CFP last date
01 January 2025
Reseach Article

A Survey of the Factors of Optimal Noise Reduction Algorithm for Terrorist Web Mining

by R.D. Gaharwar, D.B. Shah, G.K.S. Gaharwar
Communications on Applied Electronics
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 6
Year of Publication: 2016
Authors: R.D. Gaharwar, D.B. Shah, G.K.S. Gaharwar
10.5120/cae2016652121

R.D. Gaharwar, D.B. Shah, G.K.S. Gaharwar . A Survey of the Factors of Optimal Noise Reduction Algorithm for Terrorist Web Mining. Communications on Applied Electronics. 4, 6 ( March 2016), 27-30. DOI=10.5120/cae2016652121

@article{ 10.5120/cae2016652121,
author = { R.D. Gaharwar, D.B. Shah, G.K.S. Gaharwar },
title = { A Survey of the Factors of Optimal Noise Reduction Algorithm for Terrorist Web Mining },
journal = { Communications on Applied Electronics },
issue_date = { March 2016 },
volume = { 4 },
number = { 6 },
month = { March },
year = { 2016 },
issn = { 2394-4714 },
pages = { 27-30 },
numpages = {9},
url = { https://www.caeaccess.org/archives/volume4/number6/561-2016652121/ },
doi = { 10.5120/cae2016652121 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-09-04T19:54:13.324884+05:30
%A R.D. Gaharwar
%A D.B. Shah
%A G.K.S. Gaharwar
%T A Survey of the Factors of Optimal Noise Reduction Algorithm for Terrorist Web Mining
%J Communications on Applied Electronics
%@ 2394-4714
%V 4
%N 6
%P 27-30
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Over the past few decades there have been frequent terrorist attacks around the world including India. This article describes Terrorist Network Mining and problems faced during studying such networks. A major challenge faced by the law enforcement agencies is the large crime ‘raw’ data volumes and the lack of sophisticated network analysis tools and techniques to utilize the data effectively and efficiently. This article states different data collection techniques used for terrorist networks. The major challenge is the development of the optimal noise reduction algorithm which will help in creating accurate linkage map of terrorist network without the loss of any key player node. This article successfully lists the factors that can be taken under consideration during generation of optimal noise reduction algorithm for Terrorist Web Mining. Once the accurate linkage map is generated the identification and removal of the key player for the destabilization of terrorist networks will become lot easier.

References
  1. T. Bhatia, "Link Analysis Algorithm For Web Mining”, International Journal of Computer Science And Technology, Vol. 2, Issue 2, June 2011, pp. 243-246.
  2. Monika Yadav and Pradeep Mittal, "Web Mining: An Introduction," International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 3, no. 3, March 2013, pp. 683-687.
  3. N. Chaurasia, A. Tiwari, ”Novel Algorithm for Terrorist Network Mining”, International Journal of Computer Science And Communication Technologies, Vol. 6, no. 1, July 2013, pp. 898-903.
  4. R. D. Gaharwar, D. B. Shah, G.K.S. Gaharwar, "Proposed Architecture for Terrorist Web Miner," International Journal of Computer Applications, Vol. 128, no. 9, October 2015, pp. 18-20.
  5. S. N. Mishra, A. Jaiwal, A. Ambhaikar, ”An Effective Algorithm for Web Mining Based on Topic Sensitive Link Analysis”, International Journal of Advance Research in Computer Science and Software Engineering, Vol. 2, Issue 4, April 2012, pp. 278-282.
  6. K. Lal, N. C. Mahanti, “A Novel Data Mining Algorithm for Semantic Web Based Data Cloud”, International Journal of Computer Science and Security, Vol. 4, Issue 2, 2010, pp. 160-175.
  7. R. . D. Gaharwar, D. B. Shah, and G.K.S. Gaharwar, "Terrorist Network Mining: Issues and Challenges," International Journal of Advance Research in Science and Engineering, Vol. 4, no. 1, 2015, pp. 33-37.
  8. V. E. Krebs, "Mapping networks of terrorist cells”, Connections 24, March 2001, pp. 43–52.
  9. Y. Elovici, A. Kandel, M. Last, B. Shapira, O. Zaafrany, “Using Data Mining Techniques for Detecting Terror-Related Activities on the Web”, Proc. Second Int’l Conf. on Computer and Electrical Engineering (ICCEE 2009), 2009, pp. 152-157
  10. V. E. Krebs, (2002), “Uncloacking Terrorist Networks”, First Monday, Vol. 7, 2002, pp. 4 - 1.
Index Terms

Computer Science
Information Sciences

Keywords

Social Network Analysis Terrorist Networks Terrorist Network Mining