Computational Robotics: An Alternative Approach for Predicting Terrorist Networks

E. Nwanga, K C OKAFOR, G. Chukwudebe, I. Achumba
{"title":"Computational Robotics: An Alternative Approach for Predicting Terrorist Networks","authors":"E. Nwanga, K C OKAFOR, G. Chukwudebe, I. Achumba","doi":"10.31875/2409-9694.2021.08.1","DOIUrl":null,"url":null,"abstract":"Increasing terrorist activities globally have attracted the attention of many researchers, policy makers and security agencies towards counterterrorism. The clandestine nature of terrorist networks have made them difficult for detection. Existing works have failed to explore computational characterization to design an efficient threat-mining surveillance system. In this paper, a computationally-aware surveillance robot that auto-generates threat information, and transmit same to the cloud-analytics engine is developed. The system offers hidden intelligence to security agencies without any form of interception by terrorist elements. A miniaturized surveillance robot with Hidden Markov Model (MSRHMM) for terrorist computational dissection is then derived. Also, the computational framework for MERHMM is discussed while showing the adjacency matrix of terrorist network as a determinant factor for its operation. The model indicates that the terrorist network have a property of symmetric adjacency matrix while the social network have both asymmetric and symmetric adjacency matrix. Similarly, the characteristic determinant of adjacency matrix as an important operator for terrorist network is computed to be -1 while that of a symmetric and an asymmetric in social network is 0 and 1 respectively. In conclusion, it was observed that the unique properties of terrorist networks such as symmetric and idempotent property conferred a special protection for the terrorist network resilience. Computational robotics is shown to have the capability of utilizing the hidden intelligence in attack prediction of terrorist elements. This concept is expected to contribute in national security challenges, defense and military intelligence.","PeriodicalId":234563,"journal":{"name":"International Journal of Robotics and Automation Technology","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Robotics and Automation Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31875/2409-9694.2021.08.1","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

Increasing terrorist activities globally have attracted the attention of many researchers, policy makers and security agencies towards counterterrorism. The clandestine nature of terrorist networks have made them difficult for detection. Existing works have failed to explore computational characterization to design an efficient threat-mining surveillance system. In this paper, a computationally-aware surveillance robot that auto-generates threat information, and transmit same to the cloud-analytics engine is developed. The system offers hidden intelligence to security agencies without any form of interception by terrorist elements. A miniaturized surveillance robot with Hidden Markov Model (MSRHMM) for terrorist computational dissection is then derived. Also, the computational framework for MERHMM is discussed while showing the adjacency matrix of terrorist network as a determinant factor for its operation. The model indicates that the terrorist network have a property of symmetric adjacency matrix while the social network have both asymmetric and symmetric adjacency matrix. Similarly, the characteristic determinant of adjacency matrix as an important operator for terrorist network is computed to be -1 while that of a symmetric and an asymmetric in social network is 0 and 1 respectively. In conclusion, it was observed that the unique properties of terrorist networks such as symmetric and idempotent property conferred a special protection for the terrorist network resilience. Computational robotics is shown to have the capability of utilizing the hidden intelligence in attack prediction of terrorist elements. This concept is expected to contribute in national security challenges, defense and military intelligence.
计算机器人:预测恐怖分子网络的另一种方法
全球恐怖活动的增加引起了许多研究人员、政策制定者和安全机构对反恐的关注。恐怖主义网络的秘密性质使其难以被发现。现有的工作未能探索计算表征来设计有效的威胁采矿监视系统。本文研制了一种能够自动生成威胁信息并将其传输给云分析引擎的计算感知监控机器人。该系统向安全机构提供隐藏的情报,而不会被恐怖分子进行任何形式的拦截。在此基础上,推导了一种基于隐马尔可夫模型(MSRHMM)的微型恐怖分子计算解剖监视机器人。此外,本文还讨论了MERHMM的计算框架,并将恐怖分子网络的邻接矩阵作为其运行的决定因素。该模型表明,恐怖网络具有对称邻接矩阵的性质,而社交网络具有不对称和对称邻接矩阵的性质。同样,作为恐怖网络重要算子的邻接矩阵的特征行列式计算为-1,而在社会网络中对称和不对称的特征行列式计算分别为0和1。总之,我们观察到恐怖主义网络的独特性质,如对称和幂等性质,为恐怖主义网络的弹性提供了特殊的保护。计算机器人在恐怖分子攻击预测中具有利用隐藏智能的能力。这一概念有望在国家安全挑战、国防和军事情报方面做出贡献。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信