Terrorist organization network mining algorithm

A technology of mining algorithms and organizing networks, which is applied in the field of computer networks

Active Publication Date: 2017-09-08
杨娟
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, none of the above research results excavated the network of t...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terrorist organization network mining algorithm
  • Terrorist organization network mining algorithm
  • Terrorist organization network mining algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The present invention will be described in further detail below.

[0039] Random set evidence reasoning has a strong ability to deal with dynamic uncertain information. The biggest feature of its method of dealing with problems is that it retains all known information and directly participates in quantitative calculations, which can minimize accumulated errors. Furthermore, no artificial assumptions have been made other than the raw data, in order to be as faithful as possible to the information presented. Therefore, it has become a powerful tool for analyzing the random dynamic information of the terrorist organization network. The concept of topological potential is proposed based on data field theory in cognitive physics. The size of the topological potential describes the potential value of a node in the network topology under the joint influence of itself and neighboring nodes, and can describe its ability to influence other nodes. As a powerful tool for network...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a terrorist organization network mining algorithm which comprises the following steps of: S1, constructing a suspected node connection network; S2, calculating a threat degree measured value of each node in the suspected node connection network; S3, calculating a topology potential of each node in the suspected node connection network; S4, sorting the topology potential of each node, which is obtained in the step S3, by adopting a rapid sorting method, and finding out a local maximum potential value node; and S5, by using the nodes with the relatively high topology potentials as center nodes, outputting terrorist organization networks N1, N2,..., Nt. Compared with a conventional method for judging node importance of the terrorist organization networks by using a node degree as an index, the method can more efficiently mine the terrorist organization networks and important nodes in the terrorist organization networks and discloses an internal network structure among terrorist organizations.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a terrorist organization network mining algorithm based on random set evidence reasoning and improved topological potential. Background technique [0002] After the "9.11" incident, terrorism has become a hot issue of global concern. With the in-depth application of the Internet and Web 2.0 technology, even terrorists who have never met in various parts of the world can also use this to connect and form a "dark network" hidden in cyberspace - a network of terrorist organizations. [0003] There have been some research results on the network of terrorist organizations. Based on known terrorist individuals and organizations, Li Benxian et al. analyzed their development process from individual to group, group to network, and constructed a terrorist organization group network model; Xu Qing et al. 3,411 terrorist incidents, constructed a network of terrorist organizations...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24G06F17/30
CPCG06F16/2465H04L41/14
Inventor 杨娟
Owner 杨娟
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products