Characterizing the 2016 U.S. Presidential Campaign using Twitter Data
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 10
Abstract
This paper models the 2016 U.S. presidential campaign in the context of Twitter. The study analyzes the presidential candidates’ Twitter activity by crawling their real-time tweets. More than 16,000 tweets were observed in this work. We study the interactions between the politicians and their Twitter followers in the retweet and favorite networks. The most frequently mentioned unigrams are presented, which serve the best featuring the political focuses of a candidate. The mention network among the politicians was constructed by parsing the content of their tweets. In this paper, we also study the Twitter profile of the users who follow the presidential candidates. The gender ratio among the Twitter subscribers is examined using the government’s census data. We also investigate the geography of Twitter supporters for each candidate.
Authors and Affiliations
Ignasi Vegas, Tina Tian, Wei Xiong
Scheduling of Distributed Algorithms for Low Power Embedded Systems
Recently, the advent of embedded multicore processors has created interesting technologies for power management. Systems consisting of low-power and high-efficient cores create new possibilities for the optimization of p...
Towards an Adaptive Learning System Based on a New Learning Object Granularity Approach
To achieve the adaptability required in ALS, adaptive learning system (ALS) takes advantage of granular and reusable content. The main goal of this paper is to examine the learning object granularity issue which is direc...
Increase Efficiency of SURF using RGB Color Space
SURF is one of the most robust local invariant feature descriptors. SURF is implemented mainly for gray images. However, color presents important information in the object description and matching tasks as it clearly in...
An Automated approach for Preventing ARP Spoofing Attack using Static ARP Entries
ARP spoofing is the most dangerous attack that threats LANs, this attack comes from the way the ARP protocol works, since it is a stateless protocol. The ARP spoofing attack may be used to launch either denial of service...
Modelling, Command and Treatment of a PV Pumping System Installed in Tunisia
This paper studied the modeling, the command and the optimization of a photovoltaic (PV) pumping systems using performed strategies of command laws. The system is formed by a PV generator, a DC-DC converter with a maxima...