Extracting patterns from Global Terrorist Dataset (GTD) Using Co-Clustering approach

Journal Title: Journal of Independent Studies and Research - Computing - Year 2015, Vol 13, Issue 1

Abstract

Global Terrorist Dataset (GTD) is a vast collection of terrorist activities reported around the globe. The terrorism database incorporates more than 27,000 terrorism incidents from 1968 to 2014. Every record has spatial data, a period stamp, and a few different fields (e.g. strategies, weapon sorts, targets and wounds). There were few earlier studies to find interesting patterns from this textual gamut of data. The author believes that GTD has numerous interesting patterns still hidden and the full potential of this resource is still to be divulged. In this Independent Study, the author tries to investigate the GTD through co-clustering method for pattern discovery. Author has extracted textual data from GTD as per motivation to cluster the data in space and time simultaneously, through co-clustering. Co-clustering has become an important and powerful tool for data mining. By using co-clustering, bilateral data can be analysed by describing the connections between two different entities. There are many applications in the real world that can extensively benefits from this approach of co-clustering, such as market basket analysis and recommendation system. In this study, the effectiveness of coclustering model will be described by performing experiment on database of global terrorist events.

Authors and Affiliations

Keywords

Related Articles

Analytical Comparison of RSA and RSA with Chinese Remainder Theorem

RSA encryption algorithm is one of the most powerful public key encryption algorithm. The problem with RSA algorithm is that RSA decryption is relatively slow in comparison to RSA encryption. Chinese Remainder Theorem (C...

Performance Analysis of TCP and UDP over Mobile Ad hoc Network

In the network computing domain, mobile ad hoc networks (MANETs) have gained promi- nence during the recent years. These networks have been used in almost all domains of today’s life; especially in military and emergency...

Implementation of Adaptive Control Algorithm to Overcome the Traffic Congestion Problems of Karachi

Traffic controlling and management is a severe issue of urban cities as well as on high ways in developing countries like South Asian countries but here particularly, in Pakistan. The traffic congestion problem is becomi...

Probabilistic Vs. Soft Computing for Classifying Credit Card Transactions. A Case Study of Pakistani's Credit Card Data

Credit cards are now widely used by consumers for purchasing various goods and services due to widespread use of internet and consequential growth of E-commerce over the past few decades. This enhanced use of credit card...

The Impending 5G Era and Its Likely Impact on Society

This paper looks at the emergence of the fifth generation of wireless networks, commonly referred to by the acronym 5G, from a perspective informed by the literature on digital divides and digital inequality. 5G has been...

Download PDF file
  • EP ID EP643236
  • DOI 10.31645/jisrc/(2015).13.1.0002
  • Views 111
  • Downloads 0

How To Cite

(2015). Extracting patterns from Global Terrorist Dataset (GTD) Using Co-Clustering approach. Journal of Independent Studies and Research - Computing, 13(1), 7-13. https://europub.co.uk/articles/-A-643236