We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Proposed Architecture for Terrorist Web Miner

by R.D. Gaharwar, D.B. Shah, G.K.S. Gaharwar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 128 - Number 9
Year of Publication: 2015
Authors: R.D. Gaharwar, D.B. Shah, G.K.S. Gaharwar
10.5120/ijca2015906628

R.D. Gaharwar, D.B. Shah, G.K.S. Gaharwar . Proposed Architecture for Terrorist Web Miner. International Journal of Computer Applications. 128, 9 ( October 2015), 18-20. DOI=10.5120/ijca2015906628

@article{ 10.5120/ijca2015906628,
author = { R.D. Gaharwar, D.B. Shah, G.K.S. Gaharwar },
title = { Proposed Architecture for Terrorist Web Miner },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 128 },
number = { 9 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 18-20 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume128/number9/22901-2015906628/ },
doi = { 10.5120/ijca2015906628 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:21:11.743946+05:30
%A R.D. Gaharwar
%A D.B. Shah
%A G.K.S. Gaharwar
%T Proposed Architecture for Terrorist Web Miner
%J International Journal of Computer Applications
%@ 0975-8887
%V 128
%N 9
%P 18-20
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Terrorist Web Mining generates the novel information which can be used by SNA tools for Terrorist Network Mining. We assume that information available on open source media such as media reports, press reports etc can be used to draw a sociogram of these terrorist organizations. These sociograms can be used to study the relationships and roles of these terrorist organizations. In this article we propose architecture for a Terrorist Web Miner (TWM) which will search different search engines for terrorist attack information and the found web pages will be parsed for useful links. These links of the web pages which have relevant information then these web pages are stored and rank will be allocated to them. This links can farther be used for TNM.

References
  1. Sergey Brin and Lawrence Page, "The Anatomy of a Large-Scale Hypertextual Web Search Engine," in 7th World Wide Conference(WWW7), Brisbane, 1998.
  2. Peng Tao, Research on Topical Crawling Technique for Topic- Specific Search Engine, 2007, Doctor degree thesis of Jilin University.
  3. J Hosseinkhani, S Chuprat, and H Taherdoost, "Criminal Network Mining by Web Structure and Content Mining," in Advances in Remote Sensing, Finite Differences and Information Security, Prague, 2012, pp. 210-215.
  4. M K Sparrow, "The application of network analysis to criminal intelligence: An assessment of the prospects," Social Networks 13, pp. 251-274, 1991.
  5. U K Will, N Menon, and P Karampelas, "Detecting new trends in terrorism networks," International Conference on Advances in Social Networks Analysis and Mining, 2010.
  6. Javad Hosseinkhani, Suriayati Chaprut, Hamed Taherdoost, Morteza Harati, and Sadegh Emami Korani, "Criminal Communities Mining on the Web," International Journal of Advanced Computer Science and Information Technology (IJACSIT), vol. 2, no. 2, pp. 13-22, April 2013.
  7. Yang Xiang, Michael Chau, Homa Atabakhsh, and Hsinchun Chen, "Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list," Decision Support Systems, pp. 69–83, 2005
  8. V E Krebs, "Mapping networks of terrorist cells," Connections 24, pp. 43–52, March 2001.
  9. D Zhou, R Manavoglu, J Li, C L Giles, and H Zha, "Probabilistic models for discovering e-communities," 15th international conference on world wide web (WWW), pp. 173–182, 2006.
  10. R D Gaharwar, D B Shah, and G. K. S. Gaharwar, "TERRORIST NETWORK MINING: ISSUES AND CHALLENGES," International Journal of Advance Research In Science And Engineering, vol. 4, no. 1, pp. 33-37, March 2015.
  11. Javad Hosseinkhani, Suriayati Chaprut, Hamed Taherdoost, and Amin Shahraki Moghaddam, "Propose a Framework for Criminal Mining by Web Structure and Content Mining," International Journal of Advanced Computer Science and Information Technology, vol. 1, no. 1, pp. 1-13, October 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Web mining Terrorist Networks Terrorist Network Miner (TWM) SNA TNM