TOWARD A COMPREHENSIVE TERRORIST PREDICITION IN SOCIAL NETWORK
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 4, Issue 10
Abstract
Social network analysis can play significant role in detecting human personality. Consequently, special personality characteristics can be analyzed to predict potential terrorism actions. These features could be conducted by using different social representations such as athletics, social and regional characteristics and so on. Data can be mined to result set of people with common features and categories. Based on that, people can be clustered according to their affiliation clustering on scale of dangerous and peaceful ones. Herein, a social network partitioning and clustering model is implemented to detect how close is a citizen to terrorism or a terrorist.
Authors and Affiliations
Ahmad F. Al Musawi
NETWORK LAYER SECRECY PERFORMANCE OF THE FORWARDING FUNCTIONALITY USING DSA GENERATION
A full duplex system with sources, relay and destination nodes for secrecy communication in the presence of an eavesdropper is investigated. Using geometrical perspective the secrecy region of secrecy performance...
TENSILE STRENGTH OF WELDED MILD STEEL SPECIMEN ON UNIVERSAL TESTING MACHINE
The aim of my paper is to find the various properties of mild steel specimen which is welded by mainly three welding . Quality and productivity play important role in today’s manufacturing market. Now a day’s due...
A DRILLABILITY AND GEOMECHANICAL WELBORE STABILITY ANALYSIS FOR OPTIMAL BIT SELECTION - CASE STUDY OF A FIELD IN NIGER DELTA
This paper establishs the importance of hard streak in bit selection. The hard streak is associated with siliceousferruginous sandstone with traces of siltstone rapped in augen of shale. Hitherto the drilling indu...
A Review on 4G Communication Network
The development of broadband wireless access technologies in recent years was the result of growing demand for mobile internet and multimedia application. With the growing user demands, the third generation (3G) n...
Implementation on Distributed Network Services Using SSO for Secure Mechanism
Key Agreement and User Authentication is an prime issues for creating and maintaining a security in distributed network .Legal User may able to access services of different providers. Recently there are some user...