think Brief - Hashtag Standards for emergencies
 
palen-crisisinformatics
palen-crisisinformaticspalen-crisisinformatics
palen-crisisinformatics
 
Untapped Potential: Evaluating State Emergency Management Agency Web Sites 2...
Untapped Potential: Evaluating State Emergency Management  Agency Web Sites 2...Untapped Potential: Evaluating State Emergency Management  Agency Web Sites 2...
Untapped Potential: Evaluating State Emergency Management Agency Web Sites 2...
 
Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...
Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...
Semantic Wide and Deep Learning for Detecting Crisis-Information Categories o...
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...
Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...
Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...
 
Strategic perspectives 3
Strategic perspectives 3Strategic perspectives 3
Strategic perspectives 3
 
What's up at Kno.e.sis?
What's up at Kno.e.sis? What's up at Kno.e.sis?
What's up at Kno.e.sis?
 
Bayesian Model Fusion for Forecasting Civil Unrest
Bayesian Model Fusion for Forecasting Civil UnrestBayesian Model Fusion for Forecasting Civil Unrest
Bayesian Model Fusion for Forecasting Civil Unrest
 

Semelhante a Expelling Information of Events from Critical Public Space using Social Sensor Big Data

Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
 
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
JayaramB11
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docx
turveycharlyn
 

Semelhante a Expelling Information of Events from Critical Public Space using Social Sensor Big Data (20)

IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
IRJET- Identification of Prevalent News from Twitter and Traditional Media us...
 
IJSRED-V2I3P53
IJSRED-V2I3P53IJSRED-V2I3P53
IJSRED-V2I3P53
 
Akram.pptx
Akram.pptxAkram.pptx
Akram.pptx
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Pestle based event detection and classification
Pestle based event detection and classificationPestle based event detection and classification
Pestle based event detection and classification
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
IRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source IdentificationIRJET- Fake News Detection and Rumour Source Identification
IRJET- Fake News Detection and Rumour Source Identification
 
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET-  	  An Improved Machine Learning for Twitter Breaking News Extraction ...IRJET-  	  An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
 
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile CrowdsensingPrivacy Preserving Aggregate Statistics for Mobile Crowdsensing
Privacy Preserving Aggregate Statistics for Mobile Crowdsensing
 
Meliorating usable document density for online event detection
Meliorating usable document density for online event detectionMeliorating usable document density for online event detection
Meliorating usable document density for online event detection
 
IJET-V3I1P3
IJET-V3I1P3IJET-V3I1P3
IJET-V3I1P3
 
Social Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug UsageSocial Media Datasets for Analysis and Modeling Drug Usage
Social Media Datasets for Analysis and Modeling Drug Usage
 
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
 
Enhancing prediction of user stance for social networks rumors
Enhancing prediction of user stance for social networks rumorsEnhancing prediction of user stance for social networks rumors
Enhancing prediction of user stance for social networks rumors
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docx
 
Classification of Disastrous Tweets on Twitter using BERT Model
Classification of Disastrous Tweets on Twitter using BERT ModelClassification of Disastrous Tweets on Twitter using BERT Model
Classification of Disastrous Tweets on Twitter using BERT Model
 
Big Data for Development: Opportunities and Challenges, Summary Slidedeck
Big Data for Development: Opportunities and Challenges, Summary SlidedeckBig Data for Development: Opportunities and Challenges, Summary Slidedeck
Big Data for Development: Opportunities and Challenges, Summary Slidedeck
 
Weather events identification in social media streams: tools to detect their ...
Weather events identification in social media streams: tools to detect their ...Weather events identification in social media streams: tools to detect their ...
Weather events identification in social media streams: tools to detect their ...
 
Multimodal Combination.pdf
Multimodal Combination.pdfMultimodal Combination.pdf
Multimodal Combination.pdf
 

Mais de ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
ijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
ijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
ijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
ijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
ijtsrd
 

Mais de ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Último

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 

Expelling Information of Events from Critical Public Space using Social Sensor Big Data

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD25350 | Volume – 3 | Issue – 5 | July - August 2019 Page 445 Expelling Information of Events from Critical Public Space using Social Sensor Big Data Samatha P. K, Dr. Mohamed Rafi Department of Studies in Computer Science & Engineering, University BDT College of Engineering (A Constuent College of VTU, Belgavi), Davangere, Karnataka, India How to cite this paper: Samatha P. K | Dr. Mohamed Rafi "Expelling Information of Events from Critical Public Space using Social Sensor Big Data" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-5, August 2019, pp.445-448, https://doi.org/10.31142/ijtsrd25350 Copyright © 2019 by author(s) and International Journalof Trendin Scientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) ABSTRACT Open foundation frameworks give a significant numberoftheadministrations that are basic to the wellbeing, working, andsecurityof society.A considerable lot of these frameworks, in any case, need persistent physical sensor checking to have the option to recognize disappointment occasions or harm that has struck these frameworks. We propose the utilization of social sensor enormous information to recognize these occasions. We center around two primary framework frameworks, transportation and vitality, and use information from Twitter streams to identify harm to spans, expressways, gas lines, and power foundation. Through a three-step filtering approach and assignment to geographical cells, we are able to filter out noise in this data to produce relevant geo-located tweets identifying failure events. Applying the strategy to real-world data, we demonstrate the ability of our approach to utilize social sensor big data to detect damage and failure events in these critical public infrastructures. KEYWORDS: Social Sensors, Big Data, Data Processing, Critical Infrastructure, Event Detection INTRODUCTION This includes energy systems that power nearly all devices, controls, and equipment, as well as transportation systems that enable the movement of people and goods across both short and long distances. Failure of or damage that has occurred to these infrastructures, whether from deterioration and aging, or from severe loads due to hazards such as natural disasters, poses significant risks to populations around the world. Recognizingtheseharm ordisappointmentoccasionsisbasic both to limit the negative effects of these occasions, e.g., by rerouting vehicles from bombed spans, and to quicken our capacity to recuperate from these occasions, e.g., by finding the degree of intensity blackouts for arrangement of fix teams. Huge numbers of these frameworks, bethatasitmay, need ceaseless physical sensor observing to have the option to distinguish these harm or disappointment occasions. Scaffolds, for instance, are commonly subject to just yearly reviews, and not many are instrumented with physical sensors that would most likely identify harm that may happen whenever. Furthermore, foundations that contain checking capacities, for example, vitality frameworks, may have broad systems of physical sensors at a concentrated level, yet less so at the dissemination level. In this way,while power plants are intently observed, maps of blackouts depend on individual reports. In this paper, we propose the utilization of social sensors to recognize harm and disappointment occasions ofbasicopen foundation. As of late, there has been an investigation of the utilization of information from social sensors to distinguish occasions for which physical sensors are inadequate. This incorporates the utilization of Twitter information streams to identify cataclysmic events (Sakaki et al., 2010) or the utilization of writings to oversee crisis reaction (Caragea et al., 2011). In this paper, we utilize the LITMUS system – a structure intended to identify avalanches utilizing a multi- administration creation approach (Musaev et al., 2014a, 2014b) – to recognize open framework disappointment occasions. We center around two fundamental frameworks: transportation (extensions and thruways) and vitality (gas lines and power). The remainderofthepaperissorted outas pursues. Segment 2 gives anoutlineof themethodologyused to distinguish frameworkdisappointmentoccasionsutilizing social sensor information. Literature Survey In case of emergencies (e.g., earthquakes, flooding), rapid responses are needed in order to address victims’ requests for help. Social media used around crises involves self- organizing behavior that can produce accurate results [1] Often in advance of official communications. This allows affected population to send tweets or text messages, and hence, make them heard. The ability to classify tweets and text messages automatically, together with the ability to deliver the relevant information to the appropriate personnel are essential for enabling the personnel to timely and efficiently work to address the most urgent needs, and to understand the emergency situation better. In this study, we developed a reusable information technology infrastructure, called Enhanced Messaging for the Emergency Response Sector (EMERSE). The components of IJTSRD25350
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25350 | Volume – 3 | Issue – 5 | July - August 2019 Page 446 EMERSE are: (i) an iPhone application; (ii) a Twitter crawler component; (iii) machine translation; and (iv) Automatic message classification. While each component is important in itself and deserves a detailed analysis, in this paper we focused on the automatic classification component, which classifies and aggregates tweets and textmessagesaboutthe Haiti disaster relief so that they can be easily accessed by non-governmental organizations, relief workers, people in Haiti, and their friends and families. They propose and evaluate a probabilistic frame work [2] For estimating a Twitter user’s city-level location based purely on the content of the user’s tweets, even in the absence of any other geospatial cues. By augmenting the massive human-powered sensing capabilitiesof Twitter and related micro blogging services with content-derived location information, this framework can overcome the sparsity of geoenabled features in these services and enable new location based personalized information services, the targeting of regional advertisements, and so on. Three ofthe key features of the proposed approach are: (i)its reliance purely on tweet content, meaning no need for user IP information, private login information, or external knowledge bases; (ii) a classification component for automatically identifying words in tweetswith astronglocal geo-scope; and (iii) a lattice-based neighborhood smoothing model for refining a user’s location estimate. The system estimates k possible locations for each user in descending order of confidence. On average we find that the location estimates converge quickly (needing just 100s of tweets), placing 51% of Twitter users within 100 milesof theiractual location People in the locality of earthquakes are publishing anecdotal information about the shaking within seconds of their occurrences via social network technologies, such as Twitter. In contrast, depending on the size and location of the earthquake, scientific alerts can take between two to twenty minutes to publish. We describe TED (Twitter Earthquake Detector) [3] A system that adopts social network technologies to augment earthquake response products and the delivery of hazard information. The TED system analyzes data from these social networks for multiple purposes: 1) to integrate citizen reports of earthquakes with corresponding scientific reports 2) to infer the public level of interest in an earthquake for tailoring outputs disseminated via social network technologies and 3) to explore the possibility of rapid detection of a probable earthquake, within seconds of its occurrence, helping tofill thegapbetween theearthquake origin time and the presence of quantitative scientific data. Little research exists on one of themostcommon,oldest, and most utilized forms of online social geographic information [4] The “location” field found inmostvirtualcommunityuser profiles. We performed the first in-depth study of user behavior with regard to the location field in Twitter user profiles. We found that 34% of users did not provide real location information,frequentlyincorporatingfakelocations or sarcastic comments that can fool traditional geographic information tools. When users did input their location, they almost never specified it at a scale any more detailed than their city. In order to determine whether or not natural user behaviors have a real effect on the “locatability” of users, we performed a simple machine learning experiment to determine whether we can identify a user’s location by only looking at what that user tweets. We found that a user’s country and state can in fact be determined easily with decent accuracy, indicating that users implicitly reveal location information, with or without realizing it. Implications for location-based services and privacy are discussed Micro blogging sites such as Twitter can play a vital role in spreading information during “natural” or man-made disasters [5] But the volume and velocity of tweets posted during crises today tend to be extremely high, making it hard for disaster-affected communities and professional emergency responders to process the information in a timely manner. Furthermore, posts tend to vary highly in terms of their subjects and usefulness; from messages that are entirelyoff- topic or personal in nature, to messages containing critical information that augments situational awareness. Finding actionable information can accelerate disasterresponse and alleviate both property and human losses. In this paper, we describe automatic methods for extractinginformation from micro blog posts. Specifically, we focus on extracting valuable “information nuggets”, brief, self-contained information items relevant to disaster response. Our methods leverage machine learning methods for classifying posts and information extraction. Our results, validated over one large disaster-related dataset, reveal that a careful design can yield an effective system,pavingthewayfor more sophisticated data analysis and visualization systems Methodology An overview of the approach is shown in Figure 1. The sensor data source is Twitter. For the results presented in this paper, these are tweets pulled over the period of one month. We use October 2018 as our evaluation period. It is noted that data from any other time period can be used within this framework. To detect infrastructure damage or failure events, all Twitter data is run through a series of filters to obtain a subset of relevant data. This filtering is done in three phases. First, we filter by search terms, which we have developed for various events of interest, e.g., “bridge collapse” to detect damage to bridge infrastructure. Second, as social sensor data is often noisy, withitemscontainingthe search terms but unrelated to the event of interest, data is filtered using stop words. Using a simple exclusion rule based on the presence of stop words, this filters out the
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25350 | Volume – 3 | Issue – 5 | July - August 2019 Page 447 irrelevant data. An example for detecting bridge collapses is the stop word “friendship” that refers to the collapse of a bridge or connection between two people. Third, data is filtered based on geolocation.Althoughmostsocialnetworks enable users to geotag their locations, e.g., when they send a tweet, studies have shown that lessthan 0.42%oftweets use this functionality (Cheng et al., 2010). In addition, users may purposely input incorrect location information in their Twitter profiles (Hecht et al., 2011). As geolocating tweets is an important component in being able to identify specific infrastructure damage events, including their location, the data must be additionally filtered. In this study, the Stanford coreNLP toolkit (Manning et al., 2014) is used along with geocoding (Google, 2016) to geolocate the tweet. This assigns each filtered tweet to latitude and longitude and corresponding 2.5-minute by 2.5-minute cell as proposed in Musaev et al., 2014, based on a grid mapped to the surface of the Earth. Once all relevant tweets are mapped to their respective cells, all tweets in a single cell are assessed to identify the infrastructure damage and failure events.Inthis paper, we focus on the results for tweets relating to damage detection in four infrastructures: bridge, highway, gas line, and power infrastructure. Below diagram Refers to the use cases of admin IMPLEMENTATION Location of harm and disappointment occasions to open framework is executed utilizing information mining AI system, for example, sifting, Decision tree arrangement procedures. Here we are actualized cooperative separating procedure to channel on pursuit things dependent on basic data which is available in the substance of twitter dataset. Characterization method is utilized to arrange the recognized sifted component into gathering which are identified with one another dependent regarding thematter which we are considered. At that point bunch is going to frame the gathering of comparative components like on client's gathering and relies upon subject gathering etc..., The inspiration for collective separating originates from the possibility that individuals regularlygetthebestsuggestions from somebody with tastes like themselves. Cooperative sifting envelops strategies for coordinating individuals with comparative interests and making suggestions on this premise. Communitarian separatingcalculationsregularlyrequire(1) clients' dynamic investment, (2) asimplemethod tospeak to clients' interests, and (3) calculations that can match individuals with comparative premiums. Normally, the work process of a community sifting framework is: A client communicates his or her inclinations by rating things (for example books, films or CDs) of the framework. These appraisals can be seen asan estimatedportrayalofthe client's enthusiasm for the relating space. The framework coordinates this current client's evaluations against other clients' and finds the general population with most "comparative" tastes. With comparable clients, the framework prescribes things that the comparative clients have evaluated exceedingly yet not yet being appraised by this client (apparently the nonattendance of rating is frequently considered as the newness of a thing). Characterization is strategy to order our information intoan ideal and particular number of classes where we can allocate name to each class. Here are utilized choice tree grouping method to settle on choice on accessible information things and characterize them as indicated by basic data. Choice Tree is easy to comprehend and envision, requires little information planning, and can deal with both numerical and all out information. Iterative Model In the HITS method, a link is used to represent the hyperlinks between web pages. Inour TD-HITS method, however, a link represents an operational relationship between a user and a post, such as publishing or commenting. For example, given a post in an undirected Name Input Output Remarks Select data file Browsing data file Display data content Success Error message if entered data is invalid. Success Analyze Selected data set File Display data in Proper format For further processing Success fully show formatted data Find out properties/ attributes Formatted Data Attribute list All attributes list Processing Queries Data Attributes E Query Result E Query Result E Test Case: Admin Network setundirect edges between posts, the n posts and their connections are interpreted Recorded to construct a matrix, denoted as A, to maintain the links between the user and his/her posts. Rows of A denote posts, and of A columns denote users. As shown in Fig. , the TD-HITS method creates direct link between users and their posts, with regard to the corresponding individual user’s operations. In addition, in this project, we extend the HITS algorithm to exploit the inseparable connection between users and their corresponding posts for the purpose of extractingonlyhigh- quality posts and influential users. RESULT Result on the studies is carried outwith largenumberof data set collected from twitter dataset. Classification is done on the dataset with filtering resulting in different categories f data is available on different subjects .Here some of critical terms are considered like Bridges, Transports, Gas links like this we are considered a dataset processed according
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD25350 | Volume – 3 | Issue – 5 | July - August 2019 Page 448 requirements and resulted in 98 percent accuracy using machine learning technique. Example of bridges gases and sports of datasets categorized. Fig1: Home Screen Fig2: Analyzing the Dataset based on Categories Fig3: Analyzed Data based On User Categories CONCLUSION Detection of damage and failure events to public infrastructure is critical to the abilityof communitiesaround the world to minimize the risks associated with both natural and man-made disasters and to recover more quickly and efficiently from the negative effects of these hazards. As many of our public infrastructure systems are notphysically monitored to the degree necessary to provide relevant, detailed information about thestatesof thesesystemsinreal time, social sensor data is used to perform this assessment and detect damage events. In this paper, we describe an approach to use social sensor big data to identify public infrastructure damage events. This includes a three step filtering approach, whereby data is firstfilteredusingsearch terms relevant to the event of interest.Next,noiseinthedata is filtered out using an exclusion rule based on the presence of stop words. Finally, data is filtered based on geolocation, resulting in each relevantfiltered dataitembeingassigned to a 2.5-minute by 2.5-minute cell in a grid mapped to the surface of the Earth. REFERENCES [1] Caragea, C., McNeese, N., Jaiswal, A., Traylor, G.,Kim, H., Mitra, P., Wu, D., Tapia, A.H., Giles, L., Jansen, B.J.,Yen,J., 2011. Classifying text messages for the Haiti earthquake. In ISCRAM ’11, Lisbon, Portugal. [2] Cheng, Z., Caverlee, J., Lee, K., 2010. You are where you tweet: A content-based approach to geo-locating Twitter users. In CIKM’10, Toronto, Canada. Google, https://developers.google.com/maps/documentation/ geocoding/intro, accessed on 2/5/2016. [3] Guy, M., Earle, P., Ostrum, C., Gruchalla, K., Horvath, S., 2010. Integration anddisseminationofcitizen reported and seismically derived earthquake information via social network technologies. In IDA’10, Tuscon, Arizona. [4] Hecht, B., Hong, L., Suh, B., Chi, E.H., 2011. Tweets from Justin Bieber’s heart: The dynamics of the “location” field in user profiles. In CHI ’11, Vancouver, Canada. [5] Imran, M., Elbassuoni, S., Castillo, C., Diaz, F., Meier, P., 2013. Extracting information nuggets from disaster related messages in social media. In ISCRAM ’13, Baden-Baden, Germany.