Professional Documents
Culture Documents
Using Global Terrorism Database (GTD) and Web Data Mining To Predict Terrorism and Threat in Social Media Texts
Using Global Terrorism Database (GTD) and Web Data Mining To Predict Terrorism and Threat in Social Media Texts
Using Global Terrorism Database (GTD) and Web Data Mining To Predict Terrorism and Threat in Social Media Texts
Chennai,India
These examinations for the most part There are number of strategies and
included the various kinds of trolling which procedures to examine the human brain
happens and the persuasive explanation for research however computational models
and techniques have not been created to B. Data Preprocessing
naturally identify antisocial practices in
The GTD incorporates in excess of 170,000
online networks. Messages and content
instances of terrorist events far and wide from
floats on interpersonal organization is either
1970 to 2017. For every occurrence, data is
unstructured or unclassified information and
accessible on the area and date of the comparing
turns into the significant obstacle to locate a
episode, summing up to 132 characteristics. Be
reasonable technique to naturally identify
that as it may, the information was gathered
the anti-social behavior.
from various information assets, which would
bring about information inconsistence.
Regarding this issue, we set the limit of offer
III. DESIGN AND METHODOLOGY
proportion as 20%, which means just those traits
The accompanying approach was intended that are recorded inside over 20% of the all-out
to accomplish the paper's target: cases will be considered. After measurable
investigation, 59 properties were chosen yet
missing information still exist in a portion of the
records. To take care of this issue, we utilize the
Mean Imputation (MI) strategy, trading the
missing information for a given property by the
mean of every single known estimation of that
trait in the class where the missing quality has a
place
Fig:1-Nearest Neighbor
Random Forest algorithm was best suitable for Weapon
Classifier and similarly Random Forest
RF merges the benefits of two machine Algorithm stood out to be best for Perpetrator
learning techniques bagging and random classifier on our multiple attempts using
selection. Bagging makes forecasts by various algorithms. The whole data set was
majority vote of trees via training each tree divided into training set and testing set at the
on bootstrap test of the training. Random ratio of 8:2 for training and testing our model.
feature selection looks at every node for the
best part over a random subset of the
highlights. It is a renowned coordinated A. Visualization
learning algorithm by taking decision tree as
the fundamental classifier. It has We have visualized various contents from the
demonstrated its accomplishment in Global Terrorism Database, to better
applications like email spam filtering, voice understand the Datasets we are provided
classification, and picture classification and with. We have visualized various attributes
from the year 1996 to 2017 that were enlisted
text classifier. To order another document
in the Global Terrorism Database. Following
from the information vector, it passes the
are the diagrams generated from the GTD after
information vector through every one of the
visualization of the contents based on attacks
trees of the forests with each tree giving a
by year, fatalities by year, countries by total
result, i.e an classification, which is named
attack, and attacks by type. The diagrams
as "votes" for that specific class. Like the below have been plotted using “catplot()”.
election results, the last result would be the
class that has the most votes. The main
features of RF are:
Performance Metrics
Following four types of performance
metrics were generated using Random
Forest Algorithm. The formulas for each of
the performance metrics along with the
result obtained from our model are
enlisted below.
Accuracy_score
VI. REFERENCES
Precision: 0.8995287972392408
1. Crime Data Mining, Threat Analysis and
Prediction. Maryam Farsi,
Alireza Daneshkhah,
Amin Hosseinian Far. (2018)
Recall
2. Using Fuzzy Sets for Detecting Cyber
Terrorism and Extremism in the Text.
Vahide Nida Uzel , Esra Saraç Eşsiz
Recall: 0.9045279383429673 ,Selma Ayşe Özel. (2018)
3. Psychological and Behavioural
examinations of online terrorism. Sheryl
Prentice, Paul J. Taylor. (2018)
F1 4. Counter Terrorism on Online Social
Networks Using Web Mining
Techniques. Fawad Ali,
Farhan Hassan Khan, Saba Bashir,
F1: 0.894189908871535 Uzair Ahmad. (2019)
5. Complex Networks for Terrorist Target
Prediction. Gian Maria Campedelli,
Hence, we got accuracy of 90.45%, and precision Iain Cruickshank,
of 89.95% from our model using the Random Kathleen M. Carley.(2018)
Forest Algorithm for creating Perpetrator 6. Prediction of terrorist attacks based on
Classifier. GA-BP neural network. Qinghao
Li, Zonghua Zhang, Zhen Shen. (2019)
7. Events classification and operation
V. Discussion and Conclusion states considering terrorism in security
analysis. A. Torres ; C. Tranchita
Terrorism keeps on being a treat over the
8. Text Classification Techniques Used to
globe. Data Analytics and Machine Learning
provide a promising way to deal with the Faciliate Cyber Terrorism
investigators and rapidly deciding the most Investigation.•David Allister
probable perpetrator of a terrorist attack. In Simanjuntak ; Heru Purnomo Ipung ;
Charles li ; Anto Satriyo Nugroho.2010
our project ,we have demonstrated how the
methods like k-Nearest Neighbour and 9. Terrorism analytics: Learning to predict
Random Forest can predict the perpetrator the perpetrator.Disha Talreja ; Jeevan
precisely eight out of ten times. This enables Nagaraj ; N J Varsha ; Kavi Mahesh.2017
the investigating organizations to reduce the
possibilities and act rapidly to get to the real
perpetrators . We further mean to attempt
10. Positing the problem: enhancing 15. applications of artificial intelligence
classification of extremist web content techniques to combating cyber crimes: a
through textual analysis. George R. S. review , Selma Dilek , Hüseyin Çakır and
Weir ; Emanuel Dos Santos ; Barry Mustafa Aydın. , 2015
Cartwright ; Richard Frank. 2016 16. Mining the Social Web to Analyze the
Impact of Social Media on Socialization
11. Positing the problem: enhancing Md. Nazmus Sadat, Shibbir Ahmed, and
classification of extremist web content Muhammad Tasnim Mohiuddin
through textual analysis. George R. S. 17. Crime Pattern Detection Using Data
Weir ; Emanuel Dos Santos ; Barry Mining Shyam Varan Nath, 2006.
Cartwright ; Richard Frank. 2016 18. Lexicon-Based Methods for Sentiment
12. Development of a Framework for Analysis Maite Taboada, Julian Brooke,
Analyzing Terrorism Actions via Twitter Milan Tofiloski, Kimberly Voll, 2011
Lists .Kuljeet Kaur. 2016 19. Sentiment Analysis of Twitter Data -
13. Anti Social Comment Classification Apoorv Agarwal, Boyi Xie, Ilia Vovsha,
based on kNN Algorithm ,Nidhi Chandra Owen Rambow, Rebecca Passonneau
, Sunil Kumar Khatri , Subhranil Som , 20. Research on Prediction Method of
2017 Terrorist Attack Based on Random
14. An International Study on the Risk of Subspace. Author(s) Luo Zijuan ; Ding
Cyber Terrorism . Suhannia Ponnusamy, Shuai. 2017
Geetha A. Rubasundram , 2019