Computer Science ›› 2019, Vol. 46 ›› Issue (8): 42-49.doi: 10.11896/j.issn.1002-137X.2019.08.007

• Big Data & Data Science • Previous Articles     Next Articles

Spatio-Temporal Evolution of Geographical Topics

SUN Guo-dao, ZHOU Zhi-xiu, LI Si, LIU Yi-peng, LIANG Rong-hua   

  1. (College of Information Engineering,Zhejiang University of Technology,Hangzhou 310023,China)
  • Received:2018-11-26 Online:2019-08-15 Published:2019-08-15

Abstract: The tweets posted by users in social media record a wide variety of user information.The text information includes various topics contained in the tweet.It is very important to analyze the temporal and spatial evolution of topics from these messages.Based on the tweet data,this paper designed a set of visual analysis process to mine the tweet information and display the spatiotemporal evolution process of the tweet topic through user interaction.Specifically,based on the partial historical tweet data,the global geographic space is divided by the DBSCAN clustering algorithm combined with the Tyson polygon.For the user to query the search topic of interest,the index finds all relevant tweet content and binds the information to the cluster center.Finally,the temporal and spatial evolution of the topic is demonstrated by the design of multiple combined time series clustering algorithms and visualization components of the adaptive algorithm.Through the experiment and analysis of the tweet data stored in the API provided by Twitter official website,the improved visual view adaptive layout algorithm effectively solves the problem of graphic occlusion and fully displays the temporal and spatial evolution mode of the tweet.The division of geographic regions and visualization components can effectively help researchers analyze the temporal and spatial evolution of tweets,as well as the distribution of hot topics of global concern

Key words: Tweet topic, Visual analysis process, Adaptive layout algorithm, Clustering, Spatio-Temporal evolution

CLC Number: 

  • TP391
[1] DWYER N,MARSH S.What can the hashtag #trust tell us about how users conceptualise trust?[C]∥Twelfth InternationalConference on Privacy,Security and Trust.New York:IEEE Press,2014:398-402.
[2] ZAPPAVIGNA M.Discourse of Twitter and social media:How we use language to create affiliation on the web[M].A&C Black,2012.
[3] IVANOVA M.Understanding microblogging hashtags for learning enhancement[J].Form,2013,11(74):17-23.
[4] HUBERMAN B A,ROMERO D M,WU F.Social networks that matter:Twitter under the microscope[J].arXiv:0812.1045,2008.
[5] KWAK H,LEE C,PARK H,et al.What is Twitter,a social network or a news media?[C]∥Proceedings of the 19th International Conference on World Wide Web.New York:ACM Press,2010:591-600.
[6] YANG J,LESKOVEC J.Modeling information diffusion in implicit networks[C]∥IEEE 10th International Conference on Data Mining (ICDM),2010.New York:IEEE Press,2010:599-608.
[7] LERMAN K,GHOSH R.Information contagion:An empirical study of the spread of news on Digg and Twitter social networks[C]∥Proceedings of 4th International Conference on Weblogs and Social Media (ICWSM ).Menlo Park,CA:AAAI Press,2010:90-97.
[8] ROMERO D M,MEEDER B,KLEINBERG J.Differences in the mechanics of information diffusion across topics:idioms,political hashtags,and complex contagion on twitter[C]∥Proceedings of the 20th International Conference on World Wide Web.New York:ACM Press,2011:695-704.
[9] CUNHA E,MAGNO G,COMARELA G,et al.Analyzing the Dynamic Evolution of Hashtags on Twitter:a Language-Based Approach∥Workshop on Languages in Social Media.Association for Computational Linguistics,2011.
[10] MACEACHREN A M,JAISWAL A,ROBINSON A C,et al. Senseplace2:Geotwitter analytics support for situational awareness[C]∥2011 IEEE Conference on Visual Analytics Science and Technology (VAST).New York:IEEE Press,2011:181-190.
[11] KONG S,MEI Q,FENG L,et al.Predicting bursts and popularity of hashtags in real-time[C]∥Proceedings of the 37th international ACM SIGIR Conference on Research & Development in Information Retrieval.New York:ACM Press,2014:927-930.
[12] MA Z,SUN A,CONG G.Will this# hashtag be popular tomorrow?[C]∥Proceedings of the 35th international ACM SIGIR Conference on Research and Development in Information Retrieval.New York:ACM Press,2012:1173-1174.
[13] TSUR O,RAPPOPORT A.What’s in a hashtag?:content based prediction of the spread of ideas in microblogging communities[C]∥Proceedings of the Fifth ACM International Conference on Web Search and Data Mining.New York:ACM Press,2012:643-652.
[14] CHO I,WESSLEN R,VOLKOVA S,et al.CrystalBall:A Visual Analytic System for Future Event Discovery and Analysis from Social Media Data[C]∥IEEE Conference on Visual Analytics Science and Technology (VAST).New York:IEEE Press,2017:25-35.
[15] KAMATH K Y,CAVERLEE J,CHENG Z,et al.Spatial in- fluence influence:modeling the global spread of social media[C]∥Proceedings of the 21st ACM International Conference on Information and Knowledge Management.New York:ACM Press,2012:962-971.
[16] HE J,CHEN C.Spatiotemporal Analytics of Topic Trajectory[C]∥Proceedings of the 9th International Symposium on Visual Information Communication and Interaction.New York:ACM Press,2016:112-116.
[17] KAMATH K Y,CAVERLEE J.Spatio-temporal meme prediction:learning what hashtags will be popular where[C]∥Proceedings of the 22nd ACM International Conference on Conference on Information & Knowledge Management.New York:ACM Press,2013:1341-1350.
[18] HONG L,AHMED A,GURUMURTHY S,et al.Discovering geographical topics in the twitter stream[C]∥Proceedings of the 21st International Conference on World Wide Web.New York:ACM Press,2012:769-778.
[19] LU Y,WANG H,LANDIS S,et al.A visual analytics framework for identifying topic drivers in media events[J].IEEE Transactions on Visualization and Computer Graphics,2018,24(9):2501-2515.
[20] EL-ASSADY M,SPERRLE F,DEUSSEN O,et al.Visual Analytics for Topic Model Optimization based on User-Steerable Speculative Execution[J].IEEE Transactions on Visualization and Computer Graphics,2019,25(4):1-20.
[21] WU Y,CHEN Z,SUN G,et al.Streamexplorer:a multi-stage system for visually exploring events in social streams[J].IEEE Transactions on Visualization and Computer Graphics,2018,24(10):2758-2772.
[22] ANDRIENKO G,ANDRIENKO N,FUCHS G,et al.Revealing patterns and trends of mass mobility through spatial and temporal abstraction of origin-destination movement data[J].IEEE Transactions on Visualization & Computer Graphics,IEEE,2017(1):1.
[23] MARCUS A,BERNSTEIN M S,BADAR O,et al.Twitinfo:aggregating and visualizing microblogs for event exploration[C]∥Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.New York:ACM Press,2011:227-236.
[24] CAO N,LIN Y-R,SUN X,et al.Whisper:Tracing the spatiotemporal process of information diffusion in real time[J].IEEE Transactions on Visualization and Computer Graphics,2012,18(12):2649-2658.
[1] LIANG Wei, DUAN Xiao-dong, XU Jian-feng. Three-way Filtering Algorithm of Basic Clustering Based on Differential Measurement [J]. Computer Science, 2021, 48(1): 136-144.
[2] ZHANG Yu, LU Yi-hong, HUANG De-cai. Weighted Hesitant Fuzzy Clustering Based on Density Peaks [J]. Computer Science, 2021, 48(1): 145-151.
[3] YANG Fan, WANG Jun-bin, BAI Liang. Extended Algorithm of Pairwise Constraints Based on Security [J]. Computer Science, 2020, 47(9): 324-329.
[4] XU Shou-kun, NI Chu-han, JI Chen-chen, LI Ning. Image Caption of Safety Helmets Wearing in Construction Scene Based on YOLOv3 [J]. Computer Science, 2020, 47(8): 233-240.
[5] CHEN Qing-chao, WANG Tao, FENG Wen-bo, YIN Shi-zhuang, LIU Li-jun. Unknown Binary Protocol Format Inference Method Based on Longest Continuous Interval [J]. Computer Science, 2020, 47(8): 313-318.
[6] CAO Su-e, YANG Ze-min. Prediction of Wireless Network Traffic Based on Clustering Analysis and Optimized Support Vector Machine [J]. Computer Science, 2020, 47(8): 319-322.
[7] GAO Fang-yuan, WANG Xiu-mei. Subspace Clustering Method Based on Block Diagonal Representation and Neighbor Constraint [J]. Computer Science, 2020, 47(7): 66-70.
[8] LI Xiang-li, JIA Meng-xue. Nonnegative Matrix Factorization Algorithm with Hypergraph Based on Per-treatments [J]. Computer Science, 2020, 47(7): 71-77.
[9] ZHANG Heng, MA Ming-dong, WANG De-yu. Text-Video Feature Learning Based on Clustering Network [J]. Computer Science, 2020, 47(7): 125-129.
[10] LUO Jin-nan and ZHANG Ji-min. Rail Area Extraction Using Extended Haar-like Features and DBSCAN Clustering [J]. Computer Science, 2020, 47(6A): 153-156.
[11] ZHANG Hao-yang and ZHOU Liang. Application of Improved GHSOM Algorithm in Civil Aviation Regulation Knowledge Map Construction [J]. Computer Science, 2020, 47(6A): 429-435.
[12] SHAO Chao and MA Jin-Jia. Selective Clustering Ensemble Based on Xie-Beni Index [J]. Computer Science, 2020, 47(6A): 457-460.
[13] XING Yu-hua, LI Ming-xing. Robust Low Rank Subspace Clustering Algorithm Based on Projection [J]. Computer Science, 2020, 47(6): 92-97.
[14] LIU Shu-jun, WEI Lai. Block Integration Based Image Clustering Algorithm [J]. Computer Science, 2020, 47(6): 170-175.
[15] HU Shi-juan, LU Hai-yan, XIANG Lei, SHEN Wan-qiang. Fuzzy C-means Clustering Based Partheno-genetic Algorithm for Solving MMTSP [J]. Computer Science, 2020, 47(6): 219-224.
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .