=Paper= {{Paper |id=Vol-2404/paper13 |storemode=property |title=Intelligent Collection and Analysis of Citizens’ Reports |pdfUrl=https://ceur-ws.org/Vol-2404/paper13.pdf |volume=Vol-2404 |authors=Giulio Angiani,Paolo Fornacciari,Gianfranco Lombardo,Monica Mordonini,Agostino Poggi,Michele Tomaiuolo |dblpUrl=https://dblp.org/rec/conf/woa/AngianiFLMPT19 }} ==Intelligent Collection and Analysis of Citizens’ Reports== https://ceur-ws.org/Vol-2404/paper13.pdf
                                        Workshop "From Objects to Agents" (WOA 2019)


                       Intelligent Collection and Analysis
                               of Citizens’ Reports
                     Giulio Angiani, Paolo Fornacciari, Gianfranco Lombardo, Monica Mordonini,
                                          Agostino Poggi, Michele Tomaiuolo
                                           Dipartimento di Ingegneria e Architettura
                                                 Università degli Studi di Parma
                                                          Parma, Italy
   {giulio.angiani, paolo.fornacciari, gianfranco.lombardo, monica.mordonini, agostino.poggi, michele.tomaiuolo}@unipr.it



   Abstract—The great and capillary diffusion of technology                 text and image with the app he prefers by interacting with
between citizens is actually creating the ideal conditions for              various bots dedicated to different messaging systems.
realizing the “Smart Community” concept. In this kind of socio-                Furthermore, the user is not responsible for categorizing
technical context, it is possible to create distributed applications
for the administration of cities and neighborhood, using data               the report, because this information is derived from an AI
provided directly by citizens. In particular, it is possible to             system through text-analysis, image-recognition and object-
connect users and integrate their actions into the whole system,            detection. Depending on the inserted text and the content of the
thanks to wide available instant messaging apps, used by the                attached image, this automatic system associates the message
greatest part of mobile users. The combined use of public                   with one of four predefined classes (environment, lighting,
APIs, Web systems and automated bots allowed us to build a
comprehensive framework for managing the reports sent to the                maintenance and security), corresponding to branches of the
local government by citizens through their already installed and            local administration.
well-known instant messaging apps, such as Whatsapp, Telegram                  The rest of the manuscript is structured in the following
and Messenger.                                                              way: Section I presents some of the most interesting works,
   In this paper we show the techniques used for retrieving and             conducted in this field; Section II describes the data collection
classifying texts and images of the reports, for their management
by the most appropriate branch of local administration. Our                 and methodology used for this study; results and discussions
results show that an automatic classification system of this kind           are presented in Section III; finally, Section IV provides some
can reach an accuracy of over the 90%.                                      concluding remarks.
   Index Terms—Text analysis, Image classification, Government
2.0, Chatbot.                                                                                    L ITERATURE REVIEW
                                                                               The widespread use of devices that are always connected
                       I. I NTRODUCTION                                     makes it possible for citizens to actively participate in the
   The widespread distribution of mobile devices and fast                   collection of local information and news, that has been
network coverage in recent years has created the conditions to              used for very different purposes. This changing landscape of
allow all citizens to access and send information at any time               technology-enabled engagement with communities, cities and
of the day. The concept of “smart community” arises precisely               spaces was first illustrated in the book From social butterfly
from the possibility, for users, to interact quickly and in real            to engaged citizen [1].
time on different aspects of real life.                                        In [2] and [3], authors show the first results of studies carried
   One of these is sending reports to local public administra-              out on the importance of citizen participation in the increase
tions. In almost all cases, this service is offered by private              of knowledge and the sharing of information in many fields,
companies that use proprietary apps to send and classify                    such as the tagging of road maps, the spread of diseases [4],
reports.                                                                    the dissemination of emergency news, the review of hotels
   Typically these apps allow users to send geo-localized text              and restaurants, the creation of 3D models based on user
and images after specifying the category to which they belong.              images. In [5] a mechanism of crowd sourcing and portable
The user who wants to use them must therefore download the                  smart devices is used to enable real time, location based crime
app from the appropriate store, register, learn how to use it               incident searching and reporting. This participatory approach,
correctly. In many cases this user overhead discourages the                 well presented in [6], clarifies the concept of Government 2.0,
use of the reporting system by citizens who are used to other               where knowledge is shared between citizens and institutions.
messaging channels.                                                            In [7] the authors explore recent research regarding the
   Our project has instead reversed the approach starting from              potential of ICT, social media and mobile technologies to
the use, by citizens, of free and widely used apps (Whatsapp,               foster citizen engagement and participation in urban planning.
Telegram and Messenger) to send the same information to                     ICT technologies and urban planning are important aspects of
public administrations. The user is therefore free to send the              the so-called socio-technical systems, in which the technology




                                                                       84
                                      Workshop "From Objects to Agents" (WOA 2019)

complexity is amplified by the organisational and procedural             assign the correct category among the 4 possible ones: envi-
complexity of the application domain [8] A survey on existing            ronment, lighting, maintenance and security. These categories
approaches for fostering citizen participation is presented in           are then useful to address each report to the most appropiate
[9].                                                                     brach of the local administation.
   In light of this, recently several e-Government services have            As a fundamental consequence of the nature of reports, a
been introduced by government and administrations in the                 requirement for the whole system is the ability to correctly
form of conversational chatbots. Singapore’s administration              interpret both the text and any attached image. The overall
operates a bot [10] that can answer a broad spectrum of                  architecture of the system is shown in Figure 1. It has
questions, providing citizens with links to their web portal             been realized over ActoDES, which is a software framework
like a traditional search engine. Another interesting case is            which adopts the actor model. In particular, it simplifies
the WienBot [11], operated by the Wien city administration.              the development of complex distributed systems [23] and it
Using a rather small knowledge base it provides efficient talk           already integrates modules for gathering online data from
capabilities but limited to its core domain. Some of limitations         social networks and for the automatic classification of such
of the reported cases are related to the absence of a Natural            data [24].
Language Processing step of the contents. Infact, one of
the most adavanced e-Government chatbot, the Burgeramter
chatbot [12], provided by the Berlin city administration, is
based on a multi-staged framework that combines Sentiment
Analysis and POS-Tagging of the questions and a knowledge
base. This bot provides only information and raccomendations
concerning public offices and services but do not accepts
citizens reports.                                                               Telegram              Whatsapp              Messenger
   It should also be noted that nowadays users are , virtually,                    bot                  bot                    bot
always connected to the network. Thus, they are able to send
and share information in various ways: via social networks
(Twitter, Facebook, Instagram, and others), or through dedi-
cated apps, or through instant messaging systems (Telegram,                                Intermediate representation
Whatsapp, Messenger). For example, in [13] a mobile apps                                         (text + images)
allows walkers to map urban accessibility barriers/facilities,
while wandering around. In [14] there is a description of a
mobile app which allows users to take geo-tagged photo of
                                                                                          Text                         Image
road fault reporting, attach a brief description, and submit the
                                                                                        analysis                      analysis
information as a maintenance request to the local government
organisation of their city. A number of cities in USA have
worked to create apps that allow users to interact in order
to report grafiti or, in general, code violations, such as My-                       Bag of words                   Image tags
Delaware app or Boston’s Citizens Connect mobile app: [15].
   In these cases, the information is typically sent through nat-
ural language or self-produced images. Thus, the application
needs to classify the reports based on the results of both text                                     Classification
and image analysis. The analysis of natural language on social                                        algorithm
networks is carried out for different purposes including: (i)
analysis of users’ sentiment [16] [17] [18], (ii) analysis of
discussed topics [19], and (iii) analysis of the text structure
[20]. Image analysis and object-recognition are also used for                                      Message class
several goals, such as real-time object detection [21] or 3D-
modeling [22]. In our work, the object-detection process has                     Figure 1. Data flow representation of the whole system.
been used for understanding what a user would send to the
institutional partner.                                                      The first layer includes the implemention of specific bots
                                                                         related to the different messaging systems and the appropriate
                     II. M ETHODOLOGY                                    components to make the representations of the various mes-
                                                                         sages homogeneous. Then, each message is treated internally
  As we mentioned in the chapter I, the overall project                  with a representation in JSON format containing information
aimed at the automatic classification of reports sent via instant        on text, images, sender user data, date and time of the message,
messaging systems. Each sent message could contain text                  and any information related to geolocation. Reports are then
and images, analyzing which it was possible to automatically             managed in a Web-based system, which we have developed




                                                                    85
                                        Workshop "From Objects to Agents" (WOA 2019)

for playing the role of an ad-hoc Customer Relationship                  Forest (RF), Support Vector Machine (SVM), and K-Nearest
Management (CRM) system, as shown in Figure 2.                           Neighbors (KNN).
                                                                            Therefore, the next step is the creation of a four-way text
A. Dataset collection                                                    classifier as in fig. 3 whose output is the class to which a
   The first phase of the project is therefore focused on the            message belongs. In fact, the system also emits a dictionary
definition and implementation of the text classifier. For this           with the confidence values for each reported class. The process
purpose, 7758 citizens’ reports have been downloaded from the            is represented in Figure 3.
institutional websites of several Italian municipalities. These             An example of the classifier’s output regarding confidence
data represent the initial working dataset. These reports, pub-          for each class is as follows
licly visible on the administrations’ websites, are associated
                                                                                {
to categories directly by the users who have sent them or by
                                                                                     "environment": 0.8731,
the offices in charge.
                                                                                     "lighting": 0.1023,
   Since these data reside on different systems and are man-
                                                                                     "maintenance": 0.0092,
aged in a non-homogeneous way, we have counted 27 cate-
                                                                                     "security": 0.0154,
gories, to which the various reports are associated. Many of
                                                                                }
these categories however differ only by designation and not
by concept (i.e. “road safety” versus “road maintenance”).               B. Image classification
   The first operation is therefore to reduce the numerous                  The second branch of the project is focused on the analysis
classes to the four chosen for the project. These four categories        of the images present in the reports sent by the users. In
(Environment, Lighting, Maintenance, Security) have been                 order to associate the correct class to the entire reporting, it is
identified because conceptually connected with some corre-               necessary to understand which entities are represented within
sponding administrative offices that will manage the citizens’           the associated image.
reports themselves.                                                         This is done using the Clarifai 1 [25] object-recognition
   However, for comparing the diffent possible types of anal-            service. The service is available via Rest API and a convenient
ysis, we have limited the dataset to the massages containing             Python module.
both text and images. After manual analysis, we have found                  For each image associated with a message, a call is made
that the least represented category in the reduced dataset is            to the service to retrieve information related to the content
lightening, with little more than 200 instances. We have then            of the image. Among other information, the results returned
proceeded to balance the dataset using around 200 instances              by Clarifai in JSON format contain the list of entities (or
for each class, obtaining 804 instances in total, which we have          concepts) associated to the image. Additionally, a probability
used for further analysis and comparisons. Table I shows the             value is associated with each entity. As an example, a list of
number of reports associated with the different classes, after           entities like the following one can be obtained:
this selection.
                                                                            "entities":[
                              Table I                                                                {
            N UMBER OF SELECTED REPORTS PER CLASS .                                                    "name": "train",
                Class         Number of messages
                                                                                                       "value": 0.9989112
                Environment                  201                                                     },
                Lighting                     201                                                     {
                Maintenance                  200                                                       "name": "railway",
                Security                     202                                                       "value": 0.9975532
                                                                                                     },
   1) Text analysis:                                                                                 {
For the text analysis branch, a preprocessing operation is                                             "name": "station",
carried out on the text to eliminate characters not useful                                             "value": 0.992573
for classification, for example punctuation, reports without                                         },
information content, emoticons. The stemming operations is                                       ]
applied and the text is filtered through a list of stop-words.              Here, value is the confidence value of the entity indicated
Finally, the text is vectorized according the Bag of Words               in name being represented within the image.
approach.                                                                   After analyzing the response of the external service, we
   2) Training the classifier:                                           construct a sequence of words using only the entities with a
At this point the dataset is ready to be used for training a             confidence value greater than 0.9. This sequence of entities is
text classifier. As proposed in [18], the Multinomial Naive-             analyzed exactly in the same way as the bag of words obtained
Bayes classification algorithm is chosen for the analysis of             from the text. The same classification algorithms described
natural language. However, we also campare it with other well
known automatic classification algorithms, namely: Random                  1 Clarifai Inc., API Reference, https://clarifai.com/developer/reference/




                                                                    86
                                     Workshop "From Objects to Agents" (WOA 2019)




                                                  Figure 2. The Web-based interface.



above are compared also in the case of image analysis. The                                      III. R ESULTS
process is represented in Figure 4.
                                                                           After creating the whole dataset, we compare the three
                                                                        different approaches described in the previous section. In the
C. Classification approaches                                            following, these approaches are identified as: Text, based only
                                                                        on text analysis; Image, based only on image analysis; and
   After realizing the subsystems for the analysis of text and
                                                                        Text+Image, based on both text and image analyses.
images, we have performed a comparison between the text
classification results and that of the associated images. More             We also compare various well-known classification algo-
precisely, we have compared three cases:                                rithms, namely: RF, Random Forest; NBM, Naïve Bayes
                                                                        Multinomial; SMO, Sequential Minimal Optimization, based
                                                                        on the pinciples of support vectors; KNN, K-Nearest Neigh-
  • Classification through text analysis, only (using the bag           bors. In this latest algorithm, we use K=1 to gain its best
    of words approach)                                                  results.
  • Classification through image analysis, only (using the
                                                                           It can be observed in Figure 5 and Table II that all
    image entities)                                                     algorithms perform better on the image entities than on the
  • Classification through both text and image analyses (con-
                                                                        text. Moreover, all algorithms improve their results using all
    catenating their lists of features)                                 available features, with the exception of KNN, which is known
  In Section III, we show the analytical values of the accuracy         to work better on a limited set of features.
of the classifier itself, using various features and algorithms.           Overall, the best classification accuracy is obtained by the
For those evaluations, the dataset is splitted and then used for        NBM algorithm, using the features of both text and images.
both training and validating the classifier. For improving the          In this case, the classification is correct in over 90% of
consistency and reproducibility of results, we have adopted the         cases. However, using the RF algorithm, a very close value of
well-known ten-fold Cross Validation technique.                         accuracy can be obtained even using only the image features.




                                                                   87
                                          Workshop "From Objects to Agents" (WOA 2019)

                                                                              100.00%
                           Report text                                         90.00%

                                                                               80.00%

                                                                               70.00%

                                               - Puntuation                    60.00%
                                                                                                                                            RF
                               Text            - Stemming                      50.00%                                                       NBM
                                                                                                                                            SMO
                          preprocessing        - Stop words                    40.00%                                                       KNN
                                               - Vectorization                 30.00%

                                                                               20.00%

                                                                               10.00%
                          Bag of words                                          0.00%
                                                                                            Text              Image           Text+Image



                                                                       Figure 5. Accuracy of classifiers, using different features and different
                                Text                                   algorithms.
                           classification
                                                                                                      Table II
                                                                                        N UMERICAL ACCURACY OF CLASSIFIERS .

       Environment                                     Security                                       Text     Image        Text+Image
                                                                                        RF         71.52%     88.18%            88.93%
                                                                                        NBM        80.22%     84.08%            90.67%
                                                                                        SMO        75.99%     86.07%            89.25%
                Lightnening              Mainentance
                                                                                        KNN        57.58%     81.21%            78.85%

                Figure 3. Text classication process.
                                                                       mis-classified as Lighting ones, since the two issues often
                                                                       coexhist.
                          Report image
                                                                                                    Table III
                                                                           C ONFUSION MATRIX FOR NBM ON T EXT +I MAGE ; CLASSES ARE :
                                                                          A =E NVIRONMENT, B =S ECURITY, C =M AINTENANCE , D =L IGHTING .
                               Image
                                               - Clarifai API
                              analysis                                                  Classified as         a        b      c        d
                                                                                        a                    175       15     11        0
                                                                                        b                      8      172      8       14
                                                                                        c                      1        6    193        0
                          Image entities                                                d                      0       10      2      189


                                                                                  IV. C ONCLUSIONS AND FUTURE WORKS
                              Image
                           classification                                  Our project shows an implementation of an automatic classi-
                                                                       fication system for reporting citizens to public administrations
                                                                       through the use of instant messaging. This operation was
                                                                       carried out by analyzing separately the text and images of
       Environment                                     Security
                                                                       a report and then comparing the results of this analysis. The
                                                                       accuracy of the final classification has achieved results overall
                                                                       greater than 90%, using features from both text and associated
                Lightnening              Mainentance
                                                                       images. However, also using only the entities found through
                                                                       the image analysis, very similar results can be obtained. These
               Figure 4. Image classication process.                   results suggest that it is possible to collect citizens’ report
                                                                       in a very simplified way, receiving just geolocalized images,
                                                                       which can be classified automatically in most cases. The use
This way, it is possible to greatly ease the burden on users,          of automated bots for interacting with the users allow them to
when they have to issue reports about local problems.                  correct the wrong results in a very convenient way, only when
                                                                       necessary.
A. Accuracy of the classifiers
                                                                          The future developments of the project will concern differ-
  Finally, Table III represents the confusion matrix. It can           ent kinds of analysis, in cases of discrepancy of the classifiers.
be observed that few errors occurs. Among those, it is worth           Furthermore, after the deployment of the service in some
noting that: (i) 15 Environment reports are mis-classified as          public administrations, it will be possible to carry out content
Security ones, possibly due to the presence of instances about         analyzes that can also be based on data related to the map of
unsecure parks in the dataset; and (ii) 14 Security reports are        the territory and the history of reports.




                                                                  88
                                             Workshop "From Objects to Agents" (WOA 2019)

                     V. ACKNOWLEDGEMENTS                                              [10] “5 reasons to use the gov.sg bot, march 2017. blog of singapore gov-
                                                                                           ernment,” https://www.gov.sg/news/content/5-reasons-to-use-the-gov-sg-
   This project has been developed in collaboration and agree-                             bot.
ment with the local administration of Montecchio Emilia                               [11] “Magistrat der stadt wien. wienbot - der chatbot der stadt, june 2017,”
(Italy), following the concepts of the Government 2.0. The                                 https://www.wien.gv.at/bot/.
local administration has helped to better understand the man-                         [12] A. Lommatzsch, “A next generation chatbot-framework for the public
agement process for the main types of reports and has sug-                                 administration,” in Innovations for Community Services, M. Hodoň,
gested some guidelines for users’ operations, which can be                                 G. Eichler, C. Erfurth, and G. Fahrnberger, Eds.   Cham: Springer
                                                                                           International Publishing, 2018, pp. 127–141.
better handled by public offices.
                                                                                      [13] P. Salomoni, C. Prandi, M. Roccetti, V. Nisi, and N. J. Nunes,
                              R EFERENCES                                                  “Crowdsourcing urban accessibility: Some preliminary experiences with
                                                                                           results,” in Proceedings of the 11th Biannual Conference on Italian
 [1] M. Foth, L. Forlano, C. Satchell, and M. Gibbs, From social butterfly to              SIGCHI Chapter. ACM, 2015, pp. 130–133.
     engaged citizen: urban informatics, social media, ubiquitous computing,
                                                                                      [14] M. Foth, R. Schroeter, and I. Anastasiu, “Fixing the city one photo at
     and mobile technology to support citizen engagement. MIT Press, 2011.
                                                                                           a time: mobile logging of maintenance requests,” in Proceedings of the
 [2] A. Hermida, “Twittering the news: The emergence of ambient journal-
                                                                                           23rd Australian Computer-Human Interaction Conference. ACM, 2011,
     ism,” Journalism practice, vol. 4, no. 3, pp. 297–308, 2010.
                                                                                           pp. 126–129.
 [3] M. N. Kamel Boulos, B. Resch, D. N. Crowley, J. G. Breslin,
     G. Sohn, R. Burtner, W. A. Pike, E. Jezierski, and K.-Y. S. Chuang,              [15] J. Evans-Cowley, “There is an app for that: mobile applications for urban
     “Crowdsourcing, citizen sensing and sensor web technologies for                       planning,” International Journal of E-Planning Research (IJEPR), vol. 1,
     public and environmental health surveillance and crisis management:                   no. 2, pp. 79–87, 2012.
     trends, ogc standards and application examples,” International Journal
                                                                                      [16] B. Liu, “Sentiment analysis and opinion mining,” Synthesis lectures on
     of Health Geographics, vol. 10, no. 1, p. 67, Dec 2011. [Online].
                                                                                           human language technologies, vol. 5, no. 1, pp. 1–167, 2012.
     Available: https://doi.org/10.1186/1476-072X-10-67
                                                                                      [18] G. Angiani, L. Ferrari, T. Fontanini, P. Fornacciari, E. Iotti, F. Magliani,
 [4] M. N. K. Boulos, S. Wheeler, C. Tavares, and R. Jones, “How smart-
                                                                                           and S. Manicardi, “A comparison between preprocessing techniques for
     phones are changing the face of mobile and participatory healthcare: an
                                                                                           sentiment analysis in twitter.” in KDWeb, 2016.
     overview, with example from ecaalyx,” Biomedical engineering online,
     vol. 10, no. 1, p. 24, 2011.                                                     [19] C. C. Aggarwal and C. Zhai, Mining text data.          Springer Science &
 [5] S. Shah, F. Bao, C.-T. Lu, and I.-R. Chen, “Crowdsafe: crowd sourcing                 Business Media, 2012.
     of crime incidents and safe routing on mobile devices,” in Proceedings           [20] A. Athar, “Sentiment analysis of citations using sentence structure-based
     of the 19th ACM SIGSPATIAL International Conference on Advances in                    features,” in Proceedings of the ACL 2011 student session. Association
     Geographic Information Systems. ACM, 2011, pp. 521–524.                               for Computational Linguistics, 2011, pp. 81–87.
 [6] S. Chun, S. Shulman, R. Sandoval, and E. Hovy, “Government 2.0:
     Making connections between citizens, data and government,” Informa-              [21] P. Piccinini, A. Prati, and R. Cucchiara, “Real-time object detection and
     tion Polity, vol. 15, no. 1, 2, pp. 1–9, 2010.                                        localization with sift-based clustering,” Image and Vision Computing,
 [7] R. Kleinhans, M. V. Ham, and J. Evans-Cowley, “Using social media                     vol. 30, no. 8, pp. 573–587, 2012.
     and mobile technologies to foster engagement and self-organization in            [22] P. Henry, M. Krainin, E. Herbst, X. Ren, and D. Fox, “Rgb-d mapping:
     participatory urban planning and neighbourhood governance,” Planning                  Using depth cameras for dense 3d modeling of indoor environments,”
     Practice & Research, vol. 30, no. 3, pp. 237–247, 2015.                               in Experimental robotics. Springer, 2014, pp. 477–491.
 [8] G. Cabri, M. Cossentino, E. Denti, P. Giorgini, A. Molesini, M. Mor-
     donini, M. Tomaiuolo, and L. Sabatucci, “Towards an integrated plat-             [23] F. Bergenti, A. Poggi, and M. Tomaiuolo, “An actor based software
     form for adaptive socio-technical systems for smart spaces,” in Enabling              framework for scalable applications,” Lecture Notes in Computer Science
     Technologies: Infrastructure for Collaborative Enterprises (WETICE),                  (LNCS), vol. 8729, pp. 26–35, 2015, proc. 7th International Conference
     2016 IEEE 25th International Conference on. IEEE, 2016, pp. 3–8.                      on Internet and Distributed Computing Systems (IDCS 2014); Calabria;
 [9] F. Salim and U. Haque, “Urban computing in the wild: A survey on large                Italy; 2014-09-22/24 [MT].
     scale participation and citizen engagement with ubiquitous computing,            [24] P. Fornacciari, M. Mordonini, A. Poggi, L. Sani, and M. Tomaiuolo,
     cyber physical systems, and internet of things,” International Journal of             “A holistic system for troll detection on twitter,” Computers in Human
     Human-Computer Studies, vol. 81, pp. 31–48, 2015.                                     Behavior, vol. 89, pp. 258–268, 2018.
[17] P. Fornacciari, M. Mordonini, and M. Tomaiuolo, “Social network and
     sentiment analysis on twitter: Towards a combined approach.” in KDWeb,           [25] C. Inc. (2018) Clarifa.com            web    site.   [Online].   Available:
     2015, pp. 53–64.                                                                      https://clarifai.com/




                                                                                 89