Professional Documents
Culture Documents
Report 2
Report 2
Table of content
1. INTRODUCTION ........................................................................................................................................................... 2
2. SUMMARY .................................................................................................................................................................. 2
3. CRITIQUE ..................................................................................................................................................................... 3
CONCLUSION ....................................................................................................................................................................... 4
1. Introduction
Terrorism is a global security concern that requires proper analysis to understand the
nature of it, trends and patterns. The journal article Analyzing Relationships in Terrorism
Big Data Using Hadoop and Statistics aims to provide a full analysis of terrorism data
using big data technologies such as Hadoop and statistical techniques. The paper
proposes a novel approach to identify hidden relationships and patterns among terrorist
activities that can lead to identify potential terrorist attacks.
2. Summary
The authors showed a methodology for analyzing terrorism big data using Hadoop and
statistical techniques. They use datasets such as the Global Terrorism Database and the
Worldwide Incidents Tracking System for analyzing terrorism data.
Hadoop is used for processing large volumes of data and Apache Hive is used for data
querying.
Also used statistical techniques such as clustering, principal component analysis (PCA)
and network analysis are used to identify hidden relationships and patterns in the data.
The results indicate that the proposed approach provides a Full analysis of terrorism
data and can lead to identify potential terrorist attacks.
3. Critique
While the article presents a comprehensive methodology for analyzing terrorism data,
there are some limitations that need attention.
Conclusion
in the end of the report the article showed us a way for analyzing terrorism data using
big data technologies and statistical techniques and the approach that been used
provides a full analysis of terrorism data and lead to identify potential terrorist attacks.
So that the paper has a few limitations about 4 limitations that mentioned earlier that
requires attention:
providing more details about the datasets used in the analysis explaining the statistical
techniques used in the analysis