Unlock instant, AI-driven research and patent intelligence for your innovation.

A Data Mining System for Terrorist Attacks

A data mining and event technology, applied in database models, data processing applications, structured data retrieval, etc., can solve problems such as lack of solutions, and achieve high accuracy and execution efficiency.

Active Publication Date: 2021-06-25
SHANDONG NORMAL UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To sum up, it is beneficial to data mining technology to discover the correlation between terrorist attacks and criminal gangs, and to improve the performance of related models, and there is still a lack of effective solutions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Data Mining System for Terrorist Attacks
  • A Data Mining System for Terrorist Attacks
  • A Data Mining System for Terrorist Attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] It should be pointed out that the following detailed description is exemplary and intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0074] It should be noted that the terminology used here is only for describing specific implementations, and is not intended to limit the exemplary implementations according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combinations thereof.

[0075] A typical embodiment of the present invention is to predict the correlation degree of criminal gangs for ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure discloses a data mining method for terrorist attack events. The historical data of each historical event is processed to obtain several historical data points; the data to be measured of the event to be predicted is processed to obtain the data points to be measured; Perform dimensionality reduction processing on all historical data points; perform subspace clustering on the results after dimensionality reduction processing, and obtain historical data clusters of different dimensions through subspace clustering; calculate the data points to be measured and each data in the historical data clusters The distance between objects, the distance from the data point to be tested to the nearest data object in the corresponding cluster is taken as the distance from the data point to be tested to the cluster, if the distance from the data point to be tested to the cluster is within the set range, then The matching is successful, otherwise the matching fails; finally, for the data points to be tested that are successfully matched, they are sorted according to the distance from the data points to be tested to the clusters from small to large, and the names of the criminal gangs of the top M historical events are used as output values output.

Description

technical field [0001] The present disclosure relates to the technical field of data analysis and mining, in particular to a data mining method for terrorist attacks. Background technique [0002] The statements in this section merely enhance the background related to the present disclosure and may not necessarily constitute prior art. [0003] Since the 1990s, terrorist attacks of various scales have occurred in many parts of the world, with a tendency to spread rapidly around the world, reminding people that the threat of terrorism to mankind cannot be ignored. Therefore, the relevant security departments attach great importance to the collection of data on terrorist organizations and terrorist attacks and the construction of related databases. [0004] Data mining is a process of automatically discovering useful information in a large data repository, generally including data preprocessing, data mining and postprocessing. At present, there are many applications of data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/28G06F16/215G06Q50/26
CPCG06Q50/265
Inventor 马璐璐赵丽丽王彩雨王峰俞凤萍张伟闫晓燕胡斌
Owner SHANDONG NORMAL UNIV