2009
DOI: 10.1007/978-3-642-01393-5_4
|View full text |Cite
|
Sign up to set email alerts
|

Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(9 citation statements)
references
References 3 publications
0
9
0
Order By: Relevance
“…In every country, dealing with terrorism is the top most priority of the government. ey seek for techniques to Input: the whole dataset of GTD along with labels Output: optimized values of W and b Data: GTD Datasets (1) W [1..L] � random numbers //Glorot Uniform initializer (2) b [1..L] � random numbers (3) while i ≤ num iteration do (4) k ⟵ 1 (5) while j ≤ L do (6) Z [j] � W [j]T .A [j− 1] + b [j] 7A [j] � g(Z [j] )//g(Z) � max(0, z) (8) increment j by 1 (9) L(A [L] , Y) � − (1/m) m i�0 Y i log(A [L] i ) //Binary cross-entropy loss (10) k ⟵ L (11) while k ≥ 0 do (12) W [k] � W [k] − αzL/zW[k] (13) b [k] � b [k] − αzL/zb[k] (14) decrement k by 1 ALGORITHM 2: e training of deep neural network using gradient descent optimization algorithm. Complexity understand the different factors involved in terrorism and how to deal with those factors in order to completely stop or reduce terrorist activities.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In every country, dealing with terrorism is the top most priority of the government. ey seek for techniques to Input: the whole dataset of GTD along with labels Output: optimized values of W and b Data: GTD Datasets (1) W [1..L] � random numbers //Glorot Uniform initializer (2) b [1..L] � random numbers (3) while i ≤ num iteration do (4) k ⟵ 1 (5) while j ≤ L do (6) Z [j] � W [j]T .A [j− 1] + b [j] 7A [j] � g(Z [j] )//g(Z) � max(0, z) (8) increment j by 1 (9) L(A [L] , Y) � − (1/m) m i�0 Y i log(A [L] i ) //Binary cross-entropy loss (10) k ⟵ L (11) while k ≥ 0 do (12) W [k] � W [k] − αzL/zW[k] (13) b [k] � b [k] − αzL/zb[k] (14) decrement k by 1 ALGORITHM 2: e training of deep neural network using gradient descent optimization algorithm. Complexity understand the different factors involved in terrorism and how to deal with those factors in order to completely stop or reduce terrorist activities.…”
Section: Resultsmentioning
confidence: 99%
“…e paper has claimed that the system reveals relationships between entities that are not easily detectable using traditional methods. In 2009, Ozgul et al [13] proposed an ensemble framework that can classify and predict terrorist groups using four different classifiers: Naïve Bayes, K-NN, Iterative Dichotomiser 3, and decision stump. e authors demonstrated that ensemble framework has better figures compared to individual models.…”
Section: Related Workmentioning
confidence: 99%
“…As quickly as the name of the involved group is sorted, the strategies to catch those culprits could be made. The general process followed to detect the terrorist group responsible is by using email, telephone signal information, terrorist web sites and social network analysis [8,10]. Terrorist activities occurred in the past are available in .…”
Section: Predicting Terrorist Groupmentioning
confidence: 99%
“…TGPM uses the concept of Crime Prediction Model [2,10], Group Detection Model (GDM) [16] and Offender Group Detection Model (OGDM) [16,17]. The predictive accuracy of the system is 80.41%.…”
Section: Terrorist Group Prediction Model (Tgpm)mentioning
confidence: 99%
See 1 more Smart Citation