{"title":"基于模糊的社会网络优化,特别涉及恐怖分子网络的挖掘","authors":"Suraksha Tiwari, Shilky Shrivastava, Manish Gupta","doi":"10.1109/ICCN.2015.32","DOIUrl":null,"url":null,"abstract":"The vast region of Social network analysis has led the law enforcement agencies to study the behavior of social network. Law enforcement agencies in the world have begun to study on advanced knowledge discovery technologies to assist in the analysis of terrorist's information. The use of such type of technologies is treated as intelligence tools to combat terrorism by anticipating activity of terrorists. This terrorism activity can be predicted by discovering suspicious nodes in the network. In the way of discovering suspicious nodes we propose a method to reduce the size of network or to reduce the no. of nodes in the network because the size of network is emerging problem in SNA. In our method we use fuzzy for reduction of network so that reduced network consists only set of potential nodes. After applying our method we get a reduced network with high possibility of terrorist nodes in network.","PeriodicalId":431743,"journal":{"name":"2015 International Conference on Communication Networks (ICCN)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Fuzzy based optimization of social network with special reference to terrorist network mining\",\"authors\":\"Suraksha Tiwari, Shilky Shrivastava, Manish Gupta\",\"doi\":\"10.1109/ICCN.2015.32\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The vast region of Social network analysis has led the law enforcement agencies to study the behavior of social network. Law enforcement agencies in the world have begun to study on advanced knowledge discovery technologies to assist in the analysis of terrorist's information. The use of such type of technologies is treated as intelligence tools to combat terrorism by anticipating activity of terrorists. This terrorism activity can be predicted by discovering suspicious nodes in the network. In the way of discovering suspicious nodes we propose a method to reduce the size of network or to reduce the no. of nodes in the network because the size of network is emerging problem in SNA. In our method we use fuzzy for reduction of network so that reduced network consists only set of potential nodes. After applying our method we get a reduced network with high possibility of terrorist nodes in network.\",\"PeriodicalId\":431743,\"journal\":{\"name\":\"2015 International Conference on Communication Networks (ICCN)\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Communication Networks (ICCN)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCN.2015.32\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Communication Networks (ICCN)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCN.2015.32","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fuzzy based optimization of social network with special reference to terrorist network mining
The vast region of Social network analysis has led the law enforcement agencies to study the behavior of social network. Law enforcement agencies in the world have begun to study on advanced knowledge discovery technologies to assist in the analysis of terrorist's information. The use of such type of technologies is treated as intelligence tools to combat terrorism by anticipating activity of terrorists. This terrorism activity can be predicted by discovering suspicious nodes in the network. In the way of discovering suspicious nodes we propose a method to reduce the size of network or to reduce the no. of nodes in the network because the size of network is emerging problem in SNA. In our method we use fuzzy for reduction of network so that reduced network consists only set of potential nodes. After applying our method we get a reduced network with high possibility of terrorist nodes in network.