期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Improvised Technique for Analyzing Data and Detecting Terrorist Attack Using Machine Learning Approach Based on Twitter Data
1
作者 Aditi sarker Partha Chakraborty +3 位作者 s. m. shaheen sha mahmuda Khatun md. Rakib Hasan Kawshik Banerjee 《Journal of Computer and Communications》 2020年第7期50-62,共13页
Social media are interactive computer mediated technology that facilitates the sharing of information via virtual communities and networks. And Twitter is one of the most popular social media for social interaction an... Social media are interactive computer mediated technology that facilitates the sharing of information via virtual communities and networks. And Twitter is one of the most popular social media for social interaction and microblogging. This paper introduces an improved system model to analyze twitter data and detect terrorist attack event. In this model, a ternary search is used to find the weights of predefined keywords and the Aho-Corasick algorithm is applied to perform pattern matching and assign the weight which is the main contribution of this paper. Weights are categorized into three categories: Terror attack, Severe Terror Attack and Normal Data and the weights are used as attributes for classification. K-Nearest Neighbor (KNN) and Support Vector Machine (SVM) are two machine learning algorithms used to predict whether a terror attack happened or not. We compare the accuracy with our actual data by using confusion matrix and measure whether our result is right or wrong and the achieved result shows that the proposed model performs better. 展开更多
关键词 TERRORIST Ternary Search Aho-Corasick Automata Confusion Matrix
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部