2018 IEEE 3rd International Conference on Computing, Communication and Security (ICCCS) 2018
DOI: 10.1109/cccs.2018.8586827
|View full text |Cite
|
Sign up to set email alerts
|

An Exploratory Study on the Generation and Distribution of Geotagged Tweets in Nepal

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 7 publications
(5 citation statements)
references
References 17 publications
0
5
0
Order By: Relevance
“…The developed algorithm exploits Twitter's functionalities to find a greater number of tweets with geographical location than methods that relied only on point geotagged and bounding box. They are methods, used previously by researchers to analyze mobility [33] , [31] , [41] , given that they offer positional coordinates of tweets - very accurate in the former and approximates in the latter -, but with the limitations on the amount of tweets available. Thus, by the end of the procedure, each geolocalized tweet can have one of these kinds of geographical tags: point geotagged, bounding box, local tweet and QCA tweet.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The developed algorithm exploits Twitter's functionalities to find a greater number of tweets with geographical location than methods that relied only on point geotagged and bounding box. They are methods, used previously by researchers to analyze mobility [33] , [31] , [41] , given that they offer positional coordinates of tweets - very accurate in the former and approximates in the latter -, but with the limitations on the amount of tweets available. Thus, by the end of the procedure, each geolocalized tweet can have one of these kinds of geographical tags: point geotagged, bounding box, local tweet and QCA tweet.…”
Section: Resultsmentioning
confidence: 99%
“…Twitter was used in analyzing tourism-related mobility as well. For example, to analyze the home country of tourists in Nepal [41] ; to check the official visitor counts in national parks [42] ; to analyze the relation between visitation rate of New York City's parks and their characteristics [43] , [44] . Generally, the tweet location used in previously cited analyses was that given by Twitter, either by an accurate localization or an approximate area where the tweet could be found.…”
Section: Introductionmentioning
confidence: 99%
“…The literature on recommender systems in the Nepalese context are limited. There are notably two authors [25][26][27][28][29][30] who have worked on the study of Tourist Recommender Systems for Nepalese tourism industries. In their papers [25][26][27][28][29][30], the author studied different aspects related to tweets and POI and the generation and distribution of geotagged tweets in Nepal, while [27] used volunteered geographic information and night-time light remote sensing data to identify tourism areas of interest [28].…”
Section: Literature Reviewmentioning
confidence: 99%
“…There are notably two authors [25][26][27][28][29][30] who have worked on the study of Tourist Recommender Systems for Nepalese tourism industries. In their papers [25][26][27][28][29][30], the author studied different aspects related to tweets and POI and the generation and distribution of geotagged tweets in Nepal, while [27] used volunteered geographic information and night-time light remote sensing data to identify tourism areas of interest [28]. The other author [29] worked on the design of religious tourist recommender systems and conducted a preliminary analysis on the design of a Tourist Recommender System for Nepal [30].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Related studies have used geo-tagged social media data for mining tourist locations without separating the data from local and non-local users [20,49]. Also, previous studies in the proposed area (i.e., Nepal) illustrated that approximately one third portion of the tweets was contributed by non-local users [61]. Hence, to avail more input for the underlying clustering algorithm, the proposed approach makes use of the tweets posted by both local and non-local users in the beginning.…”
Section: Identifying Taois By Cluster Pruningmentioning
confidence: 99%