Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Communication

Series

2016

Institution
Keyword
Publication

Articles 1 - 30 of 62

Full-Text Articles in Physical Sciences and Mathematics

Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee Dec 2016

Preliminary Investigation Of Walking Motion Using A Combination Of Image And Signal Processing, Bradley Schneider, Tanvi Banerjee

Kno.e.sis Publications

We present the results of analyzing gait motion in first-person video taken from a commercially available wearable camera embedded in a pair of glasses. The video is analyzed with three different computer vision methods to extract motion vectors from different gait sequences from four individuals for comparison against a manually annotated ground truth dataset. Using a combination of signal processing and computer vision techniques, gait features are extracted to identify the walking pace of the individual wearing the camera as well as validated using the ground truth dataset. Our preliminary results indicate that the extraction of activity from the video …


Efficient Online Summarization Of Large-Scale Dynamic Networks, Qiang Qu, Siyuan Liu, Feida Zhu, Christian S. Jensen Dec 2016

Efficient Online Summarization Of Large-Scale Dynamic Networks, Qiang Qu, Siyuan Liu, Feida Zhu, Christian S. Jensen

Research Collection School Of Computing and Information Systems

Information diffusion in social networks is often characterized by huge participating communities and viral cascades of high dynamicity. To observe, summarize, and understand the evolution of dynamic diffusion processes in an informative and insightful way is a challenge of high practical value. However, few existing studies aim to summarize networks for interesting dynamic patterns. Dynamic networks raise new challenges not found in static settings, including time sensitivity, online interestingness evaluation, and summary traceability, which render existing techniques inadequate. We propose dynamic network summarization to summarize dynamic networks with millions of nodes by only capturing the few most interesting nodes or …


‘Tweetboard’ – A Case Study Of Developing A Micro-Blogging Platform For Higher Education, Shao Cheh Joyce Hsu, Gan, Benjamin, Jin Lee, Shu Hui Sheryl Lim, Xie Yan Jeremy Lim, Thomas Menkhoff, Si Xian Sherman Tan, Charles Jason Woodard, Qiu Cheng Yap Dec 2016

‘Tweetboard’ – A Case Study Of Developing A Micro-Blogging Platform For Higher Education, Shao Cheh Joyce Hsu, Gan, Benjamin, Jin Lee, Shu Hui Sheryl Lim, Xie Yan Jeremy Lim, Thomas Menkhoff, Si Xian Sherman Tan, Charles Jason Woodard, Qiu Cheng Yap

Research Collection School Of Computing and Information Systems

This paper reports experiences made at an Asian university in developing a social media platform based on Twitter in the context of a final year capstone project where information systems management students get an opportunity to solve ‘a real-world problem for a real client’. In this case study, the challenge was provided by a faculty member’s request for an interactive social media application which engages less outspoken students in class via a social medium they are familiar with: Twitter. We reconstruct the project’s evolution; describe the main features of the application called ‘TweetBoard’ and share lessons learned in developing a …


Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang Dec 2016

Hashtag Recommendation With Topical Attention-Based Lstm, Yang Li, Ting Liu, Jing Jiang, Liang Zhang

Research Collection School Of Computing and Information Systems

Microblogging services allow users to create hashtags to categorize their posts. In recent years,the task of recommending hashtags for microblogs has been given increasing attention. However,most of existing methods depend on hand-crafted features. Motivated by the successful use oflong short-term memory (LSTM) for many natural language processing tasks, in this paper, weadopt LSTM to learn the representation of a microblog post. Observing that hashtags indicatethe primary topics of microblog posts, we propose a novel attention-based LSTM model whichincorporates topic modeling into the LSTM architecture through an attention mechanism. Weevaluate our model using a large real-world dataset. Experimental results show that …


From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan Dec 2016

From Footprint To Evidence: An Exploratory Study Of Mining Social Data For Credit Scoring, Guangming Guo, Feida Zhu, Enhong Chen, Qi Liu, Le Wu, Chu Guan

Research Collection School Of Computing and Information Systems

With the booming popularity of online social networks like Twitter and Weibo, online user footprints are accumulating rapidly on the social web. Simultaneously, the question of how to leverage the large-scale user-generated social media data for personal credit scoring comes into the sight of both researchers and practitioners. It has also become a topic of great importance and growing interest in the P2P lending industry. However, compared with traditional financial data, heterogeneous social data presents both opportunities and challenges for personal credit scoring. In this article, we seek a deep understanding of how to learn users’ credit labels from social …


Domain Identification For Intention Posts On Online Social Media, Thai Le Luong, Quoc Tuan Truong, Hai-Trieu Dang, Xuan Hieu Phan Dec 2016

Domain Identification For Intention Posts On Online Social Media, Thai Le Luong, Quoc Tuan Truong, Hai-Trieu Dang, Xuan Hieu Phan

Research Collection School Of Computing and Information Systems

Today, more and more Internet users are willing to share their feeling, activities, and even their intention about what they plan to do on online social media. We can easily see posts like "I plan to buy an apartment this year", or "We are looking for a tour for 3 people to Nha Trang" on online forums or social networks. Recognizing those user intents on online social media is really useful for targeted advertising. However fully understanding user intents is a complicated and challenging process which includes three major stages: user intent filtering, intent domain identification, and intent parsing and …


Towards A Computational Model Of Frame Of Reference Alignment In Swedish Dialogue, Simon Dobnik, Christine Howes, Kim Demaret, John D. Kelleher Nov 2016

Towards A Computational Model Of Frame Of Reference Alignment In Swedish Dialogue, Simon Dobnik, Christine Howes, Kim Demaret, John D. Kelleher

Conference papers

In this paper we examine how people negotiate, interpret and repair the frame of reference (FoR) in online text based dialogues discussing spatial scenes in Swedish. We describe work-in-progress in which participants are given different perspectives of the same scene and asked to locate several objects that are only shown on one of their pictures. This task requires participants to coordinate on FoR in order to identify the missing objects. This study has implications for situated dialogue systems.


Media Reinvented, Geoff Tan Nov 2016

Media Reinvented, Geoff Tan

Asian Management Insights

The brave new world of digital media.


Spiteful, One-Off, And Kind: Predicting Customer Feedback Behavior On Twitter, Agus Sulistya, Abhishek Sharma, David Lo Nov 2016

Spiteful, One-Off, And Kind: Predicting Customer Feedback Behavior On Twitter, Agus Sulistya, Abhishek Sharma, David Lo

Research Collection School Of Computing and Information Systems

Social media provides a convenient way for customers to express their feedback to companies. Identifying different types of customers based on their feedback behavior can help companies to maintain their customers. In this paper, we use a machine learning approach to predict a customer’s feedback behavior based on her first feedback tweet. First, we identify a few categories of customers based on their feedback frequency and the sentiment of the feedback. We identify three main categories: spiteful, one-off, and kind. Next, we build a model to predict the category of a customer given her first feedback. We use profile and …


On Profiling Bots In Social Media, Richard J. Oentaryo, Arinto Murdopo, Philips K. Prasetyo, Ee Peng Lim Nov 2016

On Profiling Bots In Social Media, Richard J. Oentaryo, Arinto Murdopo, Philips K. Prasetyo, Ee Peng Lim

Research Collection School Of Computing and Information Systems

The popularity of social media platforms such as Twitter has led to the proliferation of automated bots, creating both opportunities and challenges in information dissemination, user engagements, and quality of services. Past works on profiling bots had been focused largely on malicious bots, with the assumption that these bots should be removed. In this work, however, we find many bots that are benign, and propose a new, broader categorization of bots based on their behaviors. This includes broadcast, consumption, and spam bots. To facilitate comprehensive analyses of bots and how they compare to human accounts, we develop a systematic profiling …


Tracking Virality And Susceptibility In Social Media, Tuan Anh Hoang, Ee-Peng Lim Oct 2016

Tracking Virality And Susceptibility In Social Media, Tuan Anh Hoang, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

In social media, the magnitude of information propagation hinges on the virality and susceptibility of users spreading and receiving the information respectively, as well as the virality of information items. These users' and items' behavioral factors evolve dynamically at the same time interacting with one another. Previous works however measure the factors statically and independently in a restricted case: each user has only a single adoption on each item, and/or users' exposure to items are observable. In this work, we investigate the inter-relationship among the factors and users' multiple adoptions on items to propose both new static and temporal models …


Solid Waste Management Of Disposable Diaper Sanitation And The Connection To Environmental Awareness For Women In Zanzibar, Micalea Leaska Oct 2016

Solid Waste Management Of Disposable Diaper Sanitation And The Connection To Environmental Awareness For Women In Zanzibar, Micalea Leaska

Independent Study Project (ISP) Collection

This project examined the solid waste management of disposable diapers in three locations, Stone Town, Mangapwani and Vikokotoni, within Zanzibar, Tanzania. Its methods included field observations of the solid waste disposal system in Zanzibar and interviews with women about their rationales for buying and using disposable diapers. For one of the first times, the data collected during this project will further assist to educate women about the benefits of cloth diapers and the negative effects disposable diapers create for Zanzibari families and the environment. This study has observed one of the most growing concerns regarding excess solid waste contributing to …


Realizing Urban Water Pollution Impact In Melbourne, Australia Through Painting, Gregory Suplinskas Oct 2016

Realizing Urban Water Pollution Impact In Melbourne, Australia Through Painting, Gregory Suplinskas

Independent Study Project (ISP) Collection

Throughout the month of November 2016, I undertook a creative environmental art project in Melbourne, Australia. I chose to create a water-soluble oil painting (dimensions 3 ft. x 4 ft.) that represents water pollution problems in the city of Melbourne, particularly in Port Phillip Bay. These problems include toxic stormwater runoff, plastics pollution and plastic nurdles, as well as nutrient buildup and algal overgrowth. The painting includes messages regarding sustainability; sustainable action limits the use of our natural resources so that humans can preserve the environment for future generations rather than degrade it. In the painting, I combine conceptual and …


Data Visualizations And Infographics, Darren Sweeper Sep 2016

Data Visualizations And Infographics, Darren Sweeper

Sprague Library Scholarship and Creative Works

No abstract provided.


Detecting Community Pacemakers Of Burst Topic In Twitter, Guozhong Dong, Wu Yang, Feida Zhu, Wei Wang Sep 2016

Detecting Community Pacemakers Of Burst Topic In Twitter, Guozhong Dong, Wu Yang, Feida Zhu, Wei Wang

Research Collection School Of Computing and Information Systems

Twitter has become one of largest social networks for users to broad-cast burst topics. Influential users usually have a large number of followers and play an important role in the diffusion of burst topic. There have been many studies on how to detect influential users. However, traditional influential users detection approaches have largely ignored influential users in user community. In this paper, we investigate the problem of detecting community pacemakers. Community pacemakers are defined as the influential users that promote early diffusion in the user community of burst topic. To solve this problem, we present DCPBT, a framework that can …


When A Friend Online Is More Than A Friend In Life: Intimate Relationship Prediction In Microblogs, Yunshi Lan, Mengqi Zhang, Feida Zhu, Jing Jiang, Ee-Peng Lim Sep 2016

When A Friend Online Is More Than A Friend In Life: Intimate Relationship Prediction In Microblogs, Yunshi Lan, Mengqi Zhang, Feida Zhu, Jing Jiang, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Microblogging services such as Twitter and Sina Weibo have been an important, if not indespensible, platform for people around the world to connect to one another. The rich content and user interactions on these platforms reveal insightful information about each user that are valuable for various real-life applications. In particular, user offline relationships, especially those intimate ones such as family members and couples, offer distinctive value for many business and social settings. In this study, we focus on using Sina Weibo to discover intimate offline relationships among users. The problem is uniquely interesting and challenging due to the difficulty in …


Efficient Community Maintenance For Dynamic Social Networks, Hongchao Qin, Ye Yuan, Feida Zhu, Guoren Wang Sep 2016

Efficient Community Maintenance For Dynamic Social Networks, Hongchao Qin, Ye Yuan, Feida Zhu, Guoren Wang

Research Collection School Of Computing and Information Systems

Community detection plays an important role in a wide range of research topics for social networks including personalized recommendation services and information dissemination. The highly dynamic nature of social platforms, and accordingly the constant updates to the underlying network, all present a serious challenge for efficient maintenance of the identified communities. How to avoid computing from scratch the whole community detection result in face of every update, which constitutes small changes more often than not. To solve this problem, we propose a novel and efficient algorithm to maintain the communities in dynamic social networks by identifying and updating only those …


Microblogging Content Propagation Modeling Using Topic-Specific Behavioral Factors, Tuan Anh Hoang, Ee-Peng Lim Sep 2016

Microblogging Content Propagation Modeling Using Topic-Specific Behavioral Factors, Tuan Anh Hoang, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

When a microblogging user adopts some content propagated to her, we can attribute that to three behavioral factors, namely, topic virality, user virality, and user susceptibility. Topic virality measures the degree to which a topic attracts propagations by users. User virality and susceptibility refer to the ability of a user to propagate content to other users, and the propensity of a user adopting content propagated to her, respectively. In this paper, we study the problem of mining these behavioral factors specific to topics from microblogging content propagation data. We first construct a three dimensional tensor for representing the propagation instances. …


Analyzing Clinical Depressive Symptoms In Twitter, Amir Hossein Yazdavar, Hussein S. Al-Olimat, Tanvi Banerjee, Krishnaprasad Thirunarayan, Amit P. Sheth Aug 2016

Analyzing Clinical Depressive Symptoms In Twitter, Amir Hossein Yazdavar, Hussein S. Al-Olimat, Tanvi Banerjee, Krishnaprasad Thirunarayan, Amit P. Sheth

Kno.e.sis Publications

350 million people are suffering from clinical depression worldwide.


Extending The Network: The Influence Of Offline Friendship On Twitter Network, Young Soo Kim, Kyungsub Stephen Choi, Felicia Natali Aug 2016

Extending The Network: The Influence Of Offline Friendship On Twitter Network, Young Soo Kim, Kyungsub Stephen Choi, Felicia Natali

Research Collection School Of Computing and Information Systems

Twitter effectively provides a communication platform that allows users to strengthen or augment relationships with their close ones. It is a common scene to see groups of people in continuing group communication from offline to online using tools such as Twitter. Furthermore, it is also possible to meet new friends via online encounter. Under these circumstances, there would be friends who are both offline and online, or only in online. Many of earlier Twitter network studies focused on the network effects’ direction going from online to offline network. This paper explores the opposite direction, going from offline to online network. …


Latent Semantic Indexing In The Discovery Of Cyber-Bullying In Online Text, Jacob L. Bigelow Jul 2016

Latent Semantic Indexing In The Discovery Of Cyber-Bullying In Online Text, Jacob L. Bigelow

Computer Science Summer Fellows

The rise in the use of social media and particularly the rise of adolescent use has led to a new means of bullying. Cyber-bullying has proven consequential to youth internet users causing a need for a response. In order to effectively stop this problem we need a verified method of detecting cyber-bullying in online text; we aim to find that method. For this project we look at thirteen thousand labeled posts from Formspring and create a bank of words used in the posts. First the posts are cleaned up by taking out punctuation, normalizing emoticons, and removing high and low …


Detection Of Cyberbullying In Sms Messaging, Bryan W. Bradley Jul 2016

Detection Of Cyberbullying In Sms Messaging, Bryan W. Bradley

Computer Science Summer Fellows

Cyberbullying is a type of bullying that uses technology such as cell phones to harass or malign another person. To detect acts of cyberbullying, we are developing an algorithm that will detect cyberbullying in SMS (text) messages. Over 80,000 text messages have been collected by software installed on cell phones carried by participants in our study. This paper describes the development of the algorithm to detect cyberbullying messages, using the cell phone data collected previously. The algorithm works by first separating the messages into conversations in an automated way. The algorithm then analyzes the conversations and scores the severity and …


What Motivates High School Students To Take Precautions Against The Spread Of Influenza? A Data Science Approach To Latent Modeling Of Compliance With Preventative Practice, William L. Romine, Tanvi Banerjee, William R. Folk, Lloyd H. Barrow Jul 2016

What Motivates High School Students To Take Precautions Against The Spread Of Influenza? A Data Science Approach To Latent Modeling Of Compliance With Preventative Practice, William L. Romine, Tanvi Banerjee, William R. Folk, Lloyd H. Barrow

Kno.e.sis Publications

– This study focuses on a central question: What key behavioral factors influence high school students’ compliance with preventative measures against the transmission of influenza? We use multilevel logistic regression to equate logit measures for eight precautions to students’ latent compliance levels on a common scale. Using linear regression, we explore the efficacy of knowledge of influenza, affective perceptions about influenza and its prevention, prior illness, and gender in predicting compliance. Hand washing and respiratory etiquette are the easiest precautions for students, and hand sanitizer use and keeping the hands away from the face are the most difficult. Perceptions of …


Can Instagram Posts Help Characterize Urban Micro-Events?, Kasthuri Jayarajah, Archan Misra Jul 2016

Can Instagram Posts Help Characterize Urban Micro-Events?, Kasthuri Jayarajah, Archan Misra

Research Collection School Of Computing and Information Systems

Social media content, from platforms such as Twitter and Foursquare, has enabled an exciting new field of social sensing, where participatory content generated by users has been used to identify unexpected emerging or trending events. In contrast to such text-based channels, we focus on image-sharing social applications (specifically Instagram), and investigate how such urban social sensing can leverage upon the additional multi-modal, multimedia content. Given the significantly higher fraction of geotagged content on Instagram, we aim to use such channels to go beyond identification of long-lived events (e.g., a marathon) to achieve finer-grained characterization of multiple micro-events (e.g., a person …


Stpp: Spatial-Temporal Phase Profiling Based Method For Relative Rfid Tag Localization, Longfei Shangguan, Zheng Yang, Alex X. Liu, Zimu Zhou, Yunhao Liu Jul 2016

Stpp: Spatial-Temporal Phase Profiling Based Method For Relative Rfid Tag Localization, Longfei Shangguan, Zheng Yang, Alex X. Liu, Zimu Zhou, Yunhao Liu

Research Collection School Of Computing and Information Systems

Many object localization applications need the relative locations of a set of objects as oppose to their absolute locations. Although many schemes for object localization using radio frequency identification (RFID) tags have been proposed, they mostly focus on absolute object localization and are not suitable for relative object localization because of large error margins and the special hardware that they require. In this paper, we propose an approach called spatial-temporal phase profiling (STPP) to RFID-based relative object localization. The basic idea of STPP is that by moving a reader over a set of tags during which the reader continuously interrogating …


How Did We Wind Up In Such An Unlikely Universe?, Michael Bass Jun 2016

How Did We Wind Up In Such An Unlikely Universe?, Michael Bass

UCF Forum

Not long ago the Public Broadcasting Service program NOVA presented an episode called “The Great Math Mystery.” It dealt with the many ways mathematical relationships and special numbers crop up when investigating the physical and natural world.


Poster: Improving Communication And Communicability With Smarter Use Of Text-Based Messages On Mobile And Wearable Devices, Kenny T. W. Choo Jun 2016

Poster: Improving Communication And Communicability With Smarter Use Of Text-Based Messages On Mobile And Wearable Devices, Kenny T. W. Choo

Research Collection School Of Computing and Information Systems

While smartphones have undoubtedly afforded many modern conveniences such as emails, instant messaging or web search, the notifications from smartphones conversely impact our lives through a deluge of information, or stress arising from expectations that we should turn our immediate attention to them (e.g., work emails). In my latest research, we find that the glanceability of smartwatches may provide an opportunity to reduce the perceived disruption from mobile notifications. Text is a common medium for communication in smart devices, the application of natural language processing on text, together with the physical affordances of smartwatches, present exciting opportunities for research to …


Collective Rumor Correction On The Death Hoax Of A Political Figure In Social Media, Alton Y. K. Chua, Sin-Mei Cheah, Dion Hoe-Lian Goh, Ee-Peng Lim Jun 2016

Collective Rumor Correction On The Death Hoax Of A Political Figure In Social Media, Alton Y. K. Chua, Sin-Mei Cheah, Dion Hoe-Lian Goh, Ee-Peng Lim

Research Collection School Of Computing and Information Systems

Conversations on social media networks that discuss a crisis incident as it unfolds have become a norm in recent years. Left to its own devices, such conversations could quickly degenerate into rumor mills. Little research has thus far examined the correction of rumors on social media. Using the third person effect as a theoretical underpinning, we developed a model of collective rumor correction on social media based on an incident surrounding the death hoax of a political figure. Tweets from Twitter were collected and analyzed for the period when a spike of circulating rumors speculating the demise of Singapore's first …


Cest: City Event Summarization Using Twitter, Deepa Mallela May 2016

Cest: City Event Summarization Using Twitter, Deepa Mallela

Computer Science Graduate Projects and Theses

Twitter, with 288 million active users, has become the most popular platform for continuous real-time discussions. This leads to huge amounts of information related to the real-world, which has attracted researchers from both academia and industry. Event detection on Twitter has gained attention as one of the most popular domains of interest within the research community. Unfortunately, existing event detection methodologies have yet to fully explore Twitter metadata and instead rely solely on identifying events based on prior information or focus on events that belong to specific categories. Given the heavy volume of tweets that discuss events, summarization techniques can …


Are You Charlie Or Ahmed? Cultural Pluralism In Charlie Hebdo Response On Twitter, Jisun An, Haewoon Kwak, Yelena Mejova, Sonia Alonso Saenz De Oger, Braulio Gomez Fortes May 2016

Are You Charlie Or Ahmed? Cultural Pluralism In Charlie Hebdo Response On Twitter, Jisun An, Haewoon Kwak, Yelena Mejova, Sonia Alonso Saenz De Oger, Braulio Gomez Fortes

Research Collection School Of Computing and Information Systems

We study the response to the Charlie Hebdo shootings of January 7, 2015 on Twitter across the globe. We ask whether the stances on the issue of freedom of speech can be modeled using established sociological theories, including Huntington’s culturalist Clash of Civilizations, and those taking into consideration social context, including Density and Interdependence theories. We find support for Huntington’s culturalist explanation, in that the established traditions and norms of one’s “civilization” predetermine some of one’s opinion. However, at an individual level, we also find social context to play a significant role, with non-Arabs living in Arab countries using #JeSuisAhmed …