Social Media Visualization Amalgamating Social & Factual data to provide a comprehensive outlook on any geo-location.

Slides:



Advertisements
Similar presentations
Secure File Transfer Protocol (SFTP) With Secure Copy (SC) What is a Secure File Transfer Protocol with Secure Copy???
Advertisements

CRB Database Introduction Press F5 to maximise this presentation.
For Missouri Commission PLEXOS Q&A for Missouri Commission.
Chapter 10 Excel: Data Handling or What do we do with all that data?
AS ICT Finding your way round MS-Access The Home Ribbon This ribbon is automatically displayed when MS-Access is started and when existing tables.
1099 Pro, Inc. – Software for Pro Enterprise Edition Features.
1 Linking & Consolidating Worksheets Applications of Spreadsheets.
With Microsoft Excel 2007 Comprehensive 1e© 2008 Pearson Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Excel 2007 Comprehensive.
Institute for Clinical and Translational Science (ICTS) Fred McClurg Neil Nuehring New Features and Improvements in REDCap
How to Submit a Matching Gifts Application.
FASET Refresher Welcome to the FASET Refresher course. The following screenshots will take you through the basic FASET Demo. Because this is a slide show,
Track, View, Manage and Report on all aspects of the Recruitment Process… with ease!
Integrating Access with the Web and with Other Programs.
Resource Discovery Module DigiTool Version 3.0. Resource Discovery 2 Deposit Approval Search & Index Dispatcher & Viewers Single & Bulk Web Services DigiTool.
1 Accord Guide to Member Logins. 2 How to login to your FFC account What to do if you forget your FFC password How to change your FFC account password.
Edit the text with your own short phrases. The animation is already done for you; just copy and paste the slide into your existing presentation. RegisterLogin.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 5: User Environment and Multiple Languages.
1 General Reporting HRMS Reports There are two types of HRMS reports: Standard and Customized. Standard reports came with the SAP Software and relate to.
Esri International User Conference | San Diego, CA Technical Workshops | Esri Tracking Solutions: Working with real-time data Adam Mollenkopf David Kaiser.
The Solution xxxxxxxx.
DB Audit Expert v1.1 for Oracle Copyright © SoftTree Technologies, Inc. This presentation is for DB Audit Expert for Oracle version 1.1 which.
Structure Commander Technical Presentation. Copyright (C) MCS 2013, All rights reserved. 2 STRUCTURE COMMANDER Introduction Product Overview.
Ogden Air Logistics Center. Purpose of Excel2FV Many agencies produce point lists of different data (target lists, force locations, etc.) in either Excel.
Tutorial 8 Managing and Securing a Database. Objectives Filter data in a table and a form Save a filter as a query and apply the saved query as a filter.
The Unix Environment and Compiling. Getting Set Up Your programs will be compiled and tested on the Departmental server ‘linprog’ The linprog servers.
Basic Data Handling An introduction to using RM Information Magic Malcolm Wilson ICT Curriculum Development Officer Falkirk Council Education Services.
Welcome 2013 User Group Meeting Voting on New Features.
Copyright 2007, Paradigm Publishing Inc. BACKNEXTEND 3-1 LINKS TO OBJECTIVES Save a Filter as a Query Save a Filter as a Query Parameter Query Inner, Left,
Employee Self Service (ESS) Version Employee Self Service  access from any computer  view their elected withholding, earnings summary, check.
V 0.1Slide 1 Security – Audit Trail How to maintain audit trail? Access Control Other Information Configuration Customization  audit trail  purge.
FireRMS SQL Audit, Archiving & Purging Presented by Laura Small FireRMS Quality Assurance.
Classroom User Training June 29, 2005 Presented by:
© 2008 The McGraw-Hill Companies, Inc. All rights reserved. ACCESS 2007 M I C R O S O F T ® THE PROFESSIONAL APPROACH S E R I E S Lesson 4 – Creating New.
Advanced Excel for Finance Professionals A self study material from South Asian Management Technologies Foundation.
NSTS Internal Demo. Agenda 1.NSTS Release Summary 2.Functionality/Enhancements by User Group Licensee Agency Admin 3.Scenarios/Demo 2.
Address Refer to Slide 2 for instructions on how to view the full-screen slideshow.Slide 2.
ERA Manager Training December 19, Propriety and Confidential. Do not distribute. 2 ERA Manager Overview In an effort to reduce the need for Providers,
Encryption Cisco Ironport using Click here to begin Press the ‘F5’ Key to Begin.
TxEIS Security A role-based solution October 2010.
1. Chapter 25 Protecting and Preparing Documents.
SunGuide® Software Development Project Release 4.3 Express Lanes Enhancements Design Review December 15, 2009 December 15, 20091R4.3 Design Review.
System Initialization 1)User starts application. 2)Client loads settings. 3)Client loads contact address book. 4)Client displays contact list. 5)Client.
0 eCPIC User Training: Dependency Mapper These training materials are owned by the Federal Government. They can be used or modified only by FESCOM member.
After this class, you will be able to:  Use Quick Queries  Understand how alerts work and what triggers them  Identify various searching methods  Do.
ProjectManager Plugin. Objective Enable web-based storage for construals – Save construals without having to copy script generator text to notepad – Load.
COMPREHENSIVE Access Tutorial 12 Managing and Securing a Database.
® Microsoft Access 2010 Tutorial 12 Managing and Securing a Database.
1 After completing this lesson, you will be able to: Change the format of a table. Sort records in a table. Find records in a table Use filters with a.
Access Forms and Queries. Entering Data in Your Table  You can add data to your table in Datasheet view, by typing in the columns and rows.  This.
Mr. Justin “JET” Turner CSCI 3000 – Fall 2015 CRN Section A – TR 9:30-10:45 CRN – Section B – TR 5:30-6:45.
Microsoft Access 2013 ®® Tutorial 12 Managing and Securing a Database.
Session Making Queries and Multiple Entry Work for You in Direct Loans (Hands-On) Session 21.
J-ESS Tutorial Change Phone Numbers and Emergency Notification.
Collections Management Museums EMu New Developments EMu (and beyond!) Alex Fell Technical Operations Manager KE Software.
Lesson 2: Designing a Database and Creating Tables.
Gold – Crystal Reports Introductory Course Cortex User Group Meeting New Orleans – 2011.
Microsoft Access Database Creation and Management.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
TROI – SPC Database Walkthrough Training Presentation Doc. USTP0213 Rev4.
XP New Perspectives on Microsoft Office Access 2003, Second Edition- Tutorial 8 1 Microsoft Office Access 2003 Tutorial 8 – Integrating Access with the.
Page 1 of 13 Beginner’s Tutorial – The Monalog Sanitizer What data does Monalog collect from you?  Monalog collects what you type on the command line.
MiVoice Office Eight parties per conference Max 20 parties / single conference Total of 40 parties Dial able Conference Assistant and conference.
® Microsoft Access 2010 Tutorial 8 Managing and Securing a Database.
Copyright © SkyeyTech, Inc. CRMdesk Power and elegance.
Database Applications – Microsoft Access Lesson 5 Shared Data.
Tutorial 8 Managing and Securing a Database
Grauer and Barber Series Microsoft Access Chapter One
Tutorial 12 Managing and Securing a Database
Presentation transcript:

Social Media Visualization Amalgamating Social & Factual data to provide a comprehensive outlook on any geo-location

Uses Twitter API Utilises data harvesting program from Nick Horne, previous student’s final year project

Weather Analysis GUI Linked to previous harvesting program via a shared database Database connection established by selecting ‘Connect to Database’

1. All harvested Tweet geo-coordinates are analysed via Weather.com to check if the Tweet originates from an alert area. 2. If so, the Tweet text is semantically analysed using the AFINN list, to try to systematically determine an overall positive or negative sentiment. 3. The resulting Tweets and alerts are displayed, with a background colour matching that of the Alert colour rating.

1. All harvested Tweet geo-coordinates are analysed via Weather.com to check if the Tweet originates from an alert area. 2. If so, the Tweet text is semantically analysed using the AFINN list, to try to systematically determine an overall positive or negative sentiment. 3. The resulting Tweets and alerts are displayed, with a background colour matching that of the Alert colour rating.

Saving / Exporting Tweets of Interest Each Tweet of Interest highlighted to a user by the system can be recorded for future use by clicking ‘Store Information’ and entering the desired filename. Stores saved output as a.txt file

Security An audit trail recording every user action is created and updated after every system event. When a file is saved, an MD5SUM hash of the file is recorded and saved to the audit trail. Access to the audit trail itself is password encrypted

Future Possibilities Ability to click a button and instantly get connected to a nearby radio station Ability to instantly view recorded historical data for an area – e.g. Annual temperatures, area crime rate etc. In addition to just exporting information to an external format, I will look into the possibility of being able to internally save and load tweets of interest into the system, in order to recreate exactly what a user first experienced Change current semantic analysis method from AFINN list to a more sophisticated solution such as Alchemy or SentiStrength

Design Philosophy Where possible I have tried to make the application as modular as possible. For example, the weather alert filtering criteria could be replaced with a ‘crime rate above x’ requirement, or ‘longitude/latitude values within x & y’, provided that the data is available. Similarly, the application could be modified relatively easily to instead access a networked-database of Tweets, allowing multiple application copies to be used as clients. This could be used in scenarios such as a test centre by giving all candidates access to a shared database and having mock-tweet entries being sent to the database, reviewing each candidate’s actions using the audit trail afterwards. The real-time analysis capabilities of the system allow for a user to provide almost any pre-defined filtering criteria, and the system will then find matches/anomalies and highlight them for human- inspection.