Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

PLAGIARISM SCAN REPORT

Words 984 Date September 30,2019

Characters 6446 Exclude Url

19% 81% 10 43
Plagiarism Unique Plagiarized Sentences Unique
Sentences
Content Checked For Plagiarism

Visualization We have visualized various contents from the Global Terrorism Database, to better understand the Datasets we are provided with. We have
visualized various attributes from the year 1996 to 2017 that were enlisted in the Global Terrorism Database. Following are the diagrams generated from
the GTD after visualization of the contents based on attacks by year, fatalities by year, countries by total attack, and attacks by type. The diagrams below
have been plotted using “catplot()”. The above bar diagram shows us the number of attacks carried out every year from the year 1996 to 2017. We can
conclude that the attacks were increasing from the year 2011 to 2014 and then it started to gradually drop. The above bar diagram shows the number of
fatalities that happened every year from 1996 to 2017.It is evident that the most fatalities happened between the years 2011 to 2017. The above diagram
lists the countries based on the most number of terrorist acts acted upon. It is evident that Iran, Pakistan, Afghanistan and India are the top 4 countries
where most number of attacks have happened from the year 1996-2017. The above bar diagram depicts the total attacks by type. It is evident that
bombing and explosion followed by Armed Assault are the most preferred attack types with a total count of more than 90,000 attacks from the year 1996-
2017. Fig: Terrorism Hotspots The above World map shows the hottest Terrorist locations, showing active terrorist encounters in South and East Asia.
Weapon Classifier The weapon classifier was built using kNN algorithm that classifies the attacks based on types of weapons. We have chosen ‘K’ by trial
and error strategy for which we obtained the ideal outcome. We have calculated the neighbors from the GTD where k=12. The above graph was
generated using kNN algorithm by trial and error. The graph shows the accuracy for 12 different clustering and we finally got the most effective clustered
dataset when k was equal to 12. Thus, from the majority of the 12 attributes we predicted the weapons that could be used. The accuracy that we got
using the kNN algorithm was 88.74%. The above graph classifies the attacks by weapon types from the year 1996-2017. It is evident that explosion and
firearms are the most preferred weapon types. Perpetrator Classifier The perpetrator classifier classifies various groups or organization that carries out
illegal and influences terrorism. We used Random Forest Algorithm for creating the Perpetrator Classifier. We grouped and listed various groups
responsible for various attacks from 1996 to 2017 using random forest algorithm. A list of major perpetrator groups were displayed, along with the
accuracy, precision, recall and f1after the training of the model. Performance Metrics Following four types of performance metrics were generated using
Random Forest Algorithm. The formulas for each of the performance metrics along with the result obtained from our model are enlisted below.
Accuracy_score Accuracy: 0.9045279383429673 Precision Precision: 0.8995287972392408 Recall Recall: 0.9045279383429673 F1 F1: 0.894189908871535
Hence, we got accuracy of 90.45%, and precision of 89.95% from our model using the Random Forest Algorithm for creating Perpetrator Classifier. V.
Discussion and Conclusion Terrorism keeps on being a treat over the globe. Data Analytics and Machine Learning provide a promising way to deal with
the investigators and rapidly deciding the most probable perpetrator of a terrorist attack. In our project ,we have demonstrated how the methods like k-
Nearest Neighbour and Random Forest can predict the perpetrator precisely eight out of ten times. This enables the investigating organizations to
reduce the possibilities and act rapidly to get to the real perpetrators . We further mean to attempt different methods such as package classifiers and
deep learning models to improvise the accuracy of prediction. VI. REFERENCES Crime Data Mining, Threat Analysis and Prediction. Maryam Farsi, Alireza
Daneshkhah, Amin Hosseinian Far. (2018) Using Fuzzy Sets for Detecting Cyber Terrorism and Extremism in the Text. Vahide Nida Uzel , Esra Saraç Eşsiz
,Selma Ayşe Özel. (2018) Psychological and Behavioural examinations of online terrorism. Sheryl Prentice, Paul J. Taylor. (2018) Counter Terrorism on
Online Social Networks Using Web Mining Techniques. Fawad Ali, Farhan Hassan Khan, Saba Bashir, Uzair Ahmad. (2019) Complex Networks for Terrorist
Target Prediction. Gian Maria Campedelli, Iain Cruickshank, Kathleen M. Carley.(2018) Prediction of terrorist attacks based on GA-BP neural network.
Qinghao Li, Zonghua Zhang, Zhen Shen. (2019) Events classification and operation states considering terrorism in security analysis. A. Torres ; C.
Tranchita Text Classification Techniques Used to Faciliate Cyber Terrorism Investigation.•David Allister Simanjuntak ; Heru Purnomo Ipung ; Charles li ;
Anto Satriyo Nugroho.2010 Terrorism analytics: Learning to predict the perpetrator.Disha Talreja ; Jeevan Nagaraj ; N J Varsha ; Kavi Mahesh.2017 Positing
the problem: enhancing classification of extremist web content through textual analysis. George R. S. Weir ; Emanuel Dos Santos ; Barry Cartwright ;
Richard Frank. 2016 Positing the problem: enhancing classification of extremist web content through textual analysis. George R. S. Weir ; Emanuel Dos
Santos ; Barry Cartwright ; Richard Frank. 2016 Development of a Framework for Analyzing Terrorism Actions via Twitter Lists .Kuljeet Kaur. 2016 Anti
Social Comment Classification based on kNN Algorithm ,Nidhi Chandra , Sunil Kumar Khatri , Subhranil Som , 2017 An International Study on the Risk of
Cyber Terrorism . Suhannia Ponnusamy, Geetha A. Rubasundram , 2019 applications of artificial intelligence techniques to combating cyber crimes: a
review , Selma Dilek , Hüseyin Çakır and Mustafa Aydın. , 2015 Mining the Social Web to Analyze the Impact of Social Media on Socialization Md. Nazmus
Sadat, Shibbir Ahmed, and Muhammad Tasnim Mohiuddin Crime Pattern Detection Using Data Mining Shyam Varan Nath, 2006. Lexicon-Based Methods
for Sentiment Analysis Maite Taboada, Julian Brooke, Milan Tofiloski, Kimberly Voll, 2011 Sentiment Analysis of Twitter Data - Apoorv Agarwal, Boyi Xie, Ilia
Vovsha, Owen Rambow, Rebecca Passonneau Research on Prediction Method of Terrorist Attack Based on Random Subspace. Author(s) Luo Zijuan ; Ding
Shuai. 2017

Sources Similarity
Using Fuzzy Sets for Detecting Cyber Terrorism and Extremism in...Compare text
detecting terrorism evidence in text documents. conference paper.the education provided will help people find solutions in the against cyber terrorism. in avoiding cyber
terrorism crime the government is expected to cooperate with other developed countries that have a high level of security. 3%
https://www.researchgate.net/publication/329397018_Using_Fuzzy_Sets_for_Detecting_Cyber_Terrorism_and_Extremism_in_the_Text

Counter Terrorism on Online Social Networks Using Web Mining...Compare text


online social networks (osn) like twitter, facebook, linkedin, myspace, youtube and digg are getting very popular nowadays.therefore, it is the need of the hour to counter
such groups. web mining can be employed to detect terrorism related activities on online social networks. 3%
https://link.springer.com/chapter/10.1007/978-981-13-6052-7_21

Levels of education among Jihadist Terrorist LeadersCompare text


prediction of terrorist attacks based on ga-bp neural network.in the face of the development trend of terrorism, in-depth quantitative analysis of data related to terrorist
attacks will help deepen people's understanding of terrorism and provide valuable information support for counter-ter... 3%
https://www.researchgate.net/figure/Levels-of-education-among-Jihadist-Terrorist-Leaders_fig1_327238630

Events classification and operation states considering terrorism...Compare text


a classification that includes internal and external natural and unnatural or man caused events is important for proposing new security analysisin colombia during year
2002 about 500 towers were destroyed by terrorists. these kinds of events are the main cause of security problems in the power... 3%
https://www.researchgate.net/publication/224756131_Events_classification_and_operation_states_considering_terrorism_in_security_analysis

Identifying topical authorities in microblogs - Semantic ScholarCompare text


development of a framework for analyzing terrorism actions via twitter lists. kuljeet kaur. 2016 international conference on computational techniques in
informationlearning to find topic experts in twitter via different relations. weishu wei, gao cong, chunyan miao, feida zhu, guohui li. 2%
https://www.semanticscholar.org/paper/Identifying-topical-authorities-in-microblogs-Pal-
Counts/2dfe4aac9b60b3fbd1d29fd17439359baa0fb758

[PDF] Modelling Fixated Discourse in Chats with... - Semantic ScholarCompare text


anti social comment classification based on knn algorithm. nidhi chandra, sunil kumar khatri, subhranil som. 2017 6th international conference on reliability, infocom
technologies and optimizationprivacy protection protocol in social networks based on sexual predators detection. 2%
https://www.semanticscholar.org/paper/Modelling-Fixated-Discourse-in-Chats-with-Bogdanova-
Rosso/406e2c61a3872ea50f7e67b173c0e53973f46ec1

Developing an international cooperation on cyber... - Semantic ScholarCompare text


the term “cyber terrorism” is another source of controversy.@article{dogrul2011developingai, title={developing an international cooperation on cyber defense and
deterrence against cyber terrorism}, author={murat dogrul and adilan international study on the risk of cyber terrorism. 2%
https://www.semanticscholar.org/paper/Developing-an-international-cooperation-on-cyber-Dogrul-
Aslan/7395704cf0d2e2e14e7f3e5673cd014984762dcb

Scilit | Article - Mining the social web to analyze the impact of social...Compare text
socialization refers to the lifelong process of inheriting and disseminating norms, customs and ideologies, providing an individual with the skills and...md. nazmus sadat,
shibbir ahmed, muhammad tasnim mohiuddin. 2%
https://www.scilit.net/article/01e05c5c9aeb11c9aa96640b1e0582be

Apoorv Agarwal Boyi Xie Ilia Vovsha Owen Rambow Rebecca...Compare text
we examine sentiment analysis on twitter data. the contributions of this paper are: (1) we introduce pos-specic prior polarity fea-tures.vovsha is funded by nsf grant iis-
0916200. we would like to thank nextgen invent (ngi) corporation for providing us with the twitter data. 2%
https://pdfs.semanticscholar.org/ffe0/fa5f2ce6709ff6b1750f9bbc9e31929b25b2.pdf

Measuring the moments of distribution of durations of random time...Compare text


in a previous paper the theory of a test for the random distribution of events in time was considered. in the present paper a model is set up for a process in which events
occur in time in a dependantresearch on prediction method of terrorist attack based on random subspace. december 2017. 2%
https://www.researchgate.net/publication/326124913_Measuring_the_moments_of_distribution_of_durations_of_random_time_intervals

You might also like