Computational Modelling and Simulation of Core- Periphery Terrorist Network
نویسندگان
چکیده
Terrorism and terrorist organizations are becoming more vulnerable nowadays. Understanding the terrorism and the organizational structures of terrorist networks are most important to devise successful defensive strategies against the terrorist activities. Terrorist organizational network is a real world complex system which is the association of numerous entities and has significant structural features . Core-Periphery terrorist network structure is one type of terrorist organizational structure which favours when the network members are very few to achieve the task. This paper presents Core-Periphery Terrorist Network (CoPTeN) model to synthetically simulate the coreperiphery terrorist network structure based mainly on the preferential growth feature of complex networks. The structural characteristics of this model were analysed and discussed elaborately. As this model simulates the CorePeriphery terrorist network structures with imprecise inputs, it can help the anti-terrorism agencies by giving more insight into the structure of terrorist network to develop effective dismantling strategies against terrorist networks.
منابع مشابه
The Social Dynamics of Group Polarization during Diffusion
Although network structures shape diffusion and ultimately systemic performance, the underlying dynamics generating different network structures during diffusion are not well understood. To explore these dynamics we present a set of models driven by a single motivation for generalized balance – the inclination to align the attributes of one’s network members with one’s own attributes either by ...
متن کاملOn effectiveness of wiretap programs in mapping social networks
On December 16, 2005, a New York Times article[31] revealed that in the immediate aftermath of the September 11th attacks, the National Security Agency began a broad program of domestic signal intelligence collection. As press reports indicated [28], NSA implemented its new collections program based on the snowball sampling methods, which is generally used in surveying hidden populations and ne...
متن کاملMathematical modeling of dynamics behavior of terrorism and control
Terrorism is generally understood to be the use of threat or extra normal violence to gain ideological reasons and personal benefit. In this paper, a mathematical modelling of terrorism with military strategies and rehabilitation of terrorists was constructed. The model is developed to control the spread of terrorist ideologies in the society and suitable to describe terrorist group. The popula...
متن کاملMultiphase flow and tromp curve simulation of dense medium cyclones using Computational Fluid Dynamics
Dense Medium Cyclone is a high capacity device that is widely used in coal preparation. It is simple in design but the swirling turbulent flow, the presence of medium and coal with different density and size fraction and the presence of the air-core make the flow pattern in DMCs complex. In this article the flow pattern simulation of DMC is performed with computational fluid dynamics and Fluent...
متن کاملMATHEMATICAL MODELLING OF THE EFFECT OF FOAM DEGRADATION ON MOULD FILLING IN THE GREY IRON EPC PROCESS
In this investigation a new model was developed to calculate gas pressure at the melt/foam interface (Gap) resulting from foam degradation during mould filling in the Lost Foam Casting (LFC) process. Different aspects of the process, such as foam degradation, gas elimination, transient mass, heat transfer, and permeability of the refractory coating were incorporated into this model. A Computati...
متن کامل