scholarly journals Terrorist Group Behavior Prediction by Wavelet Transform-Based Pattern Recognition

2018 ◽  
Vol 2018 ◽  
pp. 1-16 ◽  
Author(s):  
Ze Li ◽  
Duoyong Sun ◽  
Bo Li ◽  
Zhanfeng Li ◽  
Aobo Li

Predicting terrorist attacks by group networks is an important but difficult issue in intelligence and security informatics. Effective prediction of the behavior not only facilitates the understanding of the dynamics of organizational behaviors but also supports homeland security’s missions in prevention, preparedness, and response to terrorist acts. There are certain dynamic characteristics of terrorist groups, such as periodic features and correlations between the behavior and the network. In this paper, we propose a comprehensive framework that combines social network analysis, wavelet transform, and the pattern recognition approach to investigate the dynamics and eventually predict the attack behavior of terrorist group. Our ideas rely on social network analysis to model the terrorist group and extract relevant features for group behaviors. Next, based on wavelet transform, the group networks (features) are predicted and mutually checked from two aspects. Finally, based on the predicted network, the behavior of the group is recognized based on the correlation between the network and behavior. The Al-Qaeda data are investigated with the proposed framework to show the strength of our approaches. The results show that the proposed framework is highly accurate and is of practical value in predicting the behavior of terrorist groups.

2013 ◽  
Vol 798-799 ◽  
pp. 435-438
Author(s):  
Lin Wang ◽  
Yang Zhao ◽  
She Hong Liang ◽  
Kan Shi

This paper has searched the six key influential network group incidents in 2011 in China through SINA Microblog platform, screen the most active Microblog users who pay close attention to the incidents, their Microblog followers are above 50,000 , finally collects 30 Microblog user information by the way of snowballing, form 30*30 “follow – be followed ” Microblog netizens relationship matrix. Specific to this asymmetric matrix, the authors use UCINET social network analysis software and visual software NETDRAW, analyze Microblog network structure, network centrality based on network group incidents, and comprehensively describe the laws to release and acquire group incidents under the mixed network environment of Microblog, combined with the massive Microblog exchange data, to analyze the non-rational behavior of the netizens, so as to provide a scientific basis for setting out the appropriate guiding strategy and interventions.


Sign in / Sign up

Export Citation Format

Share Document