Data mining method and system for screening terrorist attack event criminal gangs

An event and data technology, applied in the field of data mining to screen terrorist gangs, can solve problems such as lack of solutions

Active Publication Date: 2019-04-19
SHANDONG NORMAL UNIV
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To sum up, it is beneficial to data mining technology to discover the correlation between terrorist attacks and criminal gangs, and to improve the performance of related models, but there is still a lack of effective solutions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data mining method and system for screening terrorist attack event criminal gangs
  • Data mining method and system for screening terrorist attack event criminal gangs
  • Data mining method and system for screening terrorist attack event criminal gangs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0107] It should be pointed out that the following detailed description is exemplary and intended to provide further explanation to the present application. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs.

[0108] It should be noted that the terminology used here is only for describing specific embodiments, and is not intended to limit the exemplary embodiments according to the present application. As used herein, unless the context clearly dictates otherwise, the singular is intended to include the plural, and it should also be understood that when the terms "comprising" and / or "comprising" are used in this specification, they mean There are features, steps, operations, means, components and / or combinations thereof.

[0109] A typical embodiment of the present invention is to predict the correlation degree of criminal gangs for the dete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data mining method and system for screening terrorist attack event criminal gangs. Through Analysis of relevant data and Data cleaning, Data preprocessing is achieved throughdata conversion, data fusion is added to enrich relevant characteristics, then useful information is mined to construct a standardized data set, criminal gang division and classification are achievedthrough a subspace clustering method, and then the relevant relation between a terrorist attack event and the criminal gang is determined through a relevancy model, so that the terrorist attack earlywarning effect is achieved.

Description

technical field [0001] The present disclosure relates to the technical field of data analysis and mining, in particular to a data mining method and system for screening terrorist attack criminal gangs. Background technique [0002] The statements in this section merely enhance the background related to the present disclosure and may not necessarily constitute prior art. [0003] Since the 1990s, terrorist attacks of various scales have occurred in many parts of the world, with a tendency to spread rapidly around the world, reminding people that the threat of terrorism to mankind cannot be ignored. Therefore, the relevant security departments attach great importance to the collection of data on terrorist organizations and terrorist attacks and the construction of related databases. At the same time, a series of researches have been carried out on data mining based on related databases. [0004] Data mining is a process of automatically discovering useful information in a lar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/28G06F16/215G06Q50/26
CPCG06Q50/265
Inventor 王红赵丽丽王彩雨王峰俞凤萍胡斌闫晓燕张伟
Owner SHANDONG NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products