Skip to main content

Incorporating Content Beyond Text: A High Reliable Twitter-Based Disaster Information System

  • Conference paper
  • First Online:
Computational Data and Social Networks (CSoNet 2019)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11917))

Included in the following conference series:

Abstract

Social media is a valuable information source with high-volume and real-time data. It has been used in a great number of event detection applications, especially in disaster information system. However, most of the systems only extract textual content. In this paper, we present an infrastructure pipeline of disaster information system using Twitter data. Landslide is used as an example for the demonstration purpose. To further improve the quality of the detected events, the pipeline integrates both textual and imagery content from tweets in hope to fully utilize the information. The text classifier is built to remove noises, which can achieve 0.92 F1-score in classifying individual messages. The image classifier is constructed by fine-tuning pretrained VGG-F network, which can achieve 90% accuracy. The image classifier serves as a verifier in the pipeline to reject or confirm the detected events. The evaluation indicates that this verifier can significantly reduce false positive events.

Supported by the Foundation of Guizhou Provincial Key Laboratory of Public Big Data (No. 2018BDKFJJ002).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Musaev, A., Hou, Q.: Gathering high quality information on landslides from twitter by relevance ranking of users and tweets. In: 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC) (2016). https://doi.org/10.1109/cic.2016.045

  2. Culnan, M., McHugh, P., Zubillaga, Jesus.: How Large U.S. Companies Can Use Twitter and Other Social Media to Gain Business Value. MIS Quarterly Executive (2010)

    Google Scholar 

  3. Signorini, A., Segre, A.M., Polgreen, P.M.: The use of Twitter to track levels of disease activity and public concern in the U.S. during the Influenza A H1N1 pandemic. PLoS ONE 6, e19467 (2011)

    Article  Google Scholar 

  4. Yates, D., Paquette, S.: Emergency knowledge management and social media technologies: a case study of the 2010 Haitian earthquake. Int. J. Inf. Manage. 31(1), 6–13 (2011)

    Article  Google Scholar 

  5. Gao, H., Barbier, G., Goolsby, R.: Harnessing the crowdsourcing power of social media for disaster relief. IEEE Intell. Syst. 26(3), 10–14 (2011)

    Article  Google Scholar 

  6. Yin, J., Karimi, S., Lampert, A., Cameron, M., Robinson, B., Power, R.: Using social media to enhance emergency situation awareness: extended abstract. In: Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)

    Google Scholar 

  7. Becker, H., Naaman, M., Gravano, L.: Beyond trending topics: real-world event identification on Twitter. In: Proceedings of the Fifth International Conference on Weblogs and Social Media (2011)

    Google Scholar 

  8. Fung, G., Yu, X., Yu, P., Lu, H.: Parameter free bursty events detection in text streams. In: Proceedings of the 31st International Conference on Very Large Data Bases (2005)

    Google Scholar 

  9. Karimi, S., Yin, J., Paris, C.: Classifying microblogs for disasters. In: Proceedings of the 2013 Australasian Document Computing Symposium (2013)

    Google Scholar 

  10. Li, R., Lei, K.H., Khadiwala, R., Change, K.: TEDAS: a Twitter-based event detection and analysis system. In: Proceedings of the IEEE 28th International Conference on Data Engineering (2012)

    Google Scholar 

  11. Yin, J.: Clustering microtext streams for event identification. In: Proceedings of the 6th International Joint Conference on Natural Language Processing (2013)

    Google Scholar 

  12. Kokalitcheva, K.: A Year after Tweets Doubled in Size, Brevity Still Rules (2018). https://www.axios.com

  13. Lee, K.: What Analyzing 1 Million Tweets Taught Us (2015). https://thenextweb.com

  14. Simonyan, K., Zisserman, A.: Very Deep Convolutional Networks for Large-Scale Image Recognition. eprint arXiv:1409.1556 (2014)

  15. Donahue, J., et al.: DeCAF: A Deep Convolutional Activation Feature for Generic Visual Recognition. eprint arXiv:1310.1531 (2013)

  16. Chatfield, K., Simonyan, K., Vedaldi, A., Zisserman, A.: Return of the devil in the details: delving deep into convolutional nets. In: British Machine Vision Conference (2014)

    Google Scholar 

  17. Krizhevsky, A., Sutskever, I., Hinton, G.: ImageNet classification with deep convolutional neural networks. In: Advances in Neural Information Processing Systems (2012)

    Google Scholar 

  18. He, J.S., Han, M., Ji, S., Du, T., Li, Z.: Spreading social influence with both positive and negative opinions in online networks. Big Data Mining Anal. 2(2), 100–117 (2019)

    Article  Google Scholar 

  19. Cai, Z., He, Z., Guan, X., Li, Y.: Collective data-sanitization for preventing sensitive information inference attacks in social networks. IEEE Trans. Dependable Secure Compu. 15(4), 577–590 (2018)

    Google Scholar 

  20. He, Z., Cai, Z., Yu, J.: Latent-data privacy preserving with customized data utility for social network data. IEEE Trans. Veh. Technol. 67(1), 665–673 (2018)

    Article  Google Scholar 

  21. Zheng, X., Cai, Z., Yu, J., Wang, C., Li, Y.: Follow but no track: privacy preserved profile publishing in cyber-physical social systems. IEEE Internet Things 4(6), 1868–1878 (2017)

    Article  Google Scholar 

  22. McGough, S.F., Brownstein, J.S., Hawkins, J.B., Santillana, M.: Forecasting Zika incidence in the 2016 Latin America outbreak combining traditional disease surveillance with search, social media, and news report data. PLoS Neql. Trop. Dis. 11, e0005295 (2017)

    Article  Google Scholar 

  23. Harris, J., et al.: Evaluating the implementation of twitter-based foodborne illness reporting tool in the city of St. Louis Department of Health. Int. J. Environ. Res. Public Health 15, 833 (2018)

    Article  Google Scholar 

  24. Finkel, J., Grenager, T., Manning, C.: Incorporating non-local information into information extraction systems by Gibbs sampling. In: Proceedings of the 43nd Annual Meeting of the Association for Computation Linguistics (2005)

    Google Scholar 

  25. Google Inc.: The Google Geocoding API. https://developers.google.com/maps/documentation/geocoding/. Accessed 20 Aug 2019

  26. Google Inc.: Word2Vec. https://code.google.com/archive/p/word2veca/. Accessed 20 Aug 2019

  27. Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P. Witten, I.: The WEKA data mining software. ACM SIGKDD Explor. Newsl. 11(1) (2009)

    Article  Google Scholar 

  28. GRAIT-DM.: The Annotated Landslide Dataset. http://grait-dm.gatech.edu. Accessed 20 Aug 2019

  29. Musaev, A., Pu, C.: Landslide information service based on composition of physical and social sensors. In: International Conference on Data Engineering (2017)

    Google Scholar 

  30. Power, L.: The Notre Dame fire garnered wall-to-wall cable news coverage. The Amazon fires are barely breaking through. https://www.mediamatters.org/msnbc/notre-dame-fire-garnered-wall-wall-cable-news-coverage-amazon-fires-are-barely-breaking. Accessed 20 Aug 2019

  31. He, Z., Cai, Z., Wang, X.: Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks. In: The 35th IEEE International Conference on Distributed Computing Systems (2015)

    Google Scholar 

  32. He, Z., Cai, Z., Yu, J., Wang, X., Sun, Y., Li, Y.: Cost-efficient strategies for restraining rumor spreading in mobile social networks. IEEE Trans. Veh. Technol. 66(3), 2789–2800 (2017)

    Article  Google Scholar 

  33. Hswen, Y., Qin, Q., Brownstein, J.S., Hawkins, J.B.: Feasibility of using social media to monitor outdoor air pollution in London. England. Prev. Med. 121, 86–93 (2019)

    Article  Google Scholar 

  34. Nsoesie, E.O., et al.: Social Media as a Sentinel for Disease Surveillance: What Does Sociodemographic Status Have to Do with It? PLOTS Current Outbreaks (2016)

    Google Scholar 

  35. Han, M., Miao, D., Wang, J., Liu, L.: Defend the clique-based attack for data privacy. In: Kim, D., Uma, R., Zelikovsky, A. (eds.) International Conference on Combinatorial Optimization and Applications, pp. 262–280. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-04651-4_18

    Chapter  Google Scholar 

  36. Albinali, H., Han, M., Wang, J., Gao, H., Li, Y.: The roles of social network mavens. In: 2016 12th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN), pp. 1–8. IEEE, December 2016

    Google Scholar 

  37. Han, M., Yan, M., Li, J., Ji, S., Li, Y.: Neighborhood-based uncertainty generation in social networks. J. Comb. Optim. 28(3), 561–576 (2014)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Meng Han .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hou, Q., Han, M. (2019). Incorporating Content Beyond Text: A High Reliable Twitter-Based Disaster Information System. In: Tagarelli, A., Tong, H. (eds) Computational Data and Social Networks. CSoNet 2019. Lecture Notes in Computer Science(), vol 11917. Springer, Cham. https://doi.org/10.1007/978-3-030-34980-6_31

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34980-6_31

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34979-0

  • Online ISBN: 978-3-030-34980-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics