SlideShare a Scribd company logo
CHONGQING UNIVERSITY OF TECHNOLOGY
Name: Akram Ali (艾历)
Student ID: 62017010094
Major: Computer Science and
Technology
DISASTER TWEETS CLASSIFICATION AND
DETECTION BASED ON MACHINE LEARNING
Introduction
When disaster strikes, people post real-time updates on social media sites (such as Twitter);
this information is extremely useful for disaster relief and response teams, as it allows them
to prioritize activities instantly. Text mining and machine learning algorithms can sift through
massive amounts of unstructured data on social media sites like Twitter for disaster-related
information using keywords and phrases. One difficulty the computer may have is
determining if a tweet text is referring to a real tragedy or is using those keywords as a
metaphor, which could result in massive mislabeling of tweets. As a result, this study seeks to
identify between actual and fraudulent disaster tweets using Natural Language Processing
(NLP) and classification models.
Disaster & Social Media
A disaster is defined as "a potentially traumatic event that affects a large number of people
at once, has a rapid beginning, and is time-limited." Natural disasters (such as earthquakes
or hurricanes), technology disasters (such as an oil leak), and human disasters (such as
terrorism) can all result in 'physical, social, psychological, sociodemographic,
socioeconomic, and political effects.' Normally, disasters are thought of in stages, with a
pre-event, event, and post-event phase.
Social media, often known as social networking or Web, refers to a group of web-based
platforms and services that allow users to create public or semi-public profiles or material,
as well as communicate with other users' profiles or content. Typically, social media may be
accessed by a variety of computing devices, including desktop or laptop computers,
cellphones, and tablets. Social networking has become prevalent in various industries,
including disaster. Catastrophe planners, responders, and investigators are frequently
hopeful about social media's ability to improve disaster communication and operations.
Machine Learning
Machine learning is the branch of science that enables machines to learn without having
to be programmed explicitly. One of the most exciting advancements ever seen is ML.
This gives the machine the ability to learn, which, as the name suggests, makes it more
human-like. Machine learning is being applied in a lot more places these days than one
may think. Computational statistics, which focuses on computer-based predictions, is
closely related to machine learning. Mathematical optimization research contributes
methodologies, theory, and application fields to the subject of machine learning. Data
mining is a branch of machine learning that focuses on exploratory data exploration
through unsupervised learning.
Classification of Machine Learning
Dataset
To train and validate our model, sufficient tweets are required in relation to an event
that should represent the realistic scenario of that event. In our work, we have collected
tweets about different types of disasters. We have used Twitter API to capture live
tweets related to Disasters like floods, hailstorms, bushfires, earthquakes, etc. Here is the
dataset view:
Result
With the analysis of different types of algorithms, we got the Accuracy Result from
them. AS measuring their performance of Recall, Precision, F1 Score we had gotten The
Logistic Regression Classifier Algorithm had a better Accuracy resultant of 78%. But, we
had combined all algorithms result and get total 79% Accuracy. Comparison of all the
Algorithms given below:
Conclusion
we proposed a system for real-time analysis of social media information while successfully
collecting and maintaining social media content. This research will also aid in raising public
awareness of the dangers of a disaster. It will function as a warning element for disaster
management agencies. The textual content of tweets was only used for classification in this
study, and any Internet links given by (if any) tweets were discarded. The disadvantage is
that such internet links can lead to websites with further information or photographs of the
location in question. Other researchers can go various additional avenues as a result of the
current study. The classification accuracy is 79 percent, and it can be improved even more
by considering more characteristics. More people expressing their opinions in their mother
tongue will strengthen the system as more languages are added.
References
1) Kabra, G., & Ramesh, A. (2015). “Analyzing ict issues in humanitarian supply chain
management: A sap-lap linkages framework. Global Journal of Flexible Systems
Management”, 16(2), 157–171.
2) Lindsay, B. R. (2011). “Social media and disasters: Current uses, future options and policy
considerations. Congressional research service reports”, 13.
3) Adnan, Kiran-Akbar, Rehan-2019 “An analytical study of information extraction from
unstructured and multidimensional big data”
4) d. boyd, S. Golder, and G. Lotan, “Tweet, tweet, retweet: Conversational aspects of retweeting
on Twitter”, in Proceedings of the 43rd Hawaii International Conference on System Sciences,
2010, pp. 1-10.
5) A.L. Hughes and L. Palen, "Twitter adoption and use in mass convergence and emergency
events", International Journal of Emergency Management, vol. 6, 2009, pp. 248- 260
6) Graham Neubig and Yuichiroh Matsubayashi-2011, in theier work “Safety Information Mining
What can NLP do in a disaster Graham”
7) John Lingad, Sarvnaz Karimi, Jie Yin -2013, “Location Extraction From Disaster-Related
Microblogs”
Thank You

More Related Content

Similar to Akram.pptx

IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET Journal
 
Event detection in twitter using text and image fusion
Event detection in twitter using text and image fusionEvent detection in twitter using text and image fusion
Event detection in twitter using text and image fusion
csandit
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
ijaia
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
gerogepatton
 
Big Data from Social Media and Crowdsourcing in Emergencies
Big Data from Social Media and Crowdsourcing in EmergenciesBig Data from Social Media and Crowdsourcing in Emergencies
Big Data from Social Media and Crowdsourcing in Emergencies
Thomas Dybro Lundorf
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
IRJET Journal
 
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET-  	  An Improved Machine Learning for Twitter Breaking News Extraction ...IRJET-  	  An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET Journal
 
The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...
guest636475b
 
Spatial computing and social media in the context of disaster management
Spatial computing and social media in the context of disaster managementSpatial computing and social media in the context of disaster management
Spatial computing and social media in the context of disaster management
Rashid Ansari
 
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
JayaramB11
 
Algorithmic Gatekeeping for Professional Communicators Power Trust and Legiti...
Algorithmic Gatekeeping for Professional Communicators Power Trust and Legiti...Algorithmic Gatekeeping for Professional Communicators Power Trust and Legiti...
Algorithmic Gatekeeping for Professional Communicators Power Trust and Legiti...
Arjen Van Dalen
 
Strategic perspectives 3
Strategic perspectives 3Strategic perspectives 3
Strategic perspectives 3
archiejones4
 
Fusing text and image for event
Fusing text and image for eventFusing text and image for event
Fusing text and image for event
ijma
 
Demo 2014 aidr_artificial_intelligence_disaster_response
Demo 2014 aidr_artificial_intelligence_disaster_responseDemo 2014 aidr_artificial_intelligence_disaster_response
Demo 2014 aidr_artificial_intelligence_disaster_response
Conor O'Connor
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementConnie White
 
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
gerogepatton
 
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
ijaia
 
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
ijaia
 
IJET-V3I1P3
IJET-V3I1P3IJET-V3I1P3

Similar to Akram.pptx (20)

IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
 
Event detection in twitter using text and image fusion
Event detection in twitter using text and image fusionEvent detection in twitter using text and image fusion
Event detection in twitter using text and image fusion
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYINGA MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
A MACHINE LEARNING ENSEMBLE MODEL FOR THE DETECTION OF CYBERBULLYING
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
Big Data from Social Media and Crowdsourcing in Emergencies
Big Data from Social Media and Crowdsourcing in EmergenciesBig Data from Social Media and Crowdsourcing in Emergencies
Big Data from Social Media and Crowdsourcing in Emergencies
 
Terrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data MiningTerrorism Analysis through Social Media using Data Mining
Terrorism Analysis through Social Media using Data Mining
 
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET-  	  An Improved Machine Learning for Twitter Breaking News Extraction ...IRJET-  	  An Improved Machine Learning for Twitter Breaking News Extraction ...
IRJET- An Improved Machine Learning for Twitter Breaking News Extraction ...
 
The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...
 
Spatial computing and social media in the context of disaster management
Spatial computing and social media in the context of disaster managementSpatial computing and social media in the context of disaster management
Spatial computing and social media in the context of disaster management
 
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
Blockchain-Based_Event_Detection_and_Trust_Verification_Using_Natural_Languag...
 
Algorithmic Gatekeeping for Professional Communicators Power Trust and Legiti...
Algorithmic Gatekeeping for Professional Communicators Power Trust and Legiti...Algorithmic Gatekeeping for Professional Communicators Power Trust and Legiti...
Algorithmic Gatekeeping for Professional Communicators Power Trust and Legiti...
 
Strategic perspectives 3
Strategic perspectives 3Strategic perspectives 3
Strategic perspectives 3
 
Fusing text and image for event
Fusing text and image for eventFusing text and image for event
Fusing text and image for event
 
Demo 2014 aidr_artificial_intelligence_disaster_response
Demo 2014 aidr_artificial_intelligence_disaster_responseDemo 2014 aidr_artificial_intelligence_disaster_response
Demo 2014 aidr_artificial_intelligence_disaster_response
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
 
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
 
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
 
IJET-V3I1P3
IJET-V3I1P3IJET-V3I1P3
IJET-V3I1P3
 

Recently uploaded

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 

Recently uploaded (20)

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 

Akram.pptx

  • 1. CHONGQING UNIVERSITY OF TECHNOLOGY Name: Akram Ali (艾历) Student ID: 62017010094 Major: Computer Science and Technology DISASTER TWEETS CLASSIFICATION AND DETECTION BASED ON MACHINE LEARNING
  • 2. Introduction When disaster strikes, people post real-time updates on social media sites (such as Twitter); this information is extremely useful for disaster relief and response teams, as it allows them to prioritize activities instantly. Text mining and machine learning algorithms can sift through massive amounts of unstructured data on social media sites like Twitter for disaster-related information using keywords and phrases. One difficulty the computer may have is determining if a tweet text is referring to a real tragedy or is using those keywords as a metaphor, which could result in massive mislabeling of tweets. As a result, this study seeks to identify between actual and fraudulent disaster tweets using Natural Language Processing (NLP) and classification models.
  • 3. Disaster & Social Media A disaster is defined as "a potentially traumatic event that affects a large number of people at once, has a rapid beginning, and is time-limited." Natural disasters (such as earthquakes or hurricanes), technology disasters (such as an oil leak), and human disasters (such as terrorism) can all result in 'physical, social, psychological, sociodemographic, socioeconomic, and political effects.' Normally, disasters are thought of in stages, with a pre-event, event, and post-event phase. Social media, often known as social networking or Web, refers to a group of web-based platforms and services that allow users to create public or semi-public profiles or material, as well as communicate with other users' profiles or content. Typically, social media may be accessed by a variety of computing devices, including desktop or laptop computers, cellphones, and tablets. Social networking has become prevalent in various industries, including disaster. Catastrophe planners, responders, and investigators are frequently hopeful about social media's ability to improve disaster communication and operations.
  • 4. Machine Learning Machine learning is the branch of science that enables machines to learn without having to be programmed explicitly. One of the most exciting advancements ever seen is ML. This gives the machine the ability to learn, which, as the name suggests, makes it more human-like. Machine learning is being applied in a lot more places these days than one may think. Computational statistics, which focuses on computer-based predictions, is closely related to machine learning. Mathematical optimization research contributes methodologies, theory, and application fields to the subject of machine learning. Data mining is a branch of machine learning that focuses on exploratory data exploration through unsupervised learning.
  • 6. Dataset To train and validate our model, sufficient tweets are required in relation to an event that should represent the realistic scenario of that event. In our work, we have collected tweets about different types of disasters. We have used Twitter API to capture live tweets related to Disasters like floods, hailstorms, bushfires, earthquakes, etc. Here is the dataset view:
  • 7. Result With the analysis of different types of algorithms, we got the Accuracy Result from them. AS measuring their performance of Recall, Precision, F1 Score we had gotten The Logistic Regression Classifier Algorithm had a better Accuracy resultant of 78%. But, we had combined all algorithms result and get total 79% Accuracy. Comparison of all the Algorithms given below:
  • 8. Conclusion we proposed a system for real-time analysis of social media information while successfully collecting and maintaining social media content. This research will also aid in raising public awareness of the dangers of a disaster. It will function as a warning element for disaster management agencies. The textual content of tweets was only used for classification in this study, and any Internet links given by (if any) tweets were discarded. The disadvantage is that such internet links can lead to websites with further information or photographs of the location in question. Other researchers can go various additional avenues as a result of the current study. The classification accuracy is 79 percent, and it can be improved even more by considering more characteristics. More people expressing their opinions in their mother tongue will strengthen the system as more languages are added.
  • 9. References 1) Kabra, G., & Ramesh, A. (2015). “Analyzing ict issues in humanitarian supply chain management: A sap-lap linkages framework. Global Journal of Flexible Systems Management”, 16(2), 157–171. 2) Lindsay, B. R. (2011). “Social media and disasters: Current uses, future options and policy considerations. Congressional research service reports”, 13. 3) Adnan, Kiran-Akbar, Rehan-2019 “An analytical study of information extraction from unstructured and multidimensional big data” 4) d. boyd, S. Golder, and G. Lotan, “Tweet, tweet, retweet: Conversational aspects of retweeting on Twitter”, in Proceedings of the 43rd Hawaii International Conference on System Sciences, 2010, pp. 1-10. 5) A.L. Hughes and L. Palen, "Twitter adoption and use in mass convergence and emergency events", International Journal of Emergency Management, vol. 6, 2009, pp. 248- 260 6) Graham Neubig and Yuichiroh Matsubayashi-2011, in theier work “Safety Information Mining What can NLP do in a disaster Graham” 7) John Lingad, Sarvnaz Karimi, Jie Yin -2013, “Location Extraction From Disaster-Related Microblogs”