A Novel Approach for Social Network Analysis & Web Mining for Counter Terrorism
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 11
Abstract
Terrorists and extremists are increasingly utilizing Internet technology as an effective mode to enhance their ability to influence the outside world. Lack of multilingual and multimedia terrorist/extremist collections and advanced analytical methodologies; limit our experiential understanding of their Internet usage. To address this research gap, we explore an integrated approach for identifying and collecting terrorist/extremist Web contents and to discover hidden relationships among communities. It has been shown in the literature that content analysis gives more insight of technical sophistication, content richness; whereas the link analysis focuses on the web interactivity. A dark web attribute system has made the sincere effort on identifying and comparing terrorist website with genuine web sites by using content and link analysis still there is scope in the same area as proposed in [1]. This proposed work focuses on identifying & analyzing new web page attributes. It is aimed to compare different terrorist/extremist sites with genuine sites and accordingly prepare metrics which can be further used for identification of other sites of terrorist/extremist groups. Also proposed work focus on to visualize and analyze hidden domestic terrorism communities and intercommunity relationships among all web sites in our collection.
Authors and Affiliations
Prof. G. A. Patil , Prof. K. B. Manwade , Mr. P. S. Landge
Sliding window approach based Text Binarisation from Complex Textual images
Abstract— Text binarisation process classifies individual pixels as text or background in the textual images. Binarization is necessary to bridge the gap between localization and recognition by OCR. This paper presents...
A Method for Group Formation Using Genetic Algorithm
Due to the increasing of complexity in software projects, group work is becoming more important in order to ensure quality software products can be delivered on time. Thus, in niversities, group work is seen as a good p...
SQL Injection in Oracle An exploration of vulnerabilities
Structured Query Language (SQL) injection is one of the most devastating vulnerabilities to impact a business, as it can lead to the exposure of sensitive information stored in an application’s database. SQL Injection ca...
Malaysian Car Number Plate Detection System Based on Template Matching and Colour Information
This paper presents a method for Malaysian car number plate detection system. This method utilizes template matching echnique to approximate the location of the number plate region. Using the output from this template m...
Automatic Detection of ECG R-R Interval using Discrete Wavelet Transformation
Detection of QRS-complexes takes an important role in the analysis of ECG signal, based on which the number of heart beats and an irregularity of a heart beat through R-R interval can be determined. Since an ECG may be o...