Complex Networks XI by Unknown
Author:Unknown
Language: eng
Format: epub
ISBN: 9783030409432
Publisher: Springer International Publishing
Fig. 1.Collective efficacy map of Columbus, Ohio
In the equation above, indicates the number of reports for neighborhood . indicates number of items responded in report j. We normalize the scores in range of 0 to 1 and use it as the ground truth for our study. This methodology is aligned with the traditional measurement approach employed to compute collective efficacy at neighborhood level [21–23]. Note that while we adopt a similar ground truth model [23], we lever survey reports from individuals who both reside within and frequently visit a particular neighborhood. Concomitantly, the social media postings included in our study includes postings from both individuals that reside within and frequently visit a particular neighborhood. In order to increase the reliability of the aggregation we only include the neighborhoods having at least 5 reports. Figure 1 shows a collective efficacy map of Columbus.
Twitter Data: To capture the informal language of local citizenry focused on local venues and localities, more than 50 million publicly available tweets were collected from the accounts of 54k Twitter users who identified their location as Columbus. These users were identified through Snowball sampling [24]. We excluded the tweets that did not contain a mention of locations within our study area. For doing so, we used a publicly available location name extractor LNEx [25]. LNEx extracts location entries from tweets, handles abbreviations, tackles appellation formation and metonomy pose disambiguation problems given a gazetteer and the region information. Open Street Map gazetteer was used and region was set to Columbus. In some cases locations extracted by LNEx are ambiguous. In our study, we exclude tweets containing ambiguous location entities. This pruning step resulted in 4846 unique locations that were spotted in 545k tweets and were mapped to 424 neighborhoods. For more details on our data collection and pruning steps see Appendix A.1 of the supplementary material.2
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Exploring Deepfakes by Bryan Lyon and Matt Tora(7532)
Robo-Advisor with Python by Aki Ranin(7410)
Offensive Shellcode from Scratch by Rishalin Pillay(5999)
Ego Is the Enemy by Ryan Holiday(4910)
Microsoft 365 and SharePoint Online Cookbook by Gaurav Mahajan Sudeep Ghatak Nate Chamberlain Scott Brewster(4808)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4426)
Python for ArcGIS Pro by Silas Toms Bill Parker(4072)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(3778)
Machine Learning at Scale with H2O by Gregory Keys | David Whiting(3495)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(3270)
Speed Up Your Python with Rust by Maxwell Flitton(3223)
Liar's Poker by Michael Lewis(3200)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(3185)
Extreme DAX by Michiel Rozema & Henk Vlootman(3160)
Agile Security Operations by Hinne Hettema(3111)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(3103)
Essential Cryptography for JavaScript Developers by Alessandro Segala(3075)
Cryptography Algorithms by Massimo Bertaccini(2994)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2972)
