{"title":"一种基于Naïve贝叶斯算法的乘客数据分类新方法(一种实时反恐方法)","authors":"Saurabh Singh, Shashikant Verma, Akhilesh Tiwari, Aditya Tiwari","doi":"10.1109/NGCT.2016.7877433","DOIUrl":null,"url":null,"abstract":"Terrorist Data Mining basically means to encounter all the data of terrorism from the huge amount of data. In a more intricate way we all know that terrorist set their foot into any predominant place through railway station, bus stands or airport. Usually to communicate they use their cell phones and network. Now if these areas are well equipped with LAN or WAN, that is the Wi-Fi connections surely these terrorist would avail themselves. Then with the help of data used by terrorists their presence can be spotted easily and their information can be collected. This paper describes a novel work to counter the presence of terrorist at public place in a well-defined manner.","PeriodicalId":326018,"journal":{"name":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A novel way to classify passenger data using Naïve Bayes algorithm (A real time anti-terrorism approach)\",\"authors\":\"Saurabh Singh, Shashikant Verma, Akhilesh Tiwari, Aditya Tiwari\",\"doi\":\"10.1109/NGCT.2016.7877433\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Terrorist Data Mining basically means to encounter all the data of terrorism from the huge amount of data. In a more intricate way we all know that terrorist set their foot into any predominant place through railway station, bus stands or airport. Usually to communicate they use their cell phones and network. Now if these areas are well equipped with LAN or WAN, that is the Wi-Fi connections surely these terrorist would avail themselves. Then with the help of data used by terrorists their presence can be spotted easily and their information can be collected. This paper describes a novel work to counter the presence of terrorist at public place in a well-defined manner.\",\"PeriodicalId\":326018,\"journal\":{\"name\":\"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NGCT.2016.7877433\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 2nd International Conference on Next Generation Computing Technologies (NGCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NGCT.2016.7877433","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A novel way to classify passenger data using Naïve Bayes algorithm (A real time anti-terrorism approach)
Terrorist Data Mining basically means to encounter all the data of terrorism from the huge amount of data. In a more intricate way we all know that terrorist set their foot into any predominant place through railway station, bus stands or airport. Usually to communicate they use their cell phones and network. Now if these areas are well equipped with LAN or WAN, that is the Wi-Fi connections surely these terrorist would avail themselves. Then with the help of data used by terrorists their presence can be spotted easily and their information can be collected. This paper describes a novel work to counter the presence of terrorist at public place in a well-defined manner.