A Soft Computing Model to Counter Terrorism

نویسندگان

  • Karthikeyan Marappan
  • Krishnan Nallaperumal
  • K. Senthamarai Kannan
چکیده

In the aftermath of September 11, the experts concluded that data mining could help it prevent future terrorist attacks. Experts are also concerned that in its zeal to apply technology to antiterrorism, the government could disrupt the crime-fighting processes of the agencies that are charged with finding and stopping terrorists before they act. The entire information or the evidence about a terrorist and the inclined behavior of some personalities are stored in interactive XML sheets (iXML), which are called as trifles, the piece of information. These trifles play a vital role in training the soft computing model and for pattern detection. These trifles in the form of iXML sheets are given in the network for pattern detection. The soft computing model used here is the Competitive Neural Tree (CNeT). The CNeT is the type of decision tree in which each node is compared and a decision will be taken to move to the next. In each stage the pattern recognition is done with the contents of the iXML nodes.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mathematical modeling of dynamics behavior of terrorism and control

Terrorism is generally understood to be the use of threat or extra normal violence to gain ideological reasons and personal benefit. In this paper, a mathematical modelling of terrorism with military strategies and rehabilitation of terrorists was constructed. The model is developed to control the spread of terrorist ideologies in the society and suitable to describe terrorist group. The popula...

متن کامل

Modeling the Complexity of the Terrorism/Counter-Terrorism Struggle: Mathematics of the "Hearts and Minds"

The United States armed forces could be considered the world's most powerful military force. However, in modern conflicts, techniques of asymmetric warfare (terrorism) wreak havoc on the inflexible, regardless of technological or numerical advantage. In order to be more effective, the US military must improve its counter-terrorism (CT) capabilities and flexibility. In this light, the authors mo...

متن کامل

Preventing Terrorism by Combating Financial Resources

Terrorism is an offensive action which violates human rights and always invades to people’s rights. Given the high incidence of this type of global action and the widespread violations of human rights and peace and security, countering terrorism will be important. The existence of financial resources is an essential element of terrorism and Preemptive measures and their success in blocking fina...

متن کامل

Emergent Information Technologies and Enabling Policies for Counter-Terrorism

If you get the printed book in on-line book store, you may also find the same problem. So, you must move store to store and search for the available there. But, it will not happen here. The book that we will offer right here is the soft file concept. This is what make you can easily find and get this emergent information technologies and enabling policies for counter terrorism by reading this s...

متن کامل

A COMPARATIVE STUDY OF TRADITIONAL AND INTELLIGENCE SOFT COMPUTING METHODS FOR PREDICTING COMPRESSIVE STRENGTH OF SELF – COMPACTING CONCRETES

This study investigates the prediction model of compressive strength of self–compacting concrete (SCC) by utilizing soft computing techniques. The techniques consist of adaptive neuro–based fuzzy inference system (ANFIS), artificial neural network (ANN) and the hybrid of particle swarm optimization with passive congregation (PSOPC) and ANFIS called PSOPC–ANFIS. Their perf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008