Extracting patterns from Global Terrorist Dataset (GTD) Using Co-Clustering approach
Journal Title: Journal of Independent Studies and Research - Computing - Year 2015, Vol 13, Issue 1
Abstract
Global Terrorist Dataset (GTD) is a vast collection of terrorist activities reported around the globe. The terrorism database incorporates more than 27,000 terrorism incidents from 1968 to 2014. Every record has spatial data, a period stamp, and a few different fields (e.g. strategies, weapon sorts, targets and wounds). There were few earlier studies to find interesting patterns from this textual gamut of data. The author believes that GTD has numerous interesting patterns still hidden and the full potential of this resource is still to be divulged. In this Independent Study, the author tries to investigate the GTD through co-clustering method for pattern discovery. Author has extracted textual data from GTD as per motivation to cluster the data in space and time simultaneously, through co-clustering. Co-clustering has become an important and powerful tool for data mining. By using co-clustering, bilateral data can be analysed by describing the connections between two different entities. There are many applications in the real world that can extensively benefits from this approach of co-clustering, such as market basket analysis and recommendation system. In this study, the effectiveness of coclustering model will be described by performing experiment on database of global terrorist events.
Implementation of Discrete Fourier Transform and Orthogonal Discrete Wavelet Transform in Python
This paper presents implementation of Discrete Fourier Transform and Orthogonal Discrete Wavelet Transform in Python computer programming language. The Fourier Transform is a fundamental signal processing tool whereas th...
Improving Query Response Time for Graph Data Using Materialization
Graphs are used in many disciplines, from communication networks, biological, social networks includ- ing maths and other fields of science. This is the latest and most important field of computer science today. In this...
Classification and Comparison of Hepatitis-C using Data Mining Technique
The major focus in this paper is to get the factors that shows the significance in predicting the risks of virus of hepatitis-C. 2 datasets were used for this purpose the first one is gathered from UCI Repository and the...
Performance Analysis of Table Driven and Event Driven Protocols for Voice and Video Services in MANET
This research paper encompasses the performance analysis of table driven and event driven routing protocols by using voice and video traffic in mobile Adhoc network (MANET). Particularly, OLSR (table driven) and DSR (Eve...
Constructing Ghost Free High Dynamic Range Images Using Convolutional Neural Network and Structural Similarity Index
A foreign object, commonly called as a ghost artifact, is integrated in the HDR output image when there is a moving object in the photography scene. The problem is persisting even after numerous models proposed by resear...