{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T20:27:19Z","timestamp":1743020839648,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030116798"},{"type":"electronic","value":"9783030116804"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11680-4_7","type":"book-chapter","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T02:05:34Z","timestamp":1549505134000},"page":"54-66","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Operational Deep Learning Pipeline for Classifying Life Events from Individual Tweets"],"prefix":"10.1007","author":[{"given":"Xinsong","family":"Du","sequence":"first","affiliation":[]},{"given":"Jiang","family":"Bian","sequence":"additional","affiliation":[]},{"given":"Mattia","family":"Prosperi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,8]]},"reference":[{"issue":"1","key":"7_CR1","doi-asserted-by":"publisher","first-page":"13006","DOI":"10.1038\/s41598-017-12961-9","volume":"7","author":"AG Reece","year":"2017","unstructured":"Reece, A.G., Reagan, A.J., Lix, K.L.M., Dodds, P.S., Danforth, C.M., Langer, E.J.: Forecasting the onset and course of mental illness with Twitter data. Sci. Rep. 7(1), 13006 (2017). \n                  https:\/\/doi.org\/10.1038\/s41598-017-12961-9","journal-title":"Sci. Rep."},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1177\/0261927X09351676","volume":"29","author":"YR Tausczik","year":"2010","unstructured":"Tausczik, Y.R., Pennebaker, J.W.: The psychological meaning of words: LIWC and computerized text analysis methods. J. Lang. Soc. Psychol. 29(1), 24\u201354 (2010). \n                  https:\/\/doi.org\/10.1177\/0261927X09351676","journal-title":"J. Lang. Soc. Psychol."},{"issue":"2","key":"7_CR3","doi-asserted-by":"publisher","first-page":"18:1","DOI":"10.1145\/2996183","volume":"17","author":"N Alsaedi","year":"2017","unstructured":"Alsaedi, N., Burnap, P., Rana, O.: Can we predict a riot? Disruptive event detection using Twitter. ACM Trans. Internet Technol. 17(2), 18:1\u201318:26 (2017). \n                  https:\/\/doi.org\/10.1145\/2996183","journal-title":"ACM Trans. Internet Technol."},{"key":"7_CR4","doi-asserted-by":"publisher","unstructured":"Sumner, C., Byers, A., Boochever, R., Park, G.J.: Predicting dark triad personality traits from Twitter usage and a linguistic analysis of tweets. In: 2012 11th International Conference on Machine Learning and Applications, vol. 2, pp. 386\u2013393 (2012). \n                  https:\/\/doi.org\/10.1109\/ICMLA.2012.218","DOI":"10.1109\/ICMLA.2012.218"},{"key":"7_CR5","doi-asserted-by":"publisher","unstructured":"Makazhanov, A., Rafiei, D.: Predicting political preference of Twitter users. In: 2013 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013), pp. 298\u2013305 (2013). \n                  https:\/\/doi.org\/10.1145\/2492517.2492527","DOI":"10.1145\/2492517.2492527"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Conover, M., Gon\u00e7alves, B., Ratkiewicz, J., Flammini, A., Menczer, F.: Predicting the political alignment of Twitter users. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, pp. 192\u2013199 (2011). \n                  https:\/\/doi.org\/10.1109\/PASSAT\/SocialCom.2011.34","DOI":"10.1109\/PASSAT\/SocialCom.2011.34"},{"key":"7_CR7","unstructured":"Ramos, J.P.: Using TF-IDF to determine word relevance in document queries. Presented at the First International Conference on Machine Learning, New Brunswick, NJ, USA (2003)"},{"issue":"1\u20132","key":"7_CR8","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1023\/A:1007617005950","volume":"42","author":"T Hofmann","year":"2001","unstructured":"Hofmann, T.: Unsupervised learning by probabilistic latent semantic analysis. Mach. Learn. 42(1\u20132), 177\u2013196 (2001). \n                  https:\/\/doi.org\/10.1023\/A:1007617005950","journal-title":"Mach. Learn."},{"key":"7_CR9","unstructured":"Won, D., Steinert-Threlkeld, Z.C., Joo, J.: Protest activity detection and perceived violence estimation from social media images. ArXiv:1709.06204 [Cs] (2017). \n                  http:\/\/arxiv.org\/abs\/1709.06204"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1016\/j.trc.2017.11","volume":"86","author":"Z Zhang","year":"2018","unstructured":"Zhang, Z., He, Q., Gao, J., Ni, M.: A deep learning approach for detecting traffic accidents from social media data. Transp. Res. Part C: Emerg. Technol. 86, 580\u2013596 (2018). \n                  https:\/\/doi.org\/10.1016\/j.trc.2017.11","journal-title":"Transp. Res. Part C: Emerg. Technol."},{"key":"7_CR11","unstructured":"Founta, A.-M., Chatzakou, D., Kourtellis, N., Blackburn, J., Vakali, A., Leontiadis, I.: A unified deep learning architecture for abuse detection. ArXiv:1802.00385 [Cs] (2018). \n                  http:\/\/arxiv.org\/abs\/1802.00385"},{"key":"7_CR12","doi-asserted-by":"publisher","unstructured":"Badjatiya, P., Gupta, S., Gupta, M., Varma, V.: Deep learning for hate speech detection in tweets. In: Proceedings of the 26th International Conference on World Wide Web Companion, pp. 759\u2013760. International World Wide Web Conferences Steering Committee, Republic and Canton of Geneva, Switzerland (2017). \n                  https:\/\/doi.org\/10.1145\/3041021.3054223","DOI":"10.1145\/3041021.3054223"},{"key":"7_CR13","unstructured":"Pitsilis, G.K., Ramampiaro, H., Langseth, H.: Detecting offensive language in tweets using deep learning. ArXiv:1801.04433 [Cs] (2018). \n                  http:\/\/arxiv.org\/abs\/1801.04433"},{"key":"7_CR14","doi-asserted-by":"publisher","unstructured":"Pennington, J., Socher, R., Manning, C.: Glove: global vectors for word representation, pp. 1532\u20131543. Association for Computational Linguistics (2014). \n                  https:\/\/doi.org\/10.3115\/v1\/D14-1162","DOI":"10.3115\/v1\/D14-1162"},{"key":"7_CR15","unstructured":"Mikolov, T., Sutskever, I., Chen, K., Corrado, G.S., Dean, J.: Distributed representations of words and phrases and their compositionality, p. 9 (n.d.)"},{"issue":"7","key":"7_CR16","doi-asserted-by":"publisher","first-page":"e0158450","DOI":"10.1371\/journal.pone.0158450","volume":"11","author":"J Bian","year":"2016","unstructured":"Bian, J., et al.: Mining Twitter to assess the public perception of the \u201cinternet of things\u201d. PLoS One 11(7), e0158450 (2016). \n                  https:\/\/doi.org\/10.1371\/journal.pone.0158450","journal-title":"PLoS One"},{"issue":"3","key":"7_CR17","doi-asserted-by":"publisher","first-page":"276","DOI":"10.11613\/BM.2012.031","volume":"22","author":"ML McHugh","year":"2012","unstructured":"McHugh, M.L.: Interrater reliability: the kappa statistic. Biochem. Med. 22(3), 276\u2013282 (2012)","journal-title":"Biochem. Med."},{"issue":"1","key":"7_CR18","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1214\/aoms\/1177705148","volume":"32","author":"LA Goodman","year":"1961","unstructured":"Goodman, L.A.: Snowball sampling. Ann. Math. Stat. 32(1), 148\u2013170 (1961). \n                  https:\/\/doi.org\/10.1214\/aoms\/1177705148","journal-title":"Ann. Math. Stat."},{"key":"7_CR19","unstructured":"Nadeau, C., Bengio, Y.: Inference for the generalization error. In: Proceedings of the 12th International Conference on Neural Information Processing Systems, pp. 307\u2013313. MIT Press, Cambridge (1999). \n                  http:\/\/dl.acm.org\/citation.cfm?id=3009657.3009701"},{"key":"7_CR20","unstructured":"LeCun, Y., Bengio, Y.: Convolutional networks for images, speech, and time-series, p. 15 (n.d.)"},{"key":"7_CR21","unstructured":"Le, H.T., Cerisara, C., Denis, A.: Do convolutional networks need to be deep for text classification? ArXiv:1707.04108 [Cs] (2017). \n                  http:\/\/arxiv.org\/abs\/1707.04108"},{"issue":"8","key":"7_CR22","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter, S., Schmidhuber, J.: Long short-term memory. Neural Comput. 9(8), 1735\u20131780 (1997). \n                  https:\/\/doi.org\/10.1162\/neco.1997.9.8.1735","journal-title":"Neural Comput."},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Das, S., Wong, W.K., Dietterich, T., Fern, A., Emmott, A.: Incorporating expert feedback into active anomaly discovery. In: 2016 IEEE 16th International Conference on Data Mining (ICDM), pp. 853\u2013858 (2016). \n                  https:\/\/doi.org\/10.1109\/ICDM.2016.0102","DOI":"10.1109\/ICDM.2016.0102"},{"key":"7_CR24","unstructured":"Yin, W., Kann, K., Yu, M., Sch\u00fctze, H.: Comparative study of CNN and RNN for natural language processing (2017). \n                  https:\/\/arxiv.org\/abs\/1702.01923"},{"key":"7_CR25","unstructured":"Zhang, X., Zhao, J., LeCun, Y.: Character-level convolutional networks for text classification. ArXiv:1509.01626 [Cs] (2015). \n                  http:\/\/arxiv.org\/abs\/1509.01626"},{"key":"7_CR26","unstructured":"The Xapian Project (n.d.). \n                  https:\/\/xapian.org\/\n                  \n                . Assessed 28 June 2018"},{"key":"7_CR27","unstructured":"Welcome to Python.org (n.d.). \n                  https:\/\/www.python.org\/\n                  \n                . Assessed 28 June 2018"},{"key":"7_CR28","unstructured":"TensorFlow (n.d.). \n                  https:\/\/www.tensorflow.org\/\n                  \n                . Assessed 28 June 2018"},{"issue":"5","key":"7_CR29","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/s10488-013-0528-y","volume":"42","author":"LA Palinkas","year":"2015","unstructured":"Palinkas, L.A., Horwitz, S.M., Green, C.A., Wisdom, J.P., Duan, N., Hoagwood, K.: Purposeful sampling for qualitative data collection and analysis in mixed method implementation research. Adm. Policy Ment. Health 42(5), 533\u2013544 (2015)","journal-title":"Adm. Policy Ment. Health"}],"container-title":["Communications in Computer and Information Science","Information Management and Big Data"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11680-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:11:22Z","timestamp":1558397482000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-11680-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030116798","9783030116804"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11680-4_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMBig","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Symposium on Information Management and Big Data","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lima","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Peru","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simbig2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/simbig.org\/SIMBig2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}