Automatic tagging by leveraging visual and annotated features in social media

2021 ◽  
pp. 1-1
Author(s):  
Jinpeng Chen ◽  
Pinguang Ying ◽  
Xiangling Fu ◽  
Xiaopeng Luo ◽  
Hao Guan ◽  
...  
IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 75556-75567 ◽  
Author(s):  
Lihong Tang ◽  
Wanlun Ma ◽  
Marthie Grobler ◽  
Weizhi Meng ◽  
Yu Wang ◽  
...  

2019 ◽  
Vol 2 ◽  
pp. 1-6 ◽  
Author(s):  
Xiao Huang ◽  
Cuizhen Wang ◽  
Zhenlong Li

<p><strong>Abstract.</strong> Recent years have seen the growth of popularity in social media, especially in social media based disaster studies. During a flood event, volunteers may contribute useful information regarding the extent and the severity of a flood in a real-time manner, largely facilitating the process of rapid inundation mapping. However, considering that ontopic (flood related) social media only comprises a small amount in the entire social media space, a robust extraction method is in great need. Taking Twitter as targeted social media platform, this study presents a visual-textual approach to automatic tagging flood related tweets in order to achieve real-time flood mapping. Two convolutional neural networks are adopted to process pictures and text separately. Their outputs are further combined and fed to a visual-textual fused classifier. The result suggests that additional visual information from pictures leads to better classification accuracy and the extracted tweets, representing timely documentation of flood event, can greatly benefit a variety of flood mitigation approaches.</p>


Author(s):  
Aleena Varghese

On friendly stages like Facebook, it is well known and pleasurable to share photographs among companions, yet it likewise places different members in a similar picture in peril when the photographs are delivered online without the consent from them. To tackle this issue, as of late, the analysts have planned some fine-grained admittance control systems for photographs shared on the social stage. The uploader will label every member in the photograph, then, at that point they will get inward messages and arrange their own security control procedures. These techniques ensure their protection in photographs by obscuring out the essences of members. Notwithstanding, there is still some deformity in these procedures because of the capricious labeling practices of the uploader. Noxious clients can without much of a stretch control unapproved labeling cycles and afterward distribute the photographs, which the members need them to be classified in online media.


ASHA Leader ◽  
2015 ◽  
Vol 20 (7) ◽  
Author(s):  
Vicki Clarke
Keyword(s):  

ASHA Leader ◽  
2013 ◽  
Vol 18 (5) ◽  

As professionals who recognize and value the power and important of communications, audiologists and speech-language pathologists are perfectly positioned to leverage social media for public relations.


2013 ◽  
Vol 44 (1) ◽  
pp. 4
Author(s):  
Jane Anderson
Keyword(s):  

2011 ◽  
Vol 44 (7) ◽  
pp. 75
Author(s):  
SALLY KOCH KUBETIN
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document