Supercharge Your Innovation With Domain-Expert AI Agents!

Data mining method for terrorist attack events

A data mining and event technology, applied in database models, data processing applications, structured data retrieval, etc., can solve problems such as lack of solutions

Active Publication Date: 2019-04-05
SHANDONG NORMAL UNIV
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To sum up, it is beneficial to data mining technology to discover the correlation between terrorist attacks and criminal gangs, and to improve the performance of related models, but there is still a lack of effective solutions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data mining method for terrorist attack events
  • Data mining method for terrorist attack events
  • Data mining method for terrorist attack events

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] It should be pointed out that the following detailed description is exemplary and intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0074] It should be noted that the terminology used here is only for describing specific embodiments, and is not intended to limit the exemplary embodiments according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combinations thereof.

[0075] A typical embodiment of the present invention is to predict the correlation degree of criminal gangs for the dete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data mining method for terrorist attack events. The data mining method comprises the following steps: processing historical data of each historical event to obtain a plurality of historical data points; Processing the to-be-tested data of the to-be-predicted event to obtain a to-be-tested data point; Carrying out dimension reduction processing on all the obtained historical data points; Carrying out subspace clustering on the result after dimension reduction processing, and obtaining historical data class clusters with different dimensions through subspace clustering;Calculating the distance between the to-be-tested data point and each data object in the historical data class cluster, taking the distance between the to-be-tested data point and the nearest data object in the corresponding class cluster as the distance between the to-be-tested data point and the class cluster, if the distance between the to-be-tested data point and the class cluster is within aset range, indicating that the matching is successful, otherwise, indicating that the matching fails; And finally, aiming at the successfully matched to-be-tested data points, sorting the to-be-tested data points according to the distances from the to-be-tested data points to the class cluster from small to large, and outputting the gang names of the crime groups of the former M historical eventsas output values.

Description

technical field [0001] The present disclosure relates to the technical field of data analysis and mining, in particular to a data mining method for terrorist attacks. Background technique [0002] The statements in this section merely enhance the background related to the present disclosure and may not necessarily constitute prior art. [0003] Since the 1990s, terrorist attacks of various scales have occurred in many parts of the world, with a tendency to spread rapidly around the world, reminding people that the threat of terrorism to mankind cannot be ignored. Therefore, the relevant security departments attach great importance to the collection of data on terrorist organizations and terrorist attacks and the construction of related databases. At the same time, a series of researches have been carried out on data mining based on related databases. [0004] Data mining is a process of automatically discovering useful information in a large data repository, generally inclu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/28G06F16/215G06Q50/26
CPCG06Q50/265
Inventor 马璐璐赵丽丽王彩雨王峰俞凤萍张伟闫晓燕胡斌
Owner SHANDONG NORMAL UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More