International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 129 - Number 13 |
Year of Publication: 2015 |
Authors: Suraksha Tiwari, Shilky Shrivastava, Manish Gupta |
10.5120/ijca2015907068 |
Suraksha Tiwari, Shilky Shrivastava, Manish Gupta . A New Fuzzy based Approach for Destabilization of Terrorist Network. International Journal of Computer Applications. 129, 13 ( November 2015), 21-27. DOI=10.5120/ijca2015907068
The wide scope of Social network analysis has led the law require agencies to study the performance of social network. The main objective of this study is to identify the key nodes (suspicious nodes) present in the network. Recently, Terrorist Network Mining (special branch of Social Network Analysis) has gained considerable prominence in the data mining community because of its relevance to the real scenario situation and need. This paper proposes a new Fuzzy based optimization mechanism. The proposed optimization mechanism is appropriate for operative optimization of big social network holding non terrorist and terrorist nodes. At the time of the optimization procedure elimination of non-terrorist nodes from the network has been performed and the optimization resultant represents only the reduced / optimized graph holding only the collection of potential nodes. Fuzzy Rule based system for the security of the cyber is a system that contains a rule depository and a mechanism for the accessing and also running the rules. The depository is generally created with a group of the related rule sets. The goal of this study is to progress of a fuzzy rule based practical indicator for the security of cyber with the use of an skillful method which is named System of the Fuzzy Rule Based Cyber Expert. Rule based systems employ fuzzy rule to the automate complex procedures. A common cyber threats expected for the cyber specialists are used as linguistic variables in this paper. However, these algorithm results in fruitful outcomes, there is a need to propose a typical algorithm for destabilization. In consideration to this, the present paper proposes a novel algorithm for destabilization of terrorist network revealing the hidden hierarchy followed by the network.