Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Machine learning

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 961 - 990 of 1689

Full-Text Articles in Physical Sciences and Mathematics

Does Applying Deep Learning In Financial Sentiment Analysis Lead To Better Classification Performance?, Tao Wang, Changhe Yuan, Cuiyuan Wang Apr 2020

Does Applying Deep Learning In Financial Sentiment Analysis Lead To Better Classification Performance?, Tao Wang, Changhe Yuan, Cuiyuan Wang

Publications and Research

Using a unique data set from Seeking Alpha, we compare the deep learning approach with traditional machine learning approaches in classifying financial text. We apply the long short-term memory (LSTM) as the deep learning method and Naive Bayes, SVM, Logistic Regression, XGBoost as the traditional machine learning approaches. The results suggest that the LSTM model outperforms the conventional machine learning methods on all metrics. Based on the tSNE graph, the success of the LSTM model is partially explained as the high-accuracy LSTM model distinguishes between positive and negative important sentiment words while those words are chosen based on SHAP values …


Applications Of Machine Learning To Threat Intelligence, Intrusion Detection And Malware, Charity Barker Apr 2020

Applications Of Machine Learning To Threat Intelligence, Intrusion Detection And Malware, Charity Barker

Senior Honors Theses

Artificial Intelligence (AI) and Machine Learning (ML) are emerging technologies with applications to many fields. This paper is a survey of use cases of ML for threat intelligence, intrusion detection, and malware analysis and detection. Threat intelligence, especially attack attribution, can benefit from the use of ML classification. False positives from rule-based intrusion detection systems can be reduced with the use of ML models. Malware analysis and classification can be made easier by developing ML frameworks to distill similarities between the malicious programs. Adversarial machine learning will also be discussed, because while ML can be used to solve problems or …


Truck Trailer Classification Using Side-Fire Light Detection And Ranging (Lidar) Data, Olcay Sahin Apr 2020

Truck Trailer Classification Using Side-Fire Light Detection And Ranging (Lidar) Data, Olcay Sahin

Civil & Environmental Engineering Theses & Dissertations

Classification of vehicles into distinct groups is critical for many applications, including freight and commodity flow modeling, pavement management and design, tolling, air quality monitoring, and intelligent transportation systems. The Federal Highway Administration (FHWA) developed a standardized 13-category vehicle classification ruleset, which meets the needs of many traffic data user applications. However, some applications need high-resolution data for modeling and analysis. For example, the type of commodity being carried must be known in the freight modeling framework. Unfortunately, this information is not available at the state or metropolitan level, or it is expensive to obtain from current resources.

Nevertheless, using …


High Performance And Machine Learning Algorithms For Brain Fmri Data, Taban Eslami Apr 2020

High Performance And Machine Learning Algorithms For Brain Fmri Data, Taban Eslami

Dissertations

Brain disorders are very difficult to diagnose for reasons such as overlapping nature of symptoms, individual differences in brain structure, lack of medical tests and unknown causes of some disorders. The current psychiatric diagnostic process is based on behavioral observation and may be prone to misdiagnosis.

Noninvasive brain imaging technologies such as Magnetic Resonance Imaging (MRI) and functional Magnetic Resonance Imaging (fMRI) make the process of understanding the structure and function of the brain easier. Quantitative analysis of brain imaging data using machine learning and data mining techniques can be advantageous not only to increase the accuracy of brain disorder …


Event-Based Visual-Inertial Odometry Using Smart Features, Zachary P. Friedel Mar 2020

Event-Based Visual-Inertial Odometry Using Smart Features, Zachary P. Friedel

Theses and Dissertations

Event-based cameras are a novel type of visual sensor that operate under a unique paradigm, providing asynchronous data on the log-level changes in light intensity for individual pixels. This hardware-level approach to change detection allows these cameras to achieve ultra-wide dynamic range and high temporal resolution. Furthermore, the advent of convolutional neural networks (CNNs) has led to state-of-the-art navigation solutions that now rival or even surpass human engineered algorithms. The advantages offered by event cameras and CNNs make them excellent tools for visual odometry (VO). This document presents the implementation of a CNN trained to detect and describe features within …


Retiming Smoke Simulation Using Machine Learning, Samuel Charles Gérard Giraud Carrier Mar 2020

Retiming Smoke Simulation Using Machine Learning, Samuel Charles Gérard Giraud Carrier

Theses and Dissertations

Art-directability is a crucial aspect of creating aesthetically pleasing visual effects that help tell stories. A particularly common method of art direction is the retiming of a simulation. Unfortunately, the means of retiming an existing simulation sequence which preserves the desired shapes is an ill-defined problem. Naively interpolating values between frames leads to visual artifacts such as choppy frames or jittering intensities. Due to the difficulty in formulating a proper interpolation method we elect to use a machine learning approach to approximate this function. Our model is based on the ODE-net structure and reproduces a set of desired time samples …


Treatment Effects Of Modafinil For Cocaine Use Disorders: A Retrospective Analysis Of Aggregated Clinical Trial Data From Three Cocaine Treatment Studies, Daniel Ruskin Mar 2020

Treatment Effects Of Modafinil For Cocaine Use Disorders: A Retrospective Analysis Of Aggregated Clinical Trial Data From Three Cocaine Treatment Studies, Daniel Ruskin

Honors Scholar Theses

Approximately 913,000 individuals in the United States meet the diagnostic criteria for cocaine use disorder (CUD). The widespread usage of cocaine, along with the negative cardiac and neurological effects associated with the drug, has made cocaine one of the top three drugs associated with overdose deaths in the United States. This epidemic has brought cocaine dependency into the public spotlight and has prompted extensive research into treatment strategies. However, at the time of writing, no drugs have been approved by the United States Food and Drug Administration (FDA) for use in treating CUD. The purpose of this study is to …


Graph Classification With Kernels, Embeddings And Convolutional Neural Networks, Monica Golahalli Seenappa, Katerina Potika, Petros Potikas Mar 2020

Graph Classification With Kernels, Embeddings And Convolutional Neural Networks, Monica Golahalli Seenappa, Katerina Potika, Petros Potikas

Faculty Publications, Computer Science

In the graph classification problem, given is a family of graphs and a group of different categories, and we aim to classify all the graphs (of the family) into the given categories. Earlier approaches, such as graph kernels and graph embedding techniques have focused on extracting certain features by processing the entire graph. However, real world graphs are complex and noisy and these traditional approaches are computationally intensive. With the introduction of the deep learning framework, there have been numerous attempts to create more efficient classification approaches. We modify a kernel graph convolutional neural network approach, that extracts subgraphs (patches) …


Data Mining Of Chinese Social Networks: Factors That Indicate Post Deletion, Meisam Navaki Arefi Mar 2020

Data Mining Of Chinese Social Networks: Factors That Indicate Post Deletion, Meisam Navaki Arefi

Computer Science ETDs

Widespread Chinese social media applications such as Sina Weibo (Chinese Twitter), the most popular social network in China, are widely known for monitoring and deleting posts to conform to Chinese government requirements. Censorship of Chinese social media is a complex process that involves many factors. There are multiple stakeholders and many different interests: economic, political, legal, personal, etc., which means that there is not a single strategy dictated by a single government authority. Moreover, sometimes Chinese social media do not follow the directives of government, out of concern that they are more strictly censoring than their competitors.

One crucial question …


Using Logical Specifications For Multi-Objective Reinforcement Learning, Kolby Nottingham Mar 2020

Using Logical Specifications For Multi-Objective Reinforcement Learning, Kolby Nottingham

Undergraduate Honors Theses

In the multi-objective reinforcement learning (MORL) paradigm, the relative importance of environment objectives is often unknown prior to training, so agents must learn to specialize their behavior to optimize different combinations of environment objectives that are specified post-training. These are typically linear combinations, so the agent is effectively parameterized by a weight vector that describes how to balance competing environment objectives. However, we show that behaviors can be successfully specified and learned by much more expressive non-linear logical specifications. We test our agent in several environments with various objectives and show that it can generalize to many never-before-seen specifications.


Machine Learning For Effective Parkinson's Disease Diagnosis, Brennon Brimhall Mar 2020

Machine Learning For Effective Parkinson's Disease Diagnosis, Brennon Brimhall

Undergraduate Honors Theses

Parkinson’s Disease is a degenerative neurological condition that affects approximately 10 million people globally. Because there is currently no cure, there is a strong motivation for research into improved and automated diagnostic procedures. Using Random Forests, a computer can effectively learn to diagnose Parkinson’s disease in a patient with high accuracy (94%), precision (95%), and recall (91%) across the data of over 2800 patients. Using similar techniques, I further determine that the most predictive medical tests relate to tremors observed in patients.


Quantitative Analysis Of Evaluation Criteria For Generative Models, Marvin W. Newlin Mar 2020

Quantitative Analysis Of Evaluation Criteria For Generative Models, Marvin W. Newlin

Theses and Dissertations

Machine Learning (ML) is rapidly becoming integrated in critical aspects of cybersecurity today, particularly in the area of network intrusion/anomaly detection. However, ML techniques require large volumes of data to be effective. The available data is a critical aspect of the ML process for training, classification, and testing purposes. One solution to the problem is to generate synthetic data that is realistic. With the application of ML to this area, one promising application is the use of ML to perform the data generation. With the ability to generate synthetic data comes the need to evaluate the “realness” of the generated …


Algorithm Selection Framework: A Holistic Approach To The Algorithm Selection Problem, Marc W. Chalé Mar 2020

Algorithm Selection Framework: A Holistic Approach To The Algorithm Selection Problem, Marc W. Chalé

Theses and Dissertations

A holistic approach to the algorithm selection problem is presented. The “algorithm selection framework" uses a combination of user input and meta-data to streamline the algorithm selection for any data analysis task. The framework removes the conjecture of the common trial and error strategy and generates a preference ranked list of recommended analysis techniques. The framework is performed on nine analysis problems. Each of the recommended analysis techniques are implemented on the corresponding data sets. Algorithm performance is assessed using the primary metric of recall and the secondary metric of run time. In six of the problems, the recall of …


Automated Detection And Mitigation Of Inefficient Visual Searching Using Electroencephalography And Machine Learning, Joshua P. Gallaher Mar 2020

Automated Detection And Mitigation Of Inefficient Visual Searching Using Electroencephalography And Machine Learning, Joshua P. Gallaher

Theses and Dissertations

Decisions made during the high-stress and fast-paced operations of the military are extremely prone to cognitive biases. A commonly known cognitive bias is a confirmation bias, or the inappropriate bolstering of an unknown hypothesis. One such critical military operation that can fall prey to a confirmation bias is a visual search. During a visual search, a military operator must perform a visual scan of an environment for a specific target. However, the visual search process can fall prey to the same confirmation bias which can cause inefficient searches. This study elicits inefficient visual search patterns and applies various mitigation techniques …


Characterizing Regime-Based Flow Uncertainty, John L. Fioretti Mar 2020

Characterizing Regime-Based Flow Uncertainty, John L. Fioretti

Theses and Dissertations

The goal of this work is to develop a regime-based quantification of horizontal wind field uncertainty utilizing a global ensemble numerical weather prediction model. In this case, the Global Ensemble Forecast System Reforecast (GEFSR) data is utilized. The machine learning algorithm that is employed is the mini-batch K-means clustering algorithm. 850 hPa Horizontal flow fields are clustered and the forecast uncertainty in these flow fields is calculated for different forecast times for regions across the globe. This provides end-users quantified flow-based forecast uncertainty.


A Machine Learning Approach To Characterizing Particle Morphology In Nuclear Forensics, Daniel A. Gum Mar 2020

A Machine Learning Approach To Characterizing Particle Morphology In Nuclear Forensics, Daniel A. Gum

Theses and Dissertations

A machine learning approach is taken to characterizing a group of synthetic uranium bearing particles. SEM images of these lab-created particles were converted into a binary representation that captured morphological features in accordance with a guide established by Los Alamos National Laboratory. Each particle in the dataset contains an association with chemical creation conditions: processing method, precipitation temperature and pH, calcination temperature are most closely tied to particle morphology. Additionally, trained classifiers are able to relate final products between particles, implying that morphological features are shared between particles with similar composition.


Artificial Intelligence: A New Paradigm In Obstetrics And Gynecology Research And Clinical Practice, Pulwasha Iftikhar, Marcela V. Kuijpers, Azadeh Khayyat, Aqsa Iftikhar, Maribel Degouvia De Sa Feb 2020

Artificial Intelligence: A New Paradigm In Obstetrics And Gynecology Research And Clinical Practice, Pulwasha Iftikhar, Marcela V. Kuijpers, Azadeh Khayyat, Aqsa Iftikhar, Maribel Degouvia De Sa

Publications and Research

Artificial intelligence (AI) is growing exponentially in various fields, including medicine. This paper reviews the pertinent aspects of AI in obstetrics and gynecology (OB/GYN) and how these can be applied to improve patient outcomes and reduce the healthcare costs and workload for clinicians.

Herein, we will address current AI uses in OB/GYN, and the use of AI as a tool to interpret fetal heart rate (FHR) and cardiotocography (CTG) to aid in the detection of preterm labor, pregnancy complications, and review discrepancies in its interpretation between clinicians to reduce maternal and infant morbidity and mortality. AI systems can be used …


Dictionary Learning For Image Reconstruction Via Numerical Non-Convex Optimization Methods, Lewis M. Hicks Feb 2020

Dictionary Learning For Image Reconstruction Via Numerical Non-Convex Optimization Methods, Lewis M. Hicks

University Honors Theses

This thesis explores image dictionary learning via non-convex (difference of convex, DC) programming and its applications to image reconstruction. First, the image reconstruction problem is detailed and solutions are presented. Each such solution requires an image dictionary to be specified directly or to be learned via non-convex programming. The solutions explored are the DCA (DC algorithm) and the boosted DCA. These various forms of dictionary learning are then compared on the basis of both image reconstruction accuracy and number of iterations required to converge.


Machine Learning Predicts Reach-Scale Channel Types From Coarse-Scale Geospatial Data In A Large River Basin, Hervé Guillon, Colin F. Byrne, Belize A. Lane, Samuel Sandoval Solis, Gregory B. Pasternack Feb 2020

Machine Learning Predicts Reach-Scale Channel Types From Coarse-Scale Geospatial Data In A Large River Basin, Hervé Guillon, Colin F. Byrne, Belize A. Lane, Samuel Sandoval Solis, Gregory B. Pasternack

Publications

Hydrologic and geomorphic classifications have gained traction in response to the increasing need for basin-wide water resources management. Regardless of the selected classification scheme, an open scientific challenge is how to extend information from limited field sites to classify tens of thousands to millions of channel reaches across a basin. To address this spatial scaling challenge, this study leverages machine learning to predict reach-scale geomorphic channel types using publicly available geospatial data. A bottom-up machine learning approach selects the most accurate and stable model among∼20,000 combinations of 287 coarse geospatial predictors, preprocessing methods, and algorithms in a three-tiered framework to …


Cyber-Physical Security With Rf Fingerprint Classification Through Distance Measure Extensions Of Generalized Relevance Learning Vector Quantization, Trevor J. Bihl, Todd J. Paciencia, Kenneth W. Bauer Jr., Michael A. Temple Feb 2020

Cyber-Physical Security With Rf Fingerprint Classification Through Distance Measure Extensions Of Generalized Relevance Learning Vector Quantization, Trevor J. Bihl, Todd J. Paciencia, Kenneth W. Bauer Jr., Michael A. Temple

Faculty Publications

Radio frequency (RF) fingerprinting extracts fingerprint features from RF signals to protect against masquerade attacks by enabling reliable authentication of communication devices at the “serial number” level. Facilitating the reliable authentication of communication devices are machine learning (ML) algorithms which find meaningful statistical differences between measured data. The Generalized Relevance Learning Vector Quantization-Improved (GRLVQI) classifier is one ML algorithm which has shown efficacy for RF fingerprinting device discrimination. GRLVQI extends the Learning Vector Quantization (LVQ) family of “winner take all” classifiers that develop prototype vectors (PVs) which represent data. In LVQ algorithms, distances are computed between exemplars and PVs, and …


Monocular Depth Image Mark-Less Pose Estimation Based On Feature Regression, Chen Ying, Shen Li Feb 2020

Monocular Depth Image Mark-Less Pose Estimation Based On Feature Regression, Chen Ying, Shen Li

Journal of System Simulation

Abstract: Monocular camera mark-less pose estimation system suffers low accuracy, robustness and efficiency due to variety of action, self-occlusion of human body. A method of feature exaction from point clouds was proposed, in which a single-to-multiple (S2M) feature regressor and a joint position regressor were designed to quickly and accurately predict the 3D positions of body joints from a single depth image without any temporal information. Experiment result shows that the estimation accuracy is superior to that of state-of-the-arts and multi-camera based methods.


Critical Temperature Prediction Of Superconductors Based On Atomic Vectors And Deep Learning, Shaobo Li, Yabo Dan, Xiang Li, Tiantian Hu, Rongzhi Dong, Zhuo Cao, Jianjun Hu Feb 2020

Critical Temperature Prediction Of Superconductors Based On Atomic Vectors And Deep Learning, Shaobo Li, Yabo Dan, Xiang Li, Tiantian Hu, Rongzhi Dong, Zhuo Cao, Jianjun Hu

Faculty Publications

In this paper, a hybrid neural network (HNN) that combines a convolutional neural network (CNN) and long short-term memory neural network (LSTM) is proposed to extract the high-level characteristics of materials for critical temperature (Tc) prediction of superconductors. Firstly, by obtaining 73,452 inorganic compounds from the Materials Project (MP) database and building an atomic environment matrix, we obtained a vector representation (atomic vector) of 87 atoms by singular value decomposition (SVD) of the atomic environment matrix. Then, the obtained atom vector was used to implement the coded representation of the superconductors in the order of the atoms in the chemical …


Are The Code Snippets What We Are Searching For? A Benchmark And An Empirical Study On Code Search With Natural-Language Queries, Shuhan Yan, Hang Yu, Yuting Chen, Beijun Shen Feb 2020

Are The Code Snippets What We Are Searching For? A Benchmark And An Empirical Study On Code Search With Natural-Language Queries, Shuhan Yan, Hang Yu, Yuting Chen, Beijun Shen

Research Collection School Of Computing and Information Systems

Code search methods, especially those that allow programmers to raise queries in a natural language, plays an important role in software development. It helps to improve programmers' productivity by returning sample code snippets from the Internet and/or source-code repositories for their natural-language queries. Meanwhile, there are many code search methods in the literature that support natural-language queries. Difficulties exist in recognizing the strengths and weaknesses of each method and choosing the right one for different usage scenarios, because (1) the implementations of those methods and the datasets for evaluating them are usually not publicly available, and (2) some methods leverage …


Developing And Improving Risk Models Using Machine-Learning Based Algorithms, Yan Wang, Sherry Ni Jan 2020

Developing And Improving Risk Models Using Machine-Learning Based Algorithms, Yan Wang, Sherry Ni

Published and Grey Literature from PhD Candidates

The objective of this study is to develop a good risk model for classifying business delinquency by simultaneously exploring several machine learning-based methods including regularization, hyperparameter optimization, and model ensembling algorithms. The rationale under the analyses is firstly to obtain good base binary classifiers (include Logistic Regression (LR), K-Nearest Neighbors (KNN ), Decision Tree (DT), and Artificial Neural Networks (ANN )) via regularization and appropriate settings of hyper-parameters. Then two model ensembling algorithms including bagging and boosting are performed on the good base classifiers for further model improvement. The models are evaluated using accuracy, Area Under the Receiver Operating Characteristic …


Harnessing Artificial Intelligence Capabilities To Improve Cybersecurity, Sherali Zeadally, Erwin Adi, Zubair Baig, Imran A. Khan Jan 2020

Harnessing Artificial Intelligence Capabilities To Improve Cybersecurity, Sherali Zeadally, Erwin Adi, Zubair Baig, Imran A. Khan

Information Science Faculty Publications

Cybersecurity is a fast-evolving discipline that is always in the news over the last decade, as the number of threats rises and cybercriminals constantly endeavor to stay a step ahead of law enforcement. Over the years, although the original motives for carrying out cyberattacks largely remain unchanged, cybercriminals have become increasingly sophisticated with their techniques. Traditional cybersecurity solutions are becoming inadequate at detecting and mitigating emerging cyberattacks. Advances in cryptographic and Artificial Intelligence (AI) techniques (in particular, machine learning and deep learning) show promise in enabling cybersecurity experts to counter the ever-evolving threat posed by adversaries. Here, we explore AI's …


Final Presentation To The Library Of Congress On Digital Libraries, Intelligent Data Analytics, And Augmented Description, Elizabeth Lorang, Leen-Kiat Soh, Yi Liu, Chulwoo Pack Jan 2020

Final Presentation To The Library Of Congress On Digital Libraries, Intelligent Data Analytics, And Augmented Description, Elizabeth Lorang, Leen-Kiat Soh, Yi Liu, Chulwoo Pack

University of Nebraska-Lincoln Libraries: Conference Presentations and Speeches

This presentation to Library of Congress staff, delivered onsite on January 10, 2020, presents a tour through the demonstration project pursued by the Aida digital libraries research team with the Library of Congress in 2019-2020. In addition to providing an overview and analysis of the specific machine learning projects scoped and explored, this presentation includes a number of high-level take-aways and recommendations designed to influence and inform the Library of Congress's machine learning efforts going forward.


Digital Libraries, Intelligent Data Analytics, And Augmented Description: A Demonstration Project, Elizabeth Lorang, Leen-Kiat Soh, Yi Liu, Chulwoo Pack Jan 2020

Digital Libraries, Intelligent Data Analytics, And Augmented Description: A Demonstration Project, Elizabeth Lorang, Leen-Kiat Soh, Yi Liu, Chulwoo Pack

UNL Libraries: Faculty Publications

From July 16-to November 8, 2019, the Aida digital libraries research team at the University of Nebraska-Lincoln collaborated with the Library of Congress on “Digital Libraries, Intelligent Data Analytics, and Augmented Description: A Demonstration Project.“ This demonstration project sought to (1) develop and investigate the viability and feasibility of textual and image-based data analytics approaches to support and facilitate discovery; (2) understand technical tools and requirements for the Library of Congress to improve access and discovery of its digital collections; and (3) enable the Library of Congress to plan for future possibilities. In pursuit of these goals, we focused our …


Learning-Guided Network Fuzzing For Testing Cyber-Physical System Defences, Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang Jan 2020

Learning-Guided Network Fuzzing For Testing Cyber-Physical System Defences, Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang

Research Collection School Of Computing and Information Systems

The threat of attack faced by cyber-physical systems (CPSs), especially when they play a critical role in automating public infrastructure, has motivated research into a wide variety of attack defence mechanisms. Assessing their effectiveness is challenging, however, as realistic sets of attacks to test them against are not always available. In this paper, we propose smart fuzzing, an automated, machine learning guided technique for systematically finding 'test suites' of CPS network attacks, without requiring any knowledge of the system's control programs or physical processes. Our approach uses predictive machine learning models and metaheuristic search algorithms to guide the fuzzing of …


Gradient Boosting For Survival Analysis With Applications In Oncology, Nam Phuong Nguyen Jan 2020

Gradient Boosting For Survival Analysis With Applications In Oncology, Nam Phuong Nguyen

USF Tampa Graduate Theses and Dissertations

Cancer is one of the most deadly diseases that the world has been fighting against over decades. An enormous number of research has been conducted, via a wide scale of approaches, raging from genetic analysis to mathematical modeling. Survival analysis is a well-performed methodology frequently used to estimate the survival probability of a patient. Although there has been a large number of methods for survival analysis, efficient exploration of a high-dimensional feature space has been challenging due to its computational cost and complexity. This thesis adapts the component-wise gradient boosting algorithms for cancer survival analysis, and also proposes a new …


Multi-Class Twitter Data Categorization And Geocoding With A Novel Computing Framework, Sakib Mahmud Khan, Mashrur Chowdhury, Linh B. Ngo, Amy Apon Jan 2020

Multi-Class Twitter Data Categorization And Geocoding With A Novel Computing Framework, Sakib Mahmud Khan, Mashrur Chowdhury, Linh B. Ngo, Amy Apon

Computer Science Faculty Publications

This study details the progress in transportation data analysis with a novel computing framework in keeping with the continuous evolution of the computing technology. The computing framework combines the Labeled Latent Dirichlet Allocation (L-LDA)-incorporated Support Vector Machine (SVM) classifier with the supporting computing strategy on publicly available Twitter data in determining transportation-related events to provide reliable information to travelers. The analytical approach includes analyzing tweets using text classification and geocoding locations based on string similarity. A case study conducted for the New York City and its surrounding areas demonstrates the feasibility of the analytical approach. Approximately 700,010 tweets are analyzed …