Novel Algorithm for Terrorist Network Mining

نویسندگان

  • Nisha Chaurasia
  • Akhilesh Tiwari
چکیده

The evolutionary effect of social network analysis has feasibly enabled the security agencies to include the approach for estimating terrorist networks. The approach in this sense named as Terrorist Network Mining, has helped in successfully achieving the terrorist network behaviour on web along with destabilization of network using hierarchy of algorithms. However these algorithm results in fruitful outcomes, there is a need to propose a typical algorithm for destabilization. In consideration to this, the present paper proposes a novel algorithm for destabilization of terrorist network revealing the hidden hierarchy followed by the network. Keywords— Social Network Analysis, Data Mining,

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Efficient Algorithm for Destabilization of Terrorist Networks

The advisory feasibility of Social Network Analysis (SNA) to study social networks have encouraged the law enforcement and security agencies to investigate the terrorist network and its behavior along with key players hidden in the web. The study of the terrorist network, utilizing SNA approach and Graph Theory where the network is visualized as a graph, is termed as Investigative Data Mining o...

متن کامل

Network Structure Mining: Locating and isolating core members in covert terrorist networks

Knowing patterns of relationship in covert (illegal) networks is very useful for law enforcement agencies and intelligence analysts to investigate collaborations among criminals. Previous studies in network analysis have mostly dealt with overt (legal) networks with transparent structures. Unlike conventional data mining that extracts patterns based on individual data objects, network structure...

متن کامل

Investigative Data Mining Toolkit: A Software Prototype for Visualizing, Analyzing and Destabilizing Terrorist Networks

Knowledge about the structure and organization of terrorist networks is important for both terrorism investigation and the development of effective strategies to prevent terrorists’ attacks. However, except for network visualization, terrorist network analysis remains primarily a manual process. Existing tools do not provide advanced structural analysis techniques that allow extraction of netwo...

متن کامل

Multi-layer Clustering Topology Design in Densely Deployed Wireless Sensor Network using Evolutionary Algorithms

Due to the resource constraint and dynamic parameters, reducing energy consumption became the most important issues of wireless sensor networks topology design. All proposed hierarchy methods cluster a WSN in different cluster layers in one step of evolutionary algorithm usage with complicated parameters which may lead to reducing efficiency and performance. In fact, in WSNs topology, increasin...

متن کامل

Application of artificial neural network and genetic algorithm to modelling the groundwater inflow to an advancing open pit mine

In this study, a hybrid intelligent model has been designed to predict groundwater inflow to a mine pit during its advance. Novel hybrid method coupling artificial neural network (ANN) with genetic algorithm (GA) called ANN-GA, was utilised. Ratios of pit depth to aquifer thickness, pit bottom radius to its top radius, inverse of pit advance time and the hydraulic head (HH) in the observation w...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013