A Soft Computing Model to Counter Terrorism

被引:0
作者
Marappan, Karthikeyan [1 ]
Nallaperumal, Krishnan [2 ]
Kannan, K. Senthamarai [3 ]
Bensujin, B. [2 ]
机构
[1] Manonmaniam Sundaranar Univ, Ctr Informat Technol & Engn, Fac Engn, Comp & Informat Technol, Tirunelveli, India
[2] Manonmaniam Sundaranar Univ, Ctr Informat Technol & Engn, Tirunelveli, India
[3] Manonmaniam Sundaranar Univ, Dept Stat, Tirunelveli, India
来源
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY | 2008年 / 8卷 / 05期
关键词
CNet; decision tree; iXML; soft computing; and trifle;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the aftermath of September 11, the experts concluded that data mining could help it prevent future terrorist attacks. Experts are also concerned that in its zeal to apply technology to antiterrorism, the government could disrupt the crime-fighting processes of the agencies that are charged with finding and stopping terrorists before they act. The entire information or the evidence about a terrorist and the inclined behavior of some personalities are stored in interactive XML sheets (iXML), which are called as trifles, the piece of information. These trifles play a vital role in training the soft computing model and for pattern detection. These trifles in the form of iXML sheets are given in the network for pattern detection. The soft computing model used here is the Competitive Neural Tree (CNeT). The CNeT is the type of decision tree in which each node is compared and a decision will be taken to move to the next. In each stage the pattern recognition is done with the contents of the iXML nodes.
引用
收藏
页码:141 / 147
页数:7
相关论文
共 17 条
  • [1] A PERFORMANCE COMPARISON OF TRAINED MULTILAYER PERCEPTRONS AND TRAINED CLASSIFICATION TREES
    ATLAS, L
    COLE, R
    MUTHUSAMY, Y
    LIPPMAN, A
    CONNOR, J
    PARK, D
    ELSHARKAWI, M
    MARKS, RJ
    [J]. PROCEEDINGS OF THE IEEE, 1990, 78 (10) : 1614 - 1619
  • [2] Behnke S., 1996, Neural Network World, V6, P263
  • [3] Behnke S, 1996, IEEE IJCNN, P1439, DOI 10.1109/ICNN.1996.549111
  • [4] Behnke Sven, COMPETITIVE NEURAL T
  • [5] Brieman L., 1984, CLASSIFICATION REGRE
  • [6] OPTIMAL PARTITIONING FOR CLASSIFICATION AND REGRESSION TREES
    CHOU, PA
    [J]. IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1991, 13 (04) : 340 - 354
  • [7] CNeT, 1996, P IEEE INT C NEUR NE, P1439
  • [8] Intelligence collection for counter terrorism in massive information content
    Cousins, DB
    Weishar, DJ
    Sharkey, JB
    [J]. 2004 IEEE AEROSPACE CONFERENCE PROCEEDINGS, VOLS 1-6, 2004, : 3273 - 3282
  • [9] Fang L., 1991, P IJCNN 91, V3, P2709
  • [10] Karthikeyan M., 2007, INT J IMAGING SCI EN, V1, P132