{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:52:26Z","timestamp":1726037546817},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_49","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:19:24Z","timestamp":1563405564000},"page":"551-563","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Emergency Analysis Based on Affective Computing in Universities Forum"],"prefix":"10.1007","author":[{"given":"Lu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xu","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Xiaqing","family":"Xie","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Tianle","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"1","key":"49_CR1","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1111\/coin.12017","volume":"31","author":"F Atefeh","year":"2015","unstructured":"Atefeh, F., Khreich, W.: A survey of techniques for event detection in twitter. Comput. Intell. 31(1), 132\u2013164 (2015)","journal-title":"Comput. Intell."},{"key":"49_CR2","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1016\/j.neucom.2014.08.045","volume":"149","author":"X Zhang","year":"2015","unstructured":"Zhang, X., Chen, X., Chen, Y., et al.: Event detection and popularity prediction in microblogging. Neurocomputing 149, 1469\u20131480 (2015)","journal-title":"Neurocomputing"},{"issue":"4","key":"49_CR3","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1177\/0165551517698564","volume":"44","author":"Mahmud Hasan","year":"2017","unstructured":"Hasan, M., Orgun, M.A., Schwitter, R.: A survey on real-time event detection from the Twitter data stream. J. Inf. Sci. (2017). https:\/\/doi.org\/10.1177\/0165551517698564","journal-title":"Journal of Information Science"},{"key":"49_CR4","doi-asserted-by":"publisher","first-page":"723","DOI":"10.1613\/jair.4272","volume":"50","author":"S Kiritchenko","year":"2014","unstructured":"Kiritchenko, S., Zhu, X., Mohammad, S.M.: Sentiment analysis of short informal texts. J. Artif. Intell. Res. 50, 723\u2013762 (2014)","journal-title":"J. Artif. Intell. Res."},{"key":"49_CR5","first-page":"401","volume":"11","author":"J Weng","year":"2011","unstructured":"Weng, J., Lee, B.S.: Event detection in twitter. ICWSM 11, 401\u2013408 (2011)","journal-title":"ICWSM"},{"key":"49_CR6","unstructured":"Yin, J., Karimi, S., Lampert, A., et al.: Using social media to enhance emergency situation awareness. In: Twenty-Fourth International Joint Conference on Artificial Intelligence (2015)"},{"key":"49_CR7","first-page":"60","volume":"2","author":"N Aston","year":"2014","unstructured":"Aston, N., Munson, T., Liddle, J., et al.: Sentiment analysis on the social networks using stream algorithms. J. Data Anal. Inf. Process. 2, 60 (2014)","journal-title":"J. Data Anal. Inf. Process."},{"key":"49_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1007\/978-3-319-47880-7_14","volume-title":"Social Informatics","author":"M Hasan","year":"2016","unstructured":"Hasan, M., Orgun, M.A., Schwitter, R.: TwitterNews+: a framework for real time event detection from the twitter data stream. In: Spiro, E., Ahn, Y.-Y. (eds.) SocInfo 2016. LNCS, vol. 10046, pp. 224\u2013239. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47880-7_14"},{"issue":"3","key":"49_CR9","first-page":"447","volume":"55","author":"M Wan","year":"2018","unstructured":"Wan, M., Yao, J., Jing, Y., Jin, X.: Event-based anomaly detection for non-public industrial communication protocols in SDN-based control systems. CMC: Comput. Mater. Continua 55(3), 447\u2013463 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"key":"49_CR10","doi-asserted-by":"crossref","unstructured":"Popescu, A.M., Pennacchiotti, M.: Detecting controversial events from twitter. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management, pp. 1873\u20131876. ACM (2010)","DOI":"10.1145\/1871437.1871751"},{"issue":"7","key":"49_CR11","doi-asserted-by":"publisher","first-page":"1576","DOI":"10.1002\/asi.23465","volume":"67","author":"G Paltoglou","year":"2016","unstructured":"Paltoglou, G.: Sentiment-based event detection in Twitter. J. Assoc. Inf. Sci. Technol. 67(7), 1576\u20131587 (2016)","journal-title":"J. Assoc. Inf. Sci. Technol."},{"key":"49_CR12","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1140.001.0001","volume-title":"Affective Computing","author":"RW Picard","year":"1997","unstructured":"Picard, R.W., Picard, R.: Affective Computing. MIT Press, Cambridge (1997)"},{"issue":"2","key":"49_CR13","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1109\/MIS.2016.31","volume":"31","author":"E Cambria","year":"2016","unstructured":"Cambria, E.: Affective computing and sentiment analysis. IEEE Intell. Syst. 31(2), 102\u2013107 (2016)","journal-title":"IEEE Intell. Syst."},{"key":"49_CR14","unstructured":"Kolchyna, O., Souza, T.T.P., Treleaven, P., et al.: Twitter sentiment analysis: Lexicon method, machine learning method and their combination. arXiv preprint arXiv:1507.00955 (2015)"},{"key":"49_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-319-18117-2_4","volume-title":"Computational Linguistics and Intelligent Text Processing","author":"P Chikersal","year":"2015","unstructured":"Chikersal, P., Poria, S., Cambria, E., Gelbukh, A., Siong, C.E.: Modelling public sentiment in twitter: using linguistic patterns to enhance supervised learning. In: Gelbukh, A. (ed.) CICLing 2015. LNCS, vol. 9042, pp. 49\u201365. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18117-2_4"},{"issue":"1","key":"49_CR16","doi-asserted-by":"crossref","first-page":"25","DOI":"10.32604\/cmc.2018.02408","volume":"57","author":"R Wang","year":"2018","unstructured":"Wang, R., Shen, M., Li, Y., Gomes, S.: Multi-task joint sparse representation classification based on fisher discrimination dictionary learning. CMC: Comput. Mater. Continua 57(1), 25\u201348 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"issue":"4","key":"49_CR17","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/s12559-014-9316-6","volume":"7","author":"B Agarwal","year":"2015","unstructured":"Agarwal, B., Poria, S., Mittal, N., et al.: Concept-level sentiment analysis with dependency-based semantic parsing: a novel approach. Cogn. Comput. 7(4), 487\u2013499 (2015)","journal-title":"Cogn. Comput."},{"issue":"5","key":"49_CR18","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/j.csi.2012.10.005","volume":"35","author":"L Caro Di","year":"2013","unstructured":"Di Caro, L., Grella, M.: Sentiment analysis via dependency parsing. Comput. Stand. Interfaces 35(5), 442\u2013453 (2013)","journal-title":"Comput. Stand. Interfaces"},{"issue":"1","key":"49_CR19","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.ipm.2015.01.005","volume":"52","author":"H Saif","year":"2016","unstructured":"Saif, H., He, Y., Fernandez, M., et al.: Contextual semantics for sentiment analysis of Twitter. Inf. Process. Manag. 52(1), 5\u201319 (2016)","journal-title":"Inf. Process. Manag."},{"key":"49_CR20","unstructured":"Che, W., Li, Z., Liu, T.: LTP: a Chinese language technology platform. In: Proceedings of the 23rd International Conference on Computational Linguistics: Demonstrations. Association for Computational Linguistics, pp. 13\u201316 (2010)"},{"key":"49_CR21","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s12559-017-9470-8","volume":"9","author":"H Peng","year":"2017","unstructured":"Peng, H., Cambria, E., Hussain, A.: A review of sentiment analysis research in chinese language. Cogn. Comput. 9, 423\u2013435 (2017)","journal-title":"Cogn. Comput."},{"key":"49_CR22","doi-asserted-by":"crossref","unstructured":"Cai, N., Wei, S., Wang, F., et al.: A survey on stream distributed computing. In: 2015 8th International Conference on Intelligent Networks and Intelligent Systems (ICINIS), pp. 94\u201397. IEEE (2015)","DOI":"10.1109\/ICINIS.2015.44"},{"key":"49_CR23","unstructured":"Liao, X., Gao, Z., Ji, W., et al.: An enforcement of real time scheduling in Spark Streaming. In: 2015 Sixth International Green Computing Conference and Sustainable Computing Conference (IGSC), pp. 1\u20136. IEEE (2015)"},{"key":"49_CR24","doi-asserted-by":"crossref","unstructured":"Chintapalli, S., Dagit, D., Evans, B., et al.: Benchmarking streaming computation engines: storm, flink and spark streaming. In: 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, pp. 1789\u20131792. IEEE (2016)","DOI":"10.1109\/IPDPSW.2016.138"},{"key":"49_CR25","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/978-3-319-39345-2_3","volume-title":"Intelligent Interactive Multimedia Systems and Services 2016","author":"E Cipolla","year":"2016","unstructured":"Cipolla, E., Vella, F.: Data dictionary extraction for robust emergency detection. In: De Pietro, G., Gallo, L., Howlett, R.J., Jain, L.C. (eds.) Intelligent Interactive Multimedia Systems and Services 2016. SIST, vol. 55, pp. 25\u201337. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-39345-2_3"},{"issue":"1","key":"49_CR26","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1016\/j.ipm.2016.09.002","volume":"53","author":"F Laylavi","year":"2017","unstructured":"Laylavi, F., Rajabifard, A., Kalantari, M.: Event relatedness assessment of Twitter messages for emergency response. Inf. Process. Manag. 53(1), 266\u2013280 (2017)","journal-title":"Inf. Process. Manag."},{"issue":"8","key":"49_CR27","doi-asserted-by":"publisher","first-page":"2216","DOI":"10.1109\/TKDE.2016.2556661","volume":"28","author":"W Xie","year":"2016","unstructured":"Xie, W., Zhu, F., Jiang, J., et al.: Topicsketch: real-time bursty topic detection from twitter. IEEE Trans. Knowl. Data Eng. 28(8), 2216\u20132229 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"49_CR28","unstructured":"Raheja, V., Chopra, N.: System and method for real time text streaming: U. S. Patent 9, 535, 891[P], 3 January 2017"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,21]],"date-time":"2024-07-21T04:09:54Z","timestamp":1721534994000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}