{"id":"https://openalex.org/W3197563512","doi":"https://doi.org/10.1109/iccta35431.2014.9521646","title":"Visualizing Demographics Based on Micro-blogger Tracking: Twitter Case Study","display_name":"Visualizing Demographics Based on Micro-blogger Tracking: Twitter Case Study","publication_year":2014,"publication_date":"2014-10-25","ids":{"openalex":"https://openalex.org/W3197563512","doi":"https://doi.org/10.1109/iccta35431.2014.9521646","mag":"3197563512"},"language":"en","primary_location":{"id":"doi:10.1109/iccta35431.2014.9521646","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccta35431.2014.9521646","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100618066","display_name":"Ahmed Khaled","orcid":"https://orcid.org/0000-0002-6899-588X"},"institutions":[{"id":"https://openalex.org/I145487455","display_name":"Cairo University","ror":"https://ror.org/03q21mh05","country_code":"EG","type":"education","lineage":["https://openalex.org/I145487455"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Khaled Ahmed","raw_affiliation_strings":["Faculty of Computers and Information, Cairo University, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Computers and Information, Cairo University, Egypt","institution_ids":["https://openalex.org/I145487455"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032434354","display_name":"Neamat El-Tazi","orcid":"https://orcid.org/0000-0003-0690-4273"},"institutions":[{"id":"https://openalex.org/I145487455","display_name":"Cairo University","ror":"https://ror.org/03q21mh05","country_code":"EG","type":"education","lineage":["https://openalex.org/I145487455"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Neamat El Tazi","raw_affiliation_strings":["Faculty of Computers and Information, Cairo University, Egypt"],"affiliations":[{"raw_affiliation_string":"Faculty of Computers and Information, Cairo University, Egypt","institution_ids":["https://openalex.org/I145487455"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5069924021","display_name":"Ahmad Hany Hossny","orcid":"https://orcid.org/0000-0002-5178-9211"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Ahmad Hossny","raw_affiliation_strings":["Centre for Intelligent Systems Research, Deakin University, Australia"],"affiliations":[{"raw_affiliation_string":"Centre for Intelligent Systems Research, Deakin University, Australia","institution_ids":["https://openalex.org/I149704539"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100618066"],"corresponding_institution_ids":["https://openalex.org/I145487455"],"apc_list":null,"apc_paid":null,"fwci":0.469,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.68293659,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"78","last_page":"81"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9832000136375427,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11891","display_name":"Big Data and Business Intelligence","score":0.9824000000953674,"subfield":{"id":"https://openalex.org/subfields/1404","display_name":"Management Information Systems"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.9811000227928162,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7814920544624329},{"id":"https://openalex.org/keywords/demographics","display_name":"Demographics","score":0.7390238046646118},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.7302879691123962},{"id":"https://openalex.org/keywords/big-data","display_name":"Big data","score":0.6925566792488098},{"id":"https://openalex.org/keywords/data-stream-mining","display_name":"Data stream mining","score":0.5635834336280823},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.5601619482040405},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.5595048666000366},{"id":"https://openalex.org/keywords/unstructured-data","display_name":"Unstructured data","score":0.5325535535812378},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.3628380298614502},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3449876010417938},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.11821362376213074}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7814920544624329},{"id":"https://openalex.org/C2780084366","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demographics","level":2,"score":0.7390238046646118},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.7302879691123962},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.6925566792488098},{"id":"https://openalex.org/C89198739","wikidata":"https://www.wikidata.org/wiki/Q3079880","display_name":"Data stream mining","level":2,"score":0.5635834336280823},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.5601619482040405},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.5595048666000366},{"id":"https://openalex.org/C2781252014","wikidata":"https://www.wikidata.org/wiki/Q1141900","display_name":"Unstructured data","level":3,"score":0.5325535535812378},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3628380298614502},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3449876010417938},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.11821362376213074},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C149923435","wikidata":"https://www.wikidata.org/wiki/Q37732","display_name":"Demography","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccta35431.2014.9521646","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccta35431.2014.9521646","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2014 24th International Conference on Computer Theory and Applications (ICCTA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1975428268","https://openalex.org/W1976948655","https://openalex.org/W1993892970","https://openalex.org/W2006667654","https://openalex.org/W2028993035","https://openalex.org/W2037625889","https://openalex.org/W2038037701","https://openalex.org/W2086117107","https://openalex.org/W2092074862","https://openalex.org/W2092577289","https://openalex.org/W2102840489","https://openalex.org/W2103794133","https://openalex.org/W2109574129","https://openalex.org/W2168681504","https://openalex.org/W4234502490"],"related_works":["https://openalex.org/W3121380072","https://openalex.org/W3157828377","https://openalex.org/W2908411463","https://openalex.org/W2468296273","https://openalex.org/W4377992839","https://openalex.org/W2937168573","https://openalex.org/W2261525379","https://openalex.org/W2805468299","https://openalex.org/W4231652189","https://openalex.org/W2608358066"],"abstract_inverted_index":{"Social":[0],"media":[1,25],"contains":[2],"a":[3,52,87],"lot":[4],"of":[5,12,30,61,113],"useful":[6],"information":[7],"that":[8,117],"express":[9],"different":[10],"aspects":[11],"the":[13,27,31,45,59,65,75,110],"society":[14],"using":[15,64],"unstructured":[16,115],"and":[17,48,57,106],"temporal":[18],"data.":[19],"The":[20,97],"main":[21],"challenge":[22],"with":[23,81],"social":[24],"is":[26,118],"huge":[28,38,41,111],"amount":[29,112],"data":[32,39,68,94,102,116],"streams":[33,69],"to":[34,54,77,108],"be":[35],"processed.":[36],"Such":[37],"requires":[40],"processing":[42],"capabilities,":[43],"including":[44,104],"power,":[46],"time":[47],"cost.This":[49],"research":[50],"presents":[51],"framework":[53,99],"extract,":[55],"analyze":[56,109],"visualize":[58,123],"demographics":[60],"any":[62],"country":[63,89],"micro":[66],"blogger":[67],"such":[70],"as":[71,90,92,125],"twitter.":[72],"This":[73],"increases":[74],"ability":[76],"search":[78],"for":[79,86],"topics":[80],"hash":[82],"tags":[83],"per":[84],"city":[85],"specific":[88],"well":[91],"applying":[93],"mining":[95],"techniques.":[96],"proposed":[98],"uses":[100],"big":[101],"tools":[103],"Hadoop":[105],"Hive":[107],"textual":[114],"extracted":[119],"from":[120],"twitter":[121],"then":[122],"it":[124],"needed.":[126]},"counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
