Fast Disaster Event Detection from Social Media: An Active Learning Method
DOI:
https://doi.org/10.15837/ijccc.2024.2.6460Keywords:
Disaster Detection, Social Media, Bi-LSTM, Active LearningAbstract
This study introduces a novel framework for fast disaster event detection from social media,hich incorporates active learning into Bi-directional Long Short-Term Memory (Bi-LSTM). In theace of increasing disaster-related information on social media platforms, our method addresses thehallenge of efficiently processing vast, unstructured datasets to accurately extract crucial disasterrelatednsights. Leveraging the contextual processing strengths of Bi-LSTM and the data efficiencyf active learning, our approach significantly outperforms several baseline models in accuracy,recision, recall, and F1-score. We demonstrate that our method effectively balances these metrics,nsuring reliable disaster detection while minimizing false positives and negatives. The studylso explores the impact of various model parameters on performance, offering insights for futureptimizations. Despite its promising results, the study acknowledges limitations such as datauality, representativeness, and computational resource requirements. Future work will focus onnhancing data preprocessing, expanding language and scenario applicability, and integrating theodel with additional technologies for broader disaster management applications.
References
Huang, L., Shi, P., Zhu, H., & Chen, T. (2022). Early detection of emergency events from social media: A new text clustering approach, Natural Hazards, 111(1), 851-875.
https://doi.org/10.1007/s11069-021-05081-1
Zhou, B., Zou, L., Mostafavi, A., Lin, B., Yang, M., Gharaibeh, N., ... & Mandal, D. (2022). VictimFinder: Harvesting rescue requests in disaster response from social media with BERT, Computers, Environment and Urban Systems, 95, 101824.
https://doi.org/10.1016/j.compenvurbsys.2022.101824
Sufi, F. K., & Khalil, I. (2022). Automated disaster monitoring from social media posts using AIbased location intelligence and sentiment analysis, IEEE Transactions on Computational Social Systems.
https://doi.org/10.36227/techrxiv.19212105.v1
Khan, A., Gupta, S., & Gupta, S. K. (2022). Emerging UAV technology for disaster detection, mitigation, response, and preparedness, Journal of Field Robotics, 39(6), 905-955
https://doi.org/10.1002/rob.22075
Zhang, Z., He, N., Li, D., Gao, H., Gao, T., & Zhou, C. (2022). Federated transfer learning for disaster classification in social computing networks, Journal of safety science and resilience, 3(1), 15-23.
https://doi.org/10.1002/rob.22075
Madhavi, S., Hong, S.P. (2022). Anomaly detection using deep neural network quantum encoder, Journal of Logistics, Informatics and Service Science, 9, (2), 118-130.
https://doi.org/10.33168/LISS.2022.0207
Barani Shaju & N. Valliammal (2023). Enhancement of Transaction Management Strategies for Volume Forecasting in Commodity Trading Based on Integrated Neural Prophet and Anomaly Detection, Journal of System and Management Sciences, 13(5), 585-601.
https://doi.org/10.33168/JSMS.2023.0538
Sun, H., & Grishman, R. (2022). Employing Lexicalized Dependency Paths for Active Learning of Relation Extraction, Intelligent Automation & Soft Computing, 34(3).
https://doi.org/10.32604/iasc.2022.030794
Hemmer, P., Kühl, N., & Schöffer, J. (2022). Deal: Deep evidential active learning for image classification, Deep Learning Applications, 3, 171-192.
https://doi.org/10.1007/978-981-16-3357-7_7
Moustapha, M., Marelli, S., & Sudret, B. (2022). Active learning for structural reliability: Survey, general framework and benchmark, Structural Safety, 96, 102174.
https://doi.org/10.1016/j.strusafe.2021.102174
Sudha, S. K., & Aji, S. (2022). An active learning method with entropy weighting subspace clustering for remote sensing image retrieval, Applied Soft Computing, 125, 109107.
https://doi.org/10.1016/j.asoc.2022.109107
Liu, P., Wang, L., Ranjan, R., He, G., & Zhao, L. (2022). A survey on active deep learning: from model driven to data driven, ACM Computing Surveys (CSUR), 54(10s), 1-34.
https://doi.org/10.1145/3510414
Wang, T. (2021). A K-means Group Division and LSTM Based Method for Hotel Demand Forecasting, Tehnički vjesnik, 28 (4), 1345-1352.
https://doi.org/10.17559/TV-20210507172841
Yu, X., Yang, F., Yun, J. & Wu, S. (2022). CIRNN: An Ultra-Wideband Non-Lineof- Sight Signal Classifier Based on Deep-Learning, Tehnički vjesnik, 29 (4), 1139-1147.
https://doi.org/10.17559/TV-20220315024522
Hong, L.C., Tee, C., Goh, M.K.O. (2022). Activities of daily living recognition using deep learning approaches, Journal of Logistics, Informatics and Service Science, 9 (4), 129-148.
Arul Jothi S., Venkatesan R. (2023). A deep learning approach for efficient anomaly detection in WSNS, INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 18(1).
https://doi.org/10.15837/ijccc.2023.1.4756
Park, J., Yoo, T., Lee, S., & Kim, T. (2023). Urban Noise Analysis and Emergency Detection System using Lightweight End-to-End Convolutional Neural Network, INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 18(5).
https://doi.org/10.15837/ijccc.2023.5.5814
Xia, B., Han, D., Yin, X., Gao, N. (2022). RICNN: A ResNet&Inception Convolutional Neural Network for Intrusion Detection of Abnormal Traffic, Computer Science and Information Systems, 19(1), 309-326.
Additional Files
Published
Issue
Section
License
Copyright (c) 2024 Palizhati Adili, Yiwang Chen
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.