Detecting future social unrest in unprocessed Twitter data

Size: px
Start display at page:

Download "Detecting future social unrest in unprocessed Twitter data"

Transcription

1 Detecting future social unrest in unprocessed Twitter data Emerging Phenomena and Big Data Ryan Compton* Craig Lee Tsai-Ching Lu HRL Laboratories Malibu, California Lalindra De Silva The University of Utah Salt Lake City, UT Michael Macy Cornell University Ithaca, NY Abstract We have implemented a social media data mining system capable of forecasting events related to Latin American social unrest. Our method directly extracts a small number of tweets from publicly-available data on twitter.com, condenses similar tweets into coherent forecasts, and assembles a detailed and easily-interpretable audit trail which allows end users to quickly collect information about an upcoming event. Our system functions by continually applying multiple textual and geographic filters to a large volume of data streaming from twitter.com via the public API as well as a commercial data feed. To be specific, we search the entirety of twitter.com for a few carefully chosen keywords, search within those tweets for mentions of future dates, filter again using various logistic regression classifiers, and finally assign a location to an event by geocoding retweeters. Geocoding is done using our previouslydeveloped in-house geocoding service which, at the time of this writing, can infer the home location for over 62M twitter.com users [1]. Additionally, we identify demographics likely interested in an upcoming event by searching retweeter s recent posts for demographic-specific keywords. I. INTRODUCTION Widespread adoption of social media has made it possible for any individual to rapidly communicate with an audience of thousands [2]. Unlike traditional media, where several difficult time-consuming steps must be carried out prior to publication, information in social media becomes publicly available within a few seconds of its creation. In this work we utilize social media s accelerated publication speed to report on events prior their occurrence, while they are still in their planning stages. Very recently, the speed of publication on twitter.com has motivated its use as a tool for the organization of future civil unrest events [3]. This fact, combined with the public availability of twitter.com data, has motivated our use of it as well. We will demonstrate how we Supported by the Intelligence Advanced Research Projects Activity (IARPA) via Department of Interior National Business Center (DoI / NBC) contract number D12PC The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright annotation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of IARPA, DoI/NBE, or the U.S. Government. filter through this large and dynamic supply of information for messages exhibiting several independent and informative features. Early detection of civil unrest events is valuable for several industrial and government applications. For example, if a port is likely to shut down due to a riot, shipping companies may opt to redirect freight in order to prevent unexpected losses. If a massive protest is planned to happen in front of an embassy, governments may elect to postpone diplomatic visits in order to ensure the safety of their politicians. The value of civil unrest forecasting has recently caught the attention of researchers from a wide variety of disciplines [4] [5] [6] [7]. We use early detection rather than prediction. Our method is based on direct extraction of relevant tweets instead of a physical model describing a large-scale theory of population behavior (e.g. [6] [7]). Our forecasts are based on a small number of highly important tweets and are independent of trends observed in the aggregate of all tweets. To be specific, our detection algorithm can be broken down into the application of several filters which we use to continually monitor streaming data from twitter.com, cf alg. 1. Algorithm 1: Future event detection Input: millions of today s tweets on twitter.com Output: a few dozen tweets relevant to upcoming events t 1 = tweets with text containing specific keywords t 2 = tweets in t 1 with text containing future dates t 3 = tweets in t 2 which have passed through a text classifier t 4 = tweets in t 3 whose retweeters localize within nations of interest or whose text contains mentions of specific locations return t 4 The tweets output by alg. 1 are often few in number and rich in information about upcoming Latin American civil unrest events. We believe that any user of our system will be able to easily interpret each day s results with minimal effort. This paper is organized as follows: section II describes each /13/$ IEEE 56 ISI 2013, June 4-7, 2013, Seattle, Washington, USA

2 step of alg. 1 in detail. section III showcases our user interface and has information about the system s past performance. Finally, section IV discusses future work and concluding remarks. II. METHOD Our goal is to generate forecasts of the form: {population, event_type, date, location, probability} Where population describes the demographic of the event participants (eg education, labor, agriculture), event type gives further detail about the reason for the event (eg employment, housing, economic policies), date is the date the event is forecast to occur on, location is the city where we expect the event to occur, and probability is how likely it is that the event will actually happen. We obtain twitter.com data in two ways: purchasing a commercial realtime data feed consisting of a random sample of 10% of all tweets [8] and continually querying twitter.com s rate-limited public API [9]. A. Keyword searches The first filter a tweet must pass is a simple check for mentions of Latin American civil unrest keywords. The advantage of this filter is that it is possible to apply it to the entirety of twitter.com by using the public search API. Latin American civil unrest keywords tend to be esoteric enough that we can often obtain complete coverage for several keywords each day. We have manually identified a collection of 26 keywords which we believe are of substantial importance and query the API to obtain full coverage of these keywords. A set of 335 words was identified by a domain expert for use in our model. Due to twitter.com rate-limiting, searching the public API for all occurrences of all 335 keyswords is not possible so searches for these 335 keywords are constrained to our commercial 10% data feed. B. Future date searches Simple checks for keyword mentions are poor indicators of tweet content. A quick experiment has shown that, in both English and Spanish, only about 20% of tweets that contain a civil unrest keyword are indeed about civil unrest. Furthermore, it is unclear how to forecast an event date from only tweets with certain keywords. We thus apply a second filter, one for mentions of future dates, to the tweets containing protest keywords. Our future date filter searches first for month names and abbreviations in Spanish and Portuguese and second for numbers less than 31 within three whitespace separated tokens from each other. Thus, an example matching date pattern would be 10 de enero. Four-digit years are rare in tweets, in order to determine the year of the mentioned date we use the year which minimizes the number of days between the mentioned date and the tweet s post time. In our example, if a tweet mentions 10 de enero on we assume the user is talking about as is closer in time to than is. Once we have extracted dates from the text, we assert that the mentioned dates occur after the tweets post time. We assume that tweets mentioning past dates are unlikely to be indicative of future events. When the future date filter is applied the number of tweets is reduced substantially, a quick in-house experiment on tweets containing unrest keywords collected from the twitter.com API on found that only 1512 of these tweets also contained future dates. For each tweet passing this filter we tentatively issue a forecast for the mentioned date. C. Logistic regression classification Co-mentions of keywords with future dates does not guarantee that a particular tweet is indeed about civil unrest. We have developed two classifiers to classify tweets based on their relevance to a civil unrest event. Our first classifier is a standard logistic regression classifier trained on tweets. The features for the classifier were unigrams and bigrams that surpassed a frequency threshold of 3 in the training data. The training data was acquired using three annotators through Amazon Mechanical Turk and they annotated 3000 tweets for their relevance to a civil unrest event (pairwise inter-annotator agreement ranged from 0.68 to 0.74). Our second classifier makes use of recent work we have done establishing that tweets from organizations are roughly three-times more likely to be civil unrest-related than similar tweets from individuals [10]. In order to exploit this concept, we designed an auxiliary classifier that classifies the source user type of a tweet into two categories - organizations and individuals. For this classifier, we make use of an ensemble framework for user type identification based on heuristics, an ngram classifier, and a linguistic classifier. The heuristics were designed to capture two strong cues that are characteristic of organization tweets - 1) they almost always contains a URL and 2) organizational tweets rarely contain replied tweets (tweets beginning mentions). The ngram classifier was based on unigrams and bigrams and the linguistic classifier captures several types of linguistic features that are characteristic of tweets in either category. These three components in the ensemble are then utilized in linear combination using another logistic regression classifier to determine the user type of any given tweet. After we have identified the posting user as individual/organization using this classifier, we adjust the forecast probability accordingly, by incorporating the likelihoods to derive the postrior probability of a tweet being civil unrest-related GIVEN its user type. D. Event geocoding Identification of event locations is central to the goal of this project. We infer the location of an upcoming event by searching the tweet for mentions of cities or monuments from a manually compiled list. In the event that no locations are mentioned in text, we assign a location to an event based on the location of retweeters. 57

3 For each tweet passing the logistic regression filter, we query the twitter.com API for user IDs of all the tweet s retweeters. User IDs are then fed into our geocoder (outlined below) and filtered based on whether or not they reside in Latin America. We note here that this filter is remarkably difficult to pass. Of the 1512 tweets collected in the previous step in our example, only 36 passed the Latin America geocoding filter. We assume that civil unrest events tend to occur in population centers. Our geocoded users are reverse-geocoded into the nearest city with population greater than The most commonly occurring city is used as the location of our event. User geocoding: We identify retweeter locations with our previously developed in-house geocoder [1]. At the time of this writing, our geocoder is able to estimate home locations of 62M twitter.com users with a median error of 11.1km. The distinguishing feature of our geocoder is its ability to infer a user s location based on the locations of that user s online social ties. This is accomplished via a technique similar to label propagation [11] applied to the twitter.com network. Here, bidirectional means that edges in our network are formed when user i user j and user j user i at least once. Briefly, our user geocoder works as follows: We begin by extracting home locations for users based on the number of times they have tweeted with location services turned on. When our 10% sample of twitter.com contains 3 or more tweets from a user within a 15km radius we use the geometric median of those tagged tweets to establish the user s home location. This provides us with home locations for users. Experiments with self-reported locations in profile information and time zone pruning showed negligible benefits [1]. Denote the network by N and define a geometric median function φ : N N by Fig. 1: Example forecast. A march related to Petroleos Mexicanos (Pemex) is planned for March 18 in Mexico City. Our system detected the event on March 5th. The interactive map provides end-users with links to retweeter accounts. { n if n is gps-known φ(n) = argmin n i adj. to n d(n i, x) else x (1) where each node n N stores information about the latitude/longitude for the user associated to that node. The distance function is computed with Vincenty s formulas [12]. The optimization in eq. (1) is known as the l 1 multivariate median or geometric median [13]. Our geocoding algorithm can now be stated concisely. Algorithm 2: Geocoding Initialize: N, gps-known ground truth user locations while not converged do foreach n N do n φ(n) end end return N Empirically, alg. 2 converges, providing us with location estimates for twitter.com users. E. Demographics and event code assignment We condense duplicate forecasts for the same date/location into one forecast by averaging their probabilities. Our domain expert has provided us with lists of terms relevant to several demographics and event types in Latin America. To assign a demographic to each forecast we collect the tweet histories of every retweeter of every tweet associated with a forecast and search our list of terms. The most commonly occurring classes of terms are used to assign our forecast s demographic and event code. III. RESULTS Successful end-user interpretation is important. By approaching this problem from the viewpoint of early detection rather than prediction we can more easily provide an audit trail which can be understood with minimal effort. For each forecast generated we provide the tweets used, the retweeter locations, the keywords matched, and links to all retweeter accounts. (cf fig. 1). 58

4 Fig. 2: Cumulative sum of the number of forecasts generated since The addition of twitter.com API searches happened in late February and led to a notable increase in the amount of forecasts generated each day. Fig. 3: Number of events forecast to happen on each day. There is a significant spike on February 14th, these are mostly false positives. A quick look at the audit trails reveals that these false positives were due to twitter.com user s propensity to protest February 14th. number of events forcast nation 50 Argentina 19 Brazil 39 Chile 53 Colombia 15 Ecuador 9 El Salvador 156 Mexico 6 Paraguay 1 Uruguay 82 Venezuela TABLE I: Number of forecasts generated for each country. Mexico is highly active on twitter.com and receives the most coverage from our system. Our system has been in place since (cf fig. 2), in that time the rate at which forecasts are generated has been steadily increasing as we continue to update our algorithms. Incorporation of the twitter API for complete coverage of a small set of keywords happened in late Febuary 2013 and the number of forecasts generated each day can be seen to increase sharply around this time. Aside from the geocoder, it is possible to implement our system without commercial data feeds, i.e. our results are reproducible from publicly-available data. The amount of events forecast to occur on each day is plotted in fig. 3. There is no obvious pattern. In the future, after substantially more forecasts have been generated, it may be possible to use this time series as part of a prediction-based approach. Assessing the performance of our system is relatively straightforward given the audit trails. Manual examination of 283 forecasts generated by this system revealed 157 forecasts which are indeed about upcoming Latin American civil unrest events and 126 forecasts related to sporting events, other public functions, or simple chatter. IV. CONCLUSION Twitter.com has become a powerful tool for the organization of mass gatherings of all types. However, the shear volume of twitter.com makes it difficult to automatically identify new and valuable information in real time. In this work we have provided a straightforward approach for the detection of upcoming civil unrest events in Latin America based on successive textual and geographic filters. Traditional news media is often assumed to be perfectly accurate and can therefore only report on events once they have occurred. The fact that it is now possible to relax the assumption of perfect accuracy and report on events before their occurrence is remarkable and continued work on this project is already in progress. Immediate future work includes more advanced tweet classification using larger training sets, network, and dictionary-based approaches. We also plan to analyze the links shared in tweets for further information on upcoming events. V. REFERENCES REFERENCES [1] D. Jurgens, Inferring location in online communities based on social relationships, HRL technical report, [2] H. Kwak, C. Lee, H. Park, and S. Moon, What is twitter, a social network or a news media? WWW, [3] J. Skinner, Social media and revolution: The arab spring and the occupy movement as seen through three information studies paradigms, [4] E. Stepanova, The role of information communication technologies in the arab spring, PONARS Eurasia Policy Memo No. 159, [5] F. Chen, J. Arredondo, R. P. Khandpur, C.-T. Lu, D. Mares, D. Gupta, and N. Ramakrishnan, Spatial surrogates to forecast social mobilization and civil unrests, Position Paper in CCC Workshop on From GPS and Virtual Globes to Spatial Computing-2012, [6] D. Braha, Global civil unrest: Contagion, self-organization, and prediction, PLoS One,

5 [7] N. Johnson, S. Carran, J. Botner, K. Fontaine, N. Laxague, P. Nuetzel, J. Turnley, and B. Tivnan, Pattern in escalations in insurgent and terrorist activity, Science, [8] [9] [10] L. D. Silva and E. Riloff, Exploiting the textual content of tweets for user type classification, ICWSM (submitted), [11] X. Zhu and Z. Ghahramani, Learning from labeled and unlabeled data with label propagation, Technical Report CMU-CALD , Carnegie Mellon University, Tech. Rep., [12] [13] Y. Vardi and C.-H. Zhang, The multivariate l1-median and associated data depth, Proceedings of the National Academy of Sciences, vol. 97, no. 4, pp ,

Exploiting Social Network for Forensic Analysis to Predict Civil Unrest

Exploiting Social Network for Forensic Analysis to Predict Civil Unrest International Journal of Computer Sciences and Engineering Open Access Review Paper Volume-04, Issue-04 E-ISSN: 2347-2693 Exploiting Social Network for Forensic Analysis to Predict Civil Unrest Ruchika

More information

Sentiment analysis on tweets in a financial domain

Sentiment analysis on tweets in a financial domain Sentiment analysis on tweets in a financial domain Jasmina Smailović 1,2, Miha Grčar 1, Martin Žnidaršič 1 1 Dept of Knowledge Technologies, Jožef Stefan Institute, Ljubljana, Slovenia 2 Jožef Stefan International

More information

Content-Based Discovery of Twitter Influencers

Content-Based Discovery of Twitter Influencers Content-Based Discovery of Twitter Influencers Chiara Francalanci, Irma Metra Department of Electronics, Information and Bioengineering Polytechnic of Milan, Italy irma.metra@mail.polimi.it chiara.francalanci@polimi.it

More information

Keywords social media, internet, data, sentiment analysis, opinion mining, business

Keywords social media, internet, data, sentiment analysis, opinion mining, business Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Real time Extraction

More information

Graph Mining and Social Network Analysis

Graph Mining and Social Network Analysis Graph Mining and Social Network Analysis Data Mining and Text Mining (UIC 583 @ Politecnico di Milano) References Jiawei Han and Micheline Kamber, "Data Mining: Concepts and Techniques", The Morgan Kaufmann

More information

Social Market Analytics, Inc.

Social Market Analytics, Inc. S-Factors : Definition, Use, and Significance Social Market Analytics, Inc. Harness the Power of Social Media Intelligence January 2014 P a g e 2 Introduction Social Market Analytics, Inc., (SMA) produces

More information

Sentiment Analysis. D. Skrepetos 1. University of Waterloo. NLP Presenation, 06/17/2015

Sentiment Analysis. D. Skrepetos 1. University of Waterloo. NLP Presenation, 06/17/2015 Sentiment Analysis D. Skrepetos 1 1 Department of Computer Science University of Waterloo NLP Presenation, 06/17/2015 D. Skrepetos (University of Waterloo) Sentiment Analysis NLP Presenation, 06/17/2015

More information

Sentiment Analysis of Twitter Feeds for the Prediction of Stock Market Movement

Sentiment Analysis of Twitter Feeds for the Prediction of Stock Market Movement Sentiment Analysis of Twitter Feeds for the Prediction of Stock Market Movement Ray Chen, Marius Lazer Abstract In this paper, we investigate the relationship between Twitter feed content and stock market

More information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Eric Hsueh-Chan Lu Chi-Wei Huang Vincent S. Tseng Institute of Computer Science and Information Engineering

More information

Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus

Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus Facebook Friend Suggestion Eytan Daniyalzade and Tim Lipus 1. Introduction Facebook is a social networking website with an open platform that enables developers to extract and utilize user information

More information

CIRGIRDISCO at RepLab2014 Reputation Dimension Task: Using Wikipedia Graph Structure for Classifying the Reputation Dimension of a Tweet

CIRGIRDISCO at RepLab2014 Reputation Dimension Task: Using Wikipedia Graph Structure for Classifying the Reputation Dimension of a Tweet CIRGIRDISCO at RepLab2014 Reputation Dimension Task: Using Wikipedia Graph Structure for Classifying the Reputation Dimension of a Tweet Muhammad Atif Qureshi 1,2, Arjumand Younus 1,2, Colm O Riordan 1,

More information

Text Opinion Mining to Analyze News for Stock Market Prediction

Text Opinion Mining to Analyze News for Stock Market Prediction Int. J. Advance. Soft Comput. Appl., Vol. 6, No. 1, March 2014 ISSN 2074-8523; Copyright SCRG Publication, 2014 Text Opinion Mining to Analyze News for Stock Market Prediction Yoosin Kim 1, Seung Ryul

More information

Predicting the Stock Market with News Articles

Predicting the Stock Market with News Articles Predicting the Stock Market with News Articles Kari Lee and Ryan Timmons CS224N Final Project Introduction Stock market prediction is an area of extreme importance to an entire industry. Stock price is

More information

Easily Identify Your Best Customers

Easily Identify Your Best Customers IBM SPSS Statistics Easily Identify Your Best Customers Use IBM SPSS predictive analytics software to gain insight from your customer database Contents: 1 Introduction 2 Exploring customer data Where do

More information

A Hurwitz white paper. Inventing the Future. Judith Hurwitz President and CEO. Sponsored by Hitachi

A Hurwitz white paper. Inventing the Future. Judith Hurwitz President and CEO. Sponsored by Hitachi Judith Hurwitz President and CEO Sponsored by Hitachi Introduction Only a few years ago, the greatest concern for businesses was being able to link traditional IT with the requirements of business units.

More information

Large-Scale Test Mining

Large-Scale Test Mining Large-Scale Test Mining SIAM Conference on Data Mining Text Mining 2010 Alan Ratner Northrop Grumman Information Systems NORTHROP GRUMMAN PRIVATE / PROPRIETARY LEVEL I Aim Identify topic and language/script/coding

More information

Blog Post Extraction Using Title Finding

Blog Post Extraction Using Title Finding Blog Post Extraction Using Title Finding Linhai Song 1, 2, Xueqi Cheng 1, Yan Guo 1, Bo Wu 1, 2, Yu Wang 1, 2 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing 2 Graduate School

More information

Sentiment Analysis on Big Data

Sentiment Analysis on Big Data SPAN White Paper!? Sentiment Analysis on Big Data Machine Learning Approach Several sources on the web provide deep insight about people s opinions on the products and services of various companies. Social

More information

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015

An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015 An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content

More information

Financial Trading System using Combination of Textual and Numerical Data

Financial Trading System using Combination of Textual and Numerical Data Financial Trading System using Combination of Textual and Numerical Data Shital N. Dange Computer Science Department, Walchand Institute of Rajesh V. Argiddi Assistant Prof. Computer Science Department,

More information

Social Media Mining. Data Mining Essentials

Social Media Mining. Data Mining Essentials Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers

More information

Twitter sentiment vs. Stock price!

Twitter sentiment vs. Stock price! Twitter sentiment vs. Stock price! Background! On April 24 th 2013, the Twitter account belonging to Associated Press was hacked. Fake posts about the Whitehouse being bombed and the President being injured

More information

That s What Friends Are For: Inferring Location in Online Social Media Platforms Based on Social Relationships

That s What Friends Are For: Inferring Location in Online Social Media Platforms Based on Social Relationships Proceedings of the Seventh International AAAI Conference on Weblogs and Social Media That s What Friends Are For: Inferring Location in Online Social Media Platforms Based on Social Relationships David

More information

Project Report BIG-DATA CONTENT RETRIEVAL, STORAGE AND ANALYSIS FOUNDATIONS OF DATA-INTENSIVE COMPUTING. Masters in Computer Science

Project Report BIG-DATA CONTENT RETRIEVAL, STORAGE AND ANALYSIS FOUNDATIONS OF DATA-INTENSIVE COMPUTING. Masters in Computer Science Data Intensive Computing CSE 486/586 Project Report BIG-DATA CONTENT RETRIEVAL, STORAGE AND ANALYSIS FOUNDATIONS OF DATA-INTENSIVE COMPUTING Masters in Computer Science University at Buffalo Website: http://www.acsu.buffalo.edu/~mjalimin/

More information

Fraud Detection for Online Retail using Random Forests

Fraud Detection for Online Retail using Random Forests Fraud Detection for Online Retail using Random Forests Eric Altendorf, Peter Brende, Josh Daniel, Laurent Lessard Abstract As online commerce becomes more common, fraud is an increasingly important concern.

More information

Learn Software Microblogging - A Review of This paper

Learn Software Microblogging - A Review of This paper 2014 4th IEEE Workshop on Mining Unstructured Data An Exploratory Study on Software Microblogger Behaviors Abstract Microblogging services are growing rapidly in the recent years. Twitter, one of the most

More information

Stephen MacDonell Andrew Gray Grant MacLennan Philip Sallis. The Information Science Discussion Paper Series. Number 99/12 June 1999 ISSN 1177-455X

Stephen MacDonell Andrew Gray Grant MacLennan Philip Sallis. The Information Science Discussion Paper Series. Number 99/12 June 1999 ISSN 1177-455X DUNEDIN NEW ZEALAND Software Forensics for Discriminating between Program Authors using Case-Based Reasoning, Feed-Forward Neural Networks and Multiple Discriminant Analysis Stephen MacDonell Andrew Gray

More information

Can Twitter provide enough information for predicting the stock market?

Can Twitter provide enough information for predicting the stock market? Can Twitter provide enough information for predicting the stock market? Maria Dolores Priego Porcuna Introduction Nowadays a huge percentage of financial companies are investing a lot of money on Social

More information

Predicting the NFL Using Twitter. Shiladitya Sinha, Chris Dyer, Kevin Gimpel, Noah Smith

Predicting the NFL Using Twitter. Shiladitya Sinha, Chris Dyer, Kevin Gimpel, Noah Smith Predicting the NFL Using Twitter Shiladitya Sinha, Chris Dyer, Kevin Gimpel, Noah Smith Disclaimer This talk will not teach you how to become a successful sports bettor. Questions What is the NFL and what

More information

Analysis of Tweets for Prediction of Indian Stock Markets

Analysis of Tweets for Prediction of Indian Stock Markets Analysis of Tweets for Prediction of Indian Stock Markets Phillip Tichaona Sumbureru Department of Computer Science and Engineering, JNTU College of Engineering Hyderabad, Kukatpally, Hyderabad-500 085,

More information

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph

MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph MALLET-Privacy Preserving Influencer Mining in Social Media Networks via Hypergraph Janani K 1, Narmatha S 2 Assistant Professor, Department of Computer Science and Engineering, Sri Shakthi Institute of

More information

An Overview of Knowledge Discovery Database and Data mining Techniques

An Overview of Knowledge Discovery Database and Data mining Techniques An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,

More information

Survey of LAC agricultural research institutes on technical information management.

Survey of LAC agricultural research institutes on technical information management. Survey of LAC agricultural research institutes on technical information management. FORAGRO Technical Secretariat Area of Technology and Innovation Directorate of Technical Leadership and Knowledge Management,

More information

SOUTHERN EXPOSURE PERFORMING ARTS OF LATIN AMERICA

SOUTHERN EXPOSURE PERFORMING ARTS OF LATIN AMERICA APPLICATION RECEIPT DEADLINE February 28, 2014 PROJECT PERIOD September 1, 2014 August 31, 2015 PROGRAM DESCRIPTION Southern Exposure: Performing Arts of Latin America is a national initiative that supports

More information

Data Mining in Web Search Engine Optimization and User Assisted Rank Results

Data Mining in Web Search Engine Optimization and User Assisted Rank Results Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management

More information

Spatio-Temporal Patterns of Passengers Interests at London Tube Stations

Spatio-Temporal Patterns of Passengers Interests at London Tube Stations Spatio-Temporal Patterns of Passengers Interests at London Tube Stations Juntao Lai *1, Tao Cheng 1, Guy Lansley 2 1 SpaceTimeLab for Big Data Analytics, Department of Civil, Environmental &Geomatic Engineering,

More information

Using Text and Data Mining Techniques to extract Stock Market Sentiment from Live News Streams

Using Text and Data Mining Techniques to extract Stock Market Sentiment from Live News Streams 2012 International Conference on Computer Technology and Science (ICCTS 2012) IPCSIT vol. XX (2012) (2012) IACSIT Press, Singapore Using Text and Data Mining Techniques to extract Stock Market Sentiment

More information

Twitter Analytics: Architecture, Tools and Analysis

Twitter Analytics: Architecture, Tools and Analysis Twitter Analytics: Architecture, Tools and Analysis Rohan D.W Perera CERDEC Ft Monmouth, NJ 07703-5113 S. Anand, K. P. Subbalakshmi and R. Chandramouli Department of ECE, Stevens Institute Of Technology

More information

PROGRAM DIRECTOR: Arthur O Connor Email Contact: URL : THE PROGRAM Careers in Data Analytics Admissions Criteria CURRICULUM Program Requirements

PROGRAM DIRECTOR: Arthur O Connor Email Contact: URL : THE PROGRAM Careers in Data Analytics Admissions Criteria CURRICULUM Program Requirements Data Analytics (MS) PROGRAM DIRECTOR: Arthur O Connor CUNY School of Professional Studies 101 West 31 st Street, 7 th Floor New York, NY 10001 Email Contact: Arthur O Connor, arthur.oconnor@cuny.edu URL:

More information

Sentiment analysis of Twitter microblogging posts. Jasmina Smailović Jožef Stefan Institute Department of Knowledge Technologies

Sentiment analysis of Twitter microblogging posts. Jasmina Smailović Jožef Stefan Institute Department of Knowledge Technologies Sentiment analysis of Twitter microblogging posts Jasmina Smailović Jožef Stefan Institute Department of Knowledge Technologies Introduction Popularity of microblogging services Twitter microblogging posts

More information

SEARCH ENGINE OPTIMIZATION USING D-DICTIONARY

SEARCH ENGINE OPTIMIZATION USING D-DICTIONARY SEARCH ENGINE OPTIMIZATION USING D-DICTIONARY G.Evangelin Jenifer #1, Mrs.J.Jaya Sherin *2 # PG Scholar, Department of Electronics and Communication Engineering(Communication and Networking), CSI Institute

More information

Adaptive Demand-Forecasting Approach based on Principal Components Time-series an application of data-mining technique to detection of market movement

Adaptive Demand-Forecasting Approach based on Principal Components Time-series an application of data-mining technique to detection of market movement Adaptive Demand-Forecasting Approach based on Principal Components Time-series an application of data-mining technique to detection of market movement Toshio Sugihara Abstract In this study, an adaptive

More information

A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING

A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING A FUZZY BASED APPROACH TO TEXT MINING AND DOCUMENT CLUSTERING Sumit Goswami 1 and Mayank Singh Shishodia 2 1 Indian Institute of Technology-Kharagpur, Kharagpur, India sumit_13@yahoo.com 2 School of Computer

More information

Using News Articles to Predict Stock Price Movements

Using News Articles to Predict Stock Price Movements Using News Articles to Predict Stock Price Movements Győző Gidófalvi Department of Computer Science and Engineering University of California, San Diego La Jolla, CA 9237 gyozo@cs.ucsd.edu 21, June 15,

More information

Fraud Detection in Online Reviews using Machine Learning Techniques

Fraud Detection in Online Reviews using Machine Learning Techniques ISSN (e): 2250 3005 Volume, 05 Issue, 05 May 2015 International Journal of Computational Engineering Research (IJCER) Fraud Detection in Online Reviews using Machine Learning Techniques Kolli Shivagangadhar,

More information

Qualitative Corporate Dashboards for Corporate Monitoring Peng Jia and Miklos A. Vasarhelyi 1

Qualitative Corporate Dashboards for Corporate Monitoring Peng Jia and Miklos A. Vasarhelyi 1 Qualitative Corporate Dashboards for Corporate Monitoring Peng Jia and Miklos A. Vasarhelyi 1 Introduction Electronic Commerce 2 is accelerating dramatically changes in the business process. Electronic

More information

Spatiotemporal Clustering of Twitter Feeds for Activity Summarization

Spatiotemporal Clustering of Twitter Feeds for Activity Summarization Spatiotemporal Clustering of Twitter Feeds for Activity Summarization N. Wayant 1, A. Crooks 2, A. Stefanidis 3, A. Croitoru 3, J. Radzikowski 3, J. Stahl 2, J. Shine 2 1 US Army ERDC Topographic Engineering

More information

The Six Critical Considerations of Social Media Threat Intelligence

The Six Critical Considerations of Social Media Threat Intelligence The Six Critical Considerations of Social Media Threat Intelligence Every day, angry rhetoric and hints of potential danger flow though streams of social media data. Some of these threats may affect your

More information

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2

The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 2nd International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2016) The multilayer sentiment analysis model based on Random forest Wei Liu1, Jie Zhang2 1 School of

More information

A Survey on Product Aspect Ranking

A Survey on Product Aspect Ranking A Survey on Product Aspect Ranking Charushila Patil 1, Prof. P. M. Chawan 2, Priyamvada Chauhan 3, Sonali Wankhede 4 M. Tech Student, Department of Computer Engineering and IT, VJTI College, Mumbai, Maharashtra,

More information

Big Data Analytics for Mitigating Insider Risks in Electronic Medical Records

Big Data Analytics for Mitigating Insider Risks in Electronic Medical Records Big Data Analytics for Mitigating Insider Risks in Electronic Medical Records Bradley Malin, Ph.D. Associate Prof. & Vice Chair of Biomedical Informatics, School of Medicine Associate Prof. of Computer

More information

Research of Postal Data mining system based on big data

Research of Postal Data mining system based on big data 3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Research of Postal Data mining system based on big data Xia Hu 1, Yanfeng Jin 1, Fan Wang 1 1 Shi Jiazhuang Post & Telecommunication

More information

Coordinating national investment promotion with subnational investment promotion

Coordinating national investment promotion with subnational investment promotion . Coordinating national investment promotion with subnational investment promotion Investment climate, World Bank Global Market Access from an International Economy Spain: your partner in Europe Business

More information

IDENTIFICATION OF KEY LOCATIONS BASED ON ONLINE SOCIAL NETWORK ACTIVITY

IDENTIFICATION OF KEY LOCATIONS BASED ON ONLINE SOCIAL NETWORK ACTIVITY H. Efstathiades, D. Antoniades, G. Pallis, M. D. Dikaiakos IDENTIFICATION OF KEY LOCATIONS BASED ON ONLINE SOCIAL NETWORK ACTIVITY 1 Motivation Key Locations information is of high importance for various

More information

LABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING. ----Changsheng Liu 10-30-2014

LABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING. ----Changsheng Liu 10-30-2014 LABEL PROPAGATION ON GRAPHS. SEMI-SUPERVISED LEARNING ----Changsheng Liu 10-30-2014 Agenda Semi Supervised Learning Topics in Semi Supervised Learning Label Propagation Local and global consistency Graph

More information

Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework

Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework Effective Data Retrieval Mechanism Using AML within the Web Based Join Framework Usha Nandini D 1, Anish Gracias J 2 1 ushaduraisamy@yahoo.co.in 2 anishgracias@gmail.com Abstract A vast amount of assorted

More information

Societal Data Resources and Data Processing Infrastructure

Societal Data Resources and Data Processing Infrastructure Societal Data Resources and Data Processing Infrastructure Bruno Martins INESC-ID & Instituto Superior Técnico bruno.g.martins@ist.utl.pt 1 DATASTORM Task on Societal Data Project vision : Build infrastructure

More information

A U T H O R S : G a n e s h S r i n i v a s a n a n d S a n d e e p W a g h Social Media Analytics

A U T H O R S : G a n e s h S r i n i v a s a n a n d S a n d e e p W a g h Social Media Analytics contents A U T H O R S : G a n e s h S r i n i v a s a n a n d S a n d e e p W a g h Social Media Analytics Abstract... 2 Need of Social Content Analytics... 3 Social Media Content Analytics... 4 Inferences

More information

npsolver A SAT Based Solver for Optimization Problems

npsolver A SAT Based Solver for Optimization Problems npsolver A SAT Based Solver for Optimization Problems Norbert Manthey and Peter Steinke Knowledge Representation and Reasoning Group Technische Universität Dresden, 01062 Dresden, Germany peter@janeway.inf.tu-dresden.de

More information

Social Security in Latin America

Social Security in Latin America 139 Social Security Leonardo Rangel Social Security in Latin America Technical Officer on Planning and Research at IPEA; Ph.D. student in Public Policy at PPED-UFRJ. 141 Social Security in Latin America

More information

IBM SPSS Direct Marketing 23

IBM SPSS Direct Marketing 23 IBM SPSS Direct Marketing 23 Note Before using this information and the product it supports, read the information in Notices on page 25. Product Information This edition applies to version 23, release

More information

IBM SPSS Direct Marketing 22

IBM SPSS Direct Marketing 22 IBM SPSS Direct Marketing 22 Note Before using this information and the product it supports, read the information in Notices on page 25. Product Information This edition applies to version 22, release

More information

Analysis of Social Media Streams

Analysis of Social Media Streams Fakultätsname 24 Fachrichtung 24 Institutsname 24, Professur 24 Analysis of Social Media Streams Florian Weidner Dresden, 21.01.2014 Outline 1.Introduction 2.Social Media Streams Clustering Summarization

More information

Predictive time series analysis of stock prices using neural network classifier

Predictive time series analysis of stock prices using neural network classifier Predictive time series analysis of stock prices using neural network classifier Abhinav Pathak, National Institute of Technology, Karnataka, Surathkal, India abhi.pat93@gmail.com Abstract The work pertains

More information

Reactive Agent Technology for Real-Time, Multisensor Target Tracking

Reactive Agent Technology for Real-Time, Multisensor Target Tracking Reactive Agent Technology for Real-Time, Multisensor Target Tracking COSTAS TSATSOULIS AND EDWARD KOMP Department of Electrical Engineering and Computer Science Information and Telecommunication Technology

More information

A Comparative Study on Sentiment Classification and Ranking on Product Reviews

A Comparative Study on Sentiment Classification and Ranking on Product Reviews A Comparative Study on Sentiment Classification and Ranking on Product Reviews C.EMELDA Research Scholar, PG and Research Department of Computer Science, Nehru Memorial College, Putthanampatti, Bharathidasan

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK A SURVEY ON BIG DATA ISSUES AMRINDER KAUR Assistant Professor, Department of Computer

More information

A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1

A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1 A Platform for Supporting Data Analytics on Twitter: Challenges and Objectives 1 Yannis Stavrakas Vassilis Plachouras IMIS / RC ATHENA Athens, Greece {yannis, vplachouras}@imis.athena-innovation.gr Abstract.

More information

Robust Sentiment Detection on Twitter from Biased and Noisy Data

Robust Sentiment Detection on Twitter from Biased and Noisy Data Robust Sentiment Detection on Twitter from Biased and Noisy Data Luciano Barbosa AT&T Labs - Research lbarbosa@research.att.com Junlan Feng AT&T Labs - Research junlan@research.att.com Abstract In this

More information

Statistics for BIG data

Statistics for BIG data Statistics for BIG data Statistics for Big Data: Are Statisticians Ready? Dennis Lin Department of Statistics The Pennsylvania State University John Jordan and Dennis K.J. Lin (ICSA-Bulletine 2014) Before

More information

IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS

IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS IJCSES Vol.7 No.4 October 2013 pp.165-168 Serials Publications BEHAVIOR PERDITION VIA MINING SOCIAL DIMENSIONS V.Sudhakar 1 and G. Draksha 2 Abstract:- Collective behavior refers to the behaviors of individuals

More information

Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience

Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience Work Smarter, Not Harder: Leveraging IT Analytics to Simplify Operations and Improve the Customer Experience Data Drives IT Intelligence We live in a world driven by software and applications. And, the

More information

Sanjeev Kumar. contribute

Sanjeev Kumar. contribute RESEARCH ISSUES IN DATAA MINING Sanjeev Kumar I.A.S.R.I., Library Avenue, Pusa, New Delhi-110012 sanjeevk@iasri.res.in 1. Introduction The field of data mining and knowledgee discovery is emerging as a

More information

A Knowledge Management Framework Using Business Intelligence Solutions

A Knowledge Management Framework Using Business Intelligence Solutions www.ijcsi.org 102 A Knowledge Management Framework Using Business Intelligence Solutions Marwa Gadu 1 and Prof. Dr. Nashaat El-Khameesy 2 1 Computer and Information Systems Department, Sadat Academy For

More information

Community-Aware Prediction of Virality Timing Using Big Data of Social Cascades

Community-Aware Prediction of Virality Timing Using Big Data of Social Cascades 1 Community-Aware Prediction of Virality Timing Using Big Data of Social Cascades Alvin Junus, Ming Cheung, James She and Zhanming Jie HKUST-NIE Social Media Lab, Hong Kong University of Science and Technology

More information

Twitter and Natural Disasters Peter Ney

Twitter and Natural Disasters Peter Ney Twitter and Natural Disasters Peter Ney Introduction The growing popularity of mobile computing and social media has created new opportunities to incorporate social media data into crisis response. In

More information

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management

Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Using reporting and data mining techniques to improve knowledge of subscribers; applications to customer profiling and fraud management Paper Jean-Louis Amat Abstract One of the main issues of operators

More information

Load Distribution in Large Scale Network Monitoring Infrastructures

Load Distribution in Large Scale Network Monitoring Infrastructures Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu

More information

NetView 360 Product Description

NetView 360 Product Description NetView 360 Product Description Heterogeneous network (HetNet) planning is a specialized process that should not be thought of as adaptation of the traditional macro cell planning process. The new approach

More information

Statistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit

Statistics in Retail Finance. Chapter 7: Fraud Detection in Retail Credit Statistics in Retail Finance Chapter 7: Fraud Detection in Retail Credit 1 Overview > Detection of fraud remains an important issue in retail credit. Methods similar to scorecard development may be employed,

More information

Quick Guide to Getting Started: Twitter for Small Businesses and Nonprofits

Quick Guide to Getting Started: Twitter for Small Businesses and Nonprofits Quick Guide to Getting Started: Twitter for Small Businesses and Nonprofits Social Media www.constantcontact.com 1-866-876-8464 Insight provided by 2011 Constant Contact, Inc. 11-2168 What is Twitter?

More information

Ngram Search Engine with Patterns Combining Token, POS, Chunk and NE Information

Ngram Search Engine with Patterns Combining Token, POS, Chunk and NE Information Ngram Search Engine with Patterns Combining Token, POS, Chunk and NE Information Satoshi Sekine Computer Science Department New York University sekine@cs.nyu.edu Kapil Dalwani Computer Science Department

More information

Estimating Twitter User Location Using Social Interactions A Content Based Approach

Estimating Twitter User Location Using Social Interactions A Content Based Approach 2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing Estimating Twitter User Location Using Social Interactions A Content Based

More information

Accurately and Efficiently Measuring Individual Account Credit Risk On Existing Portfolios

Accurately and Efficiently Measuring Individual Account Credit Risk On Existing Portfolios Accurately and Efficiently Measuring Individual Account Credit Risk On Existing Portfolios By: Michael Banasiak & By: Daniel Tantum, Ph.D. What Are Statistical Based Behavior Scoring Models And How Are

More information

A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data

A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data , pp. 169-178 http://dx.doi.org/10.14257/ijsh.2014.8.6.16 A Study on the Collection Site Profiling and Issue-detection Methodology for Analysis of Customer Feedback on Social Big Data Eun-Jee Song 1 and

More information

Data Mining Yelp Data - Predicting rating stars from review text

Data Mining Yelp Data - Predicting rating stars from review text Data Mining Yelp Data - Predicting rating stars from review text Rakesh Chada Stony Brook University rchada@cs.stonybrook.edu Chetan Naik Stony Brook University cnaik@cs.stonybrook.edu ABSTRACT The majority

More information

The Role of Twitter in YouTube Videos Diffusion

The Role of Twitter in YouTube Videos Diffusion The Role of Twitter in YouTube Videos Diffusion George Christodoulou, Chryssis Georgiou, George Pallis Department of Computer Science University of Cyprus {gchris04, chryssis, gpallis}@cs.ucy.ac.cy Abstract.

More information

Credit Card Fraud Detection Using Self Organised Map

Credit Card Fraud Detection Using Self Organised Map International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 13 (2014), pp. 1343-1348 International Research Publications House http://www. irphouse.com Credit Card Fraud

More information

ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search

ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search Project for Michael Pitts Course TCSS 702A University of Washington Tacoma Institute of Technology ALIAS: A Tool for Disambiguating Authors in Microsoft Academic Search Under supervision of : Dr. Senjuti

More information

Cluster Analysis for Evaluating Trading Strategies 1

Cluster Analysis for Evaluating Trading Strategies 1 CONTRIBUTORS Jeff Bacidore Managing Director, Head of Algorithmic Trading, ITG, Inc. Jeff.Bacidore@itg.com +1.212.588.4327 Kathryn Berkow Quantitative Analyst, Algorithmic Trading, ITG, Inc. Kathryn.Berkow@itg.com

More information

Data Cleansing for Remote Battery System Monitoring

Data Cleansing for Remote Battery System Monitoring Data Cleansing for Remote Battery System Monitoring Gregory W. Ratcliff Randall Wald Taghi M. Khoshgoftaar Director, Life Cycle Management Senior Research Associate Director, Data Mining and Emerson Network

More information

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security

More information

Reasoning Component Architecture

Reasoning Component Architecture Architecture of a Spam Filter Application By Avi Pfeffer A spam filter consists of two components. In this article, based on my book Practical Probabilistic Programming, first describe the architecture

More information

Local outlier detection in data forensics: data mining approach to flag unusual schools

Local outlier detection in data forensics: data mining approach to flag unusual schools Local outlier detection in data forensics: data mining approach to flag unusual schools Mayuko Simon Data Recognition Corporation Paper presented at the 2012 Conference on Statistical Detection of Potential

More information

Social Media Implementations

Social Media Implementations SEM Experience Analytics Social Media Implementations SEM Experience Analytics delivers real sentiment, meaning and trends within social media for many of the world s leading consumer brand companies.

More information

Bayesian Spam Filtering

Bayesian Spam Filtering Bayesian Spam Filtering Ahmed Obied Department of Computer Science University of Calgary amaobied@ucalgary.ca http://www.cpsc.ucalgary.ca/~amaobied Abstract. With the enormous amount of spam messages propagating

More information

Text Mining Approach for Big Data Analysis Using Clustering and Classification Methodologies

Text Mining Approach for Big Data Analysis Using Clustering and Classification Methodologies Text Mining Approach for Big Data Analysis Using Clustering and Classification Methodologies Somesh S Chavadi 1, Dr. Asha T 2 1 PG Student, 2 Professor, Department of Computer Science and Engineering,

More information

A METHODOLOGY FOR MODELING A LARGE LOCATION PROBLEM

A METHODOLOGY FOR MODELING A LARGE LOCATION PROBLEM A METHODOLOGY FOR MODELING A LARGE LOCATION PROBLEM Samuel Vieira Conceição* Luís Henrique Capanema Pedrosa** Marcellus Vinagre da Silva** Álvaro Simões da Conceição Neto** * Department of Industrial Engineering

More information

Facilitating Business Process Discovery using Email Analysis

Facilitating Business Process Discovery using Email Analysis Facilitating Business Process Discovery using Email Analysis Matin Mavaddat Matin.Mavaddat@live.uwe.ac.uk Stewart Green Stewart.Green Ian Beeson Ian.Beeson Jin Sa Jin.Sa Abstract Extracting business process

More information

Sentiment analysis using emoticons

Sentiment analysis using emoticons Sentiment analysis using emoticons Royden Kayhan Lewis Moharreri Steven Royden Ware Lewis Kayhan Steven Moharreri Ware Department of Computer Science, Ohio State University Problem definition Our aim was

More information