Big Data On Terrorist Attacks: An Analysis Using The Ensemble Classifier Approach
|
|
|
- Kelly Bond
- 10 years ago
- Views:
Transcription
1 International Conference on Inter Disciplinary Research in Engineering and Technology [ICIDRET] 255 International Conference on Inter Disciplinary Research in Engineering and Technology [ICIDRET] ISBN Vol I Website [email protected] Received 14 - February Accepted 25 - March Article ID ICIDRET042 eaid ICIDRET Big Data On Terrorist Attacks: An Analysis Using The Ensemble Classifier Approach R. Sivaraman 1, Dr. S. Srinivasan 2, Dr. R M. Chandrasekeran 3 1 Assistant Professor, Department of Computer Science and Engineering, Anna University, Regional Office, Madurai, Tamil Nadu, India. 2 Professor, Department of Computer Science and Engineering, Anna University, Regional Office, Madurai, Tamil Nadu, India. 3 Professor, Department of Computer Science and Engineering, Annamalai University, Chidambaram, Tamil Nadu, India. ABSTRACT - Terrorism has virtually invaded our day to day lives. We can t imagine of passing a day without a terrorist attack in any part of the country that has brought in irreparable loss to mankind and also invaluable material destruction. The knowledge and information we collect about the terrorists operations are highly voluminous and is increasingly becoming multidimensional, thereby pushing the analysis of Big Data into new frontiers. This data when combined with counter-intelligence inputs brings in a new perspective on the efforts to combat terrorism. As new terror outfits spring up consistently, applying suitable data mining techniques on such Big Data has a great impact on the counter terrorism measures and understanding the pattern of attacks. In this research we have analyzed the performance of classifiers like decision tree and ensemble classifier on the Global Terrorism Database and the results have shown that the ensemble method outperforms for the given dataset. Keywords: Big Data, Global Terrorism Database, Decision Tree, Ensemble, Weka I INTRODUCTION Today we live in this era of Big Data where the amount of information gathered and stored on data storage systems are several trillion times more than the population of the World. In fact every one of us have several zetta bytes of data about our own individual information from birth to death that includes telephone call records, s, messages conveyed on various social messaging platforms, CCTV footages, financial transactions etc., In this age of Information Technology, we leave a footstep of data wherever we move and it is inseparable like our own shadows. This Big Data when used effectively and efficiently holds the key for several unanswerable questions, pattern recognitions and predictions. With the effect of Terrorism and its frequent threats on us we have been forced to live in an environment which resembles our age old days of forest life, fearing and fighting with wild animals for our mere existence. History repeats again only with new flavors and colors and nothing has changed considerably. But today we are equipped with modern weaponry to fight back than that of the stone tools we used long back. Forget the weapons of steel. We have something that is much stronger than that of all, which is Big Data. This structured data when designed to form conceptual frameworks can reveal us several hidden phenomena and can guide with intuitionistic relations. One such dataset is the Global Terrorism Database [1] referred as GTD, which is an open source collection of terrorism events across the globe from 1970s to This unclassified database is a comprehensive collection of over 125,000 terrorist attacks with detailed records mentioning the country, type of attacks, targets civilian, military, business, weapon type etc.,.we have utilized the Global Terrorism Database for this research and have focused on the extraction of information using decision tree and ensemble classifier. The experimental results show that the ensemble classifier can identify the incident types with better accuracy than that of the decision tree classifier. This paper is prepared exclusively for International Conference on Inter Disciplinary Research in Engineering and Technology [ICIDRET] which is published by ASDF International, Registered in London, United Kingdom. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage, and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honoured. For all other uses, contact the owner/author(s). Copyright Holder can be reached at [email protected] for distribution Reserved by ASDF.international
2 International Conference on Inter Disciplinary Research in Engineering and Technology [ICIDRET] 256 II RELATED WORK Nitin et al. [2] have used the J48 Decision tree algorithm in the classification of criminal records and predicting a crime suspect and for overall analysis of crime data. The data pertaining to various types of crime like traffic violations, theft, fraud, drug offenses etc., were collected by field work. The results of the J48 algorithm are then verified with the correctly classified instances, FP rate, TP rate, confusion matrix, recall, MCC and F_Measure. The classification method would then suggest about the suspect is innocent or not. An dataset was used by Sarwat Nizamani [3] for detecting with suspicious content. Their research has focused on the evaluation of machine learning algorithms such as decision tree (ID3), logistic regression, Naïve Bayes (NB) and Support Vector Machine (SVM). The findings prove that the decision tree algorithm (ID3) did well when compared with that of the other classifiers. Upon application of suitable feature selection strategy, an increase in performance was witnessed by the logistic regression algorithm along with the decision tree algorithm. Terror incidents in India was analysed by Borooah et al. [4] used the GTD database to analyse the fatality rates during Their research separates the influence on the number of attack type and attack group and used the Atkinson's concept of equality-adjusted income to terrorism to arrive at the concept of equality-adjusted deaths from terrorist incidents. The impact of terrorism on investor s sentiment related to Hospitality stock was studied by Chang et al. [5], and their research has proved that the there was a fall of 10 to 15 percent every year due to terrorist attacks. However once the threat of terror has been withdrawn or subdued the markets recovered after the initial negative reaction and yield better returns up to four times more than the average event and this research used the GTD database to arrive at a logical conclusion. A method to segregate the GTD database by transnational and domestic incidents was devised by Enders et al. [6]. They analysed the impact of transnational terrorism and found that it had a greater negative impact on the economic growth of a country than that of domestic terrorism. The results have shown that cross correlation exists between the domestic and the transnational terrorist events. The findings also suggested that the domestic terrorism can expand to transnational terrorism and hence the target countries cannot turn a blind eye to domestic terrorism in neighboring countries and may have to put an end to the homegrown terrorism. Young et al. in their research work Veto Players and Terror [7] used the Tsbelis s veto player s theory to analyse why certain democratic countries foster terrorism and a majority of other countries are curbing it effectively. When the terror outfits wanted for a shift in the government policies, then more number of veto players will lead into a deadlock which will tend to generate more number of terror events. The results discussed that with the inability of the societal actors to change the policies of the government through non-violent and institutional participation, the homegrown terrorism cannot be tackled. Nizamani et al. [8] have extensively analyzed the news summaries from the global terrorism dataset using machine learning techniques. They have adopted different learning algorithms including Naive Bayes, decision tree and support vector machine. The findings suggest that the decision tree learning algorithm has high accuracy for detecting the type of the terror incidents. Though the SVM attained high accuracy, the longer execution time is encountered when the dataset is large. The Bayes scored a faster running time at the cost of lower accuracy. In this research we used the GTD database which holds the comprehensive collection of all terrorist events occurred across the globe between 1978 and 2013 and we propose to extract useful information from this dataset and experimentally prove that the classification techniques like decision tree and ensemble classifier can learn from the dataset to detect the attack_type in the given GTD. The next section gives a detailed insight into the classification algorithms. III CLASSIFICATION ALGORITHMS 3.1 Decision Tree The decision tree algorithm generates the tree structure by considering the values of one attribute at a time. Initially the algorithm sorts the dataset based on the value of the attribute. Then it proceeds further looking for the regions that possess single class and identifies them as leaves. For the rest of the regions that contain more number of classes, the decision tree choose another attribute and the branching process is continued till the all the leaves have been identified or there is no attribute capable of producing one or more leaves. 3.2 Ensemble Classifier Ensemble learning techniques have been shown to increase machine learning accuracy by combining arrays of specialized learners. These specialized learners are trained as separate classifiers using various subsets of the training data and then combined to form a network of learners that has a higher accuracy than any single component. Ensemble techniques increase classification accuracy with the trade-off of increasing computation time. Training a large number of learners can be time-consuming, especially when the dimensionality of the training data is high. Ensemble approaches are best suited to domains where computational complexity is relatively unimportant or where the highest possible classification accuracy is desired.
3 International Conference on Inter Disciplinary Research in Engineering and Technology [ICIDRET] 257 Input: Training sets T=(x i,y i ),i=1 to n: Integer n (iteration number). Output: Classifier H(x). For each iteration i= 1 to n { Select a subset T i, of size N form the original training examples T. The size of T i is the same with the T where some instances may not appear in T i, while other appear more than ones. Generate a classifier H i (x) from the T i } Fig.1. Flow Chart for Decision Tree Fig.2. Pseudocode for bagging IV PREPROCESSING OF DATA In this research we used the Global Terrorism Database created by the START: A Center of Excellence of the U.S. Department of Homeland Security and University of Maryland containing terrorist attack data from 1970 to The original dataset is in the Microsoft Excel format and they have been converted into the ARFF format (Attribute Relation File Format) which is accepted by the Weka tool. From the various fields available in the GTD we have used the year of occurrence, month, day, country, city, attack type, target type, terrorist group name, weapon type, hostage situation and ransom were utilized. V EXPERIMENTAL ANALYSIS The dataset under study comprised of records spanning over the years 1970 to Each terrorist attack instance is mapped with 17 attributes. The month-wise description of datasets pertaining to terrorist attacks is shown in the Table 1, different attack types in Table 2, weapon types in Table 3 and performance classifiers in Table 4. The experiments are conducted using two well acclaimed classification algorithms, viz., Decision tree J48 which is the WEKA's implementation of C4.5 and Ensemble Classifier.
4 International Conference on Inter Disciplinary Research in Engineering and Technology [ICIDRET] 258 Nos Month Count 1 JAN FEB MAR APR MAY JUN JUL AUG SEP OCT NOV DEC 9554 Table 1. Summary of Month-wise occurrences Nos Attack Type Count 1 Assassination Unknown Kidnapping Armed Assault Hijacking Barricade Incident Infrastructure Unarmed Assault Bombing Explosion 692 Table 2. Summary of attacktype-wise occurrences Nos. Weapon Type Count 1 UNKNOWN EXPLOSIVES BOMBS DYNAMITES INCENDIARY FIREARMS CHEMICAL FAKE WEAPONS 31 7 MELEE SABOTAGE EQUIPMENT VEHICLE RADIOLOGICAL OTHER BIOLOGICAL 35 Table 3. Summary of weapon type-wise occurrences Decision Tree Decision Tree Ensemble Attack type Class recall Class precision Class recall Class precision Assassination 87.50% 76.13% 89.02% 76.24% Barricade Incident 90.67% 93.15% 92.00% 94.52% Kidnapping 95.26% 95.93% 95.26% 95.40% Infrastructure 96.91% 83.93% 97.42% 82.53%
5 International Conference on Inter Disciplinary Research in Engineering and Technology [ICIDRET] 259 Unknown 51.03% 83.90% 50.00% 83.62% Armed Assault 83.33% 71.43% 66.67% % Bombing Explosion 55.56% 38.46% 22.22% 66.67% Unarmed Assault 48.13% % 50.00% 82.02% Hijacking 63.64% 53.85% 63.64% 53.85% Table 4: Performance of classifiers Evaluation measures for determining Accuracy, Precision and Recall were done using the following calculation methodologies, Accuracy = (T p +T n ) / (T p +T n +F p +F n ) Precision = T p / (T p + F p ) Recall = T p /( T p + F n ) T p represents the number of terror incidences correctly classified for a particular class, F p denotes the number of occurrences which is incorrectly classified as particular class, T n depicts the number of incidence that were correctly classified as other class and F n represents the total number of incidents that were incorrectly classified as another class. The bagging model is employed using Weka tool. Decision tree is used as base classifier and number of iterations used is 5.other parameters for meta classifier and base learner use the default values available in the tool. Ten fold cross validation is used. From the results it is evident that, the ensemble method performed well and often outperformed the single model in terms of precision &recall. Thus, a bagging ensemble can be used with the reasonable assumption that it will not affect performance on s datasets. If time and computational resources are not an issue or the highest possible classification accuracy is desired, then the bagging ensemble model seems to be the best choice.
6 International Conference on Inter Disciplinary Research in Engineering and Technology [ICIDRET] 260 Bagging (prediction model for label attacktype1) Number of inner models: 10 Embedded model #0: ishostkid > property > iyear > : 5 {1=0, 6=4, 3=0, 7=1, 2=12, 4=1, 9=1, 8=0, 5=26} iyear iday > imonth > 5.500: 5 {1=0, 6=2, 3=0, 7=0, 2=0, 4=0, 9=0, 8=0, 5=2} imonth 5.500: 2 {1=0, 6=0, 3=1, 7=0, 2=2, 4=0, 9=0, 8=0, 5=0} iday 6.500: 4 {1=1, 6=0, 3=0, 7=0, 2=0, 4=4, 9=0, 8=0, 5=0} property weaptype1 > 11 targtype1 > 5 targtype1 > iday > 30: 6 {1=0, 6=3, 3=0, 7=0, 2=0, 4=0, 9=1, 8=0, 5=0} iday 30 imonth > iyear > : 4 {1=0, 6=1, 3=0, 7=0, 2=0, 4=1, 9=0, 8=0, 5=0} iyear : 6 {1=0, 6=5, 3=0, 7=0, 2=0, 4=0, 9=0, 8=0, 5=0} imonth : 6 {1=0, 6=67, 3=0, 7=0, 2=0, 4=0, 9=1, 8=0, 5=0} targtype : 4 {1=0, 6=1, 3=0, 7=0, 2=0, 4=15, 9=0, 8=0, 5=0} targtype1 5: 6 {1=0, 6=125, 3=0, 7=0, 2=0, 4=0, 9=0, 8=0, 5=0} weaptype1 11 iday > targtype1 > iyear > : 2 {1=0, 6=0, 3=0, 7=0, 2=2, 4=0, 9=0, 8=0, 5=0} iyear weaptype1 > 7: 1 {1=1, 6=1, 3=0, 7=0, 2=0, 4=0, 9=0, 8=0, 5=0} weaptype1 7 iday > 27: 6 {1=0, 6=1, 3=0, 7=0, 2=1, 4=0, 9=0, 8=0, 5=0} iday 27 imonth > 2.500: 6 {1=0, 6=9, 3=0, 7=0, 2=0, 4=0, 9=0, 8=0, 5=0} imonth 2.500: 2 {1=0, 6=1, 3=0, 7=0, 2=1, 4=0, 9=0, 8=0, 5=0} targtype targtype1 > 5: 4 {1=0, 6=0, 3=0, 7=0, 2=0, 4=14, 9=0, 8=0, 5=0} Fig 3 Decision targtype1 Tree Ensemble 5 prediction model (WEKA)
7 International Conference on Inter Disciplinary Research in Engineering and Technology [ICIDRET] 261 Fig 4. Accuracy of classifiers VI CONCLUSION AND FUTURE SCOPE Emerging technology advancements in the Big Data science has opened up new frontiers for research in this arena. However Big the data may look, it is always Small when approached with suitable methods and procedures. It is only in the hands of the researchers for devising tactical strategies to pull out meaning full output from the presented data. Though this research has been limited only decision algorithm and ensemble classifier, this can be extended to incorporate multiple methods or combination of methods. Our future steps include designing a recommender based conceptual framework to analyze the Big Data in real time using Cloud platform. REFERENCES [1] [2] Nitin Nandkumar Sakhare, Swati Atul Joshi, Classification of Criminal Data Using J48-Decision Tree Algorithm, IFRSA International Journal of Data Warehousing & Mining Vol 4 issue3 August 2014 [3] Sarwat Nizamani, Nasrullah Memon, Uffe Kock Wiil, Panagiotis Karampelas, Modeling Suspicious Detection using Enhanced Feature Selection, International Journal of Modeling and Optimization, [4] Borooah, Vani K "Terrorist Incidents in India, : A Quantitative Analysis of Fatality Rates." Terrorism & Political Violence 21: [5] Chang, Charles and Ying Ying Zeng Impact of Terrorism on Hospitality Stocks and the Role of Investor Sentiment. Cornell Hospitality Quarterly 52: [6] Enders, Walter, Todd Sandler, and Khrsrav Gaibulloev "Domestic Versus Transnational Terrorism: Data, Decomposition, and Dynamics." Journal of Peace Research 48: [7] Young, Joseph K., and Laura Dugan "Veto Players and Terror." Journal of Peace Research 48: [8] Sarwat Nizamani, Nasrullah Memon, Analyzing News Summaries for Identification of Terrorism Incident Type, Educational Research International Vol. 3(4) August 2014
Chapter 6. The stacking ensemble approach
82 This chapter proposes the stacking ensemble approach for combining different data mining classifiers to get better performance. Other combination techniques like voting, bagging etc are also described
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS
FRAUD DETECTION IN ELECTRIC POWER DISTRIBUTION NETWORKS USING AN ANN-BASED KNOWLEDGE-DISCOVERY PROCESS Breno C. Costa, Bruno. L. A. Alberto, André M. Portela, W. Maduro, Esdras O. Eler PDITec, Belo Horizonte,
Modeling Suspicious Email Detection Using Enhanced Feature Selection
Modeling Suspicious Email Detection Using Enhanced Feature Selection Sarwat Nizamani, Nasrullah Memon, Uffe Kock Wiil, and Panagiotis Karampelas Abstract The paper presents a suspicious email detection
Keywords cosine similarity, correlation, standard deviation, page count, Enron dataset
Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Cosine Similarity
Experiential Marketing: Analysis of Customer Attitude and Purchase Behaviour in Telecom Sector
International Conference on Inter Disciplinary Research in Engineering and Technology [ICIDRET] 197 International Conference on Inter Disciplinary Research in Engineering and Technology [ICIDRET] ISBN
Analysis One Code Desc. Transaction Amount. Fiscal Period
Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00
Data Mining - Evaluation of Classifiers
Data Mining - Evaluation of Classifiers Lecturer: JERZY STEFANOWSKI Institute of Computing Sciences Poznan University of Technology Poznan, Poland Lecture 4 SE Master Course 2008/2009 revised for 2010
DATA MINING TECHNIQUES AND APPLICATIONS
DATA MINING TECHNIQUES AND APPLICATIONS Mrs. Bharati M. Ramageri, Lecturer Modern Institute of Information Technology and Research, Department of Computer Application, Yamunanagar, Nigdi Pune, Maharashtra,
Analysis of WEKA Data Mining Algorithm REPTree, Simple Cart and RandomTree for Classification of Indian News
Analysis of WEKA Data Mining Algorithm REPTree, Simple Cart and RandomTree for Classification of Indian News Sushilkumar Kalmegh Associate Professor, Department of Computer Science, Sant Gadge Baba Amravati
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*
COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8
Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007
Consumer ID Theft Total Costs
Billions Consumer and Business Identity Theft Statistics Business identity (ID) theft is a growing crime and is a growing concern for state filing offices. Similar to consumer ID theft, after initially
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS
A STUDY ON DATA MINING INVESTIGATING ITS METHODS, APPROACHES AND APPLICATIONS Mrs. Jyoti Nawade 1, Dr. Balaji D 2, Mr. Pravin Nawade 3 1 Lecturer, JSPM S Bhivrabai Sawant Polytechnic, Pune (India) 2 Assistant
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model
A Secured Approach to Credit Card Fraud Detection Using Hidden Markov Model Twinkle Patel, Ms. Ompriya Kale Abstract: - As the usage of credit card has increased the credit card fraud has also increased
Data Mining Algorithms Part 1. Dejan Sarka
Data Mining Algorithms Part 1 Dejan Sarka Join the conversation on Twitter: @DevWeek #DW2015 Instructor Bio Dejan Sarka ([email protected]) 30 years of experience SQL Server MVP, MCT, 13 books 7+ courses
Supervised Learning (Big Data Analytics)
Supervised Learning (Big Data Analytics) Vibhav Gogate Department of Computer Science The University of Texas at Dallas Practical advice Goal of Big Data Analytics Uncover patterns in Data. Can be used
BIDM Project. Predicting the contract type for IT/ITES outsourcing contracts
BIDM Project Predicting the contract type for IT/ITES outsourcing contracts N a n d i n i G o v i n d a r a j a n ( 6 1 2 1 0 5 5 6 ) The authors believe that data modelling can be used to predict if an
Freedom of Information Request Reference No: I note you seek access to the following information:
Freedom of Information Request Reference No: I note you seek access to the following information: 1. How many incidents in the UK have the police been called to because of people being drug and disorderly
Experiments in Web Page Classification for Semantic Web
Experiments in Web Page Classification for Semantic Web Asad Satti, Nick Cercone, Vlado Kešelj Faculty of Computer Science, Dalhousie University E-mail: {rashid,nick,vlado}@cs.dal.ca Abstract We address
Domain Name Abuse Detection. Liming Wang
Domain Name Abuse Detection Liming Wang Outline 1 Domain Name Abuse Work Overview 2 Anti-phishing Research Work 3 Chinese Domain Similarity Detection 4 Other Abuse detection ti 5 System Information 2 Why?
Keywords data mining, prediction techniques, decision making.
Volume 5, Issue 4, April 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Analysis of Datamining
IntelCenter Database (ICD) for Colleges & Universities 30 Jan. 2015. [email protected] 800-719-8750
IntelCenter Database (ICD) for Colleges & Universities 30 Jan. 2015 [email protected] 800-719-8750 1 IntelCenter Database (ICD) Students can watch events directly instead of just reading about them
How To Understand The Impact Of A Computer On Organization
International Journal of Research in Engineering & Technology (IJRET) Vol. 1, Issue 1, June 2013, 1-6 Impact Journals IMPACT OF COMPUTER ON ORGANIZATION A. D. BHOSALE 1 & MARATHE DAGADU MITHARAM 2 1 Department
A Content based Spam Filtering Using Optical Back Propagation Technique
A Content based Spam Filtering Using Optical Back Propagation Technique Sarab M. Hameed 1, Noor Alhuda J. Mohammed 2 Department of Computer Science, College of Science, University of Baghdad - Iraq ABSTRACT
Data Mining. Nonlinear Classification
Data Mining Unit # 6 Sajjad Haider Fall 2014 1 Nonlinear Classification Classes may not be separable by a linear boundary Suppose we randomly generate a data set as follows: X has range between 0 to 15
An intelligent Analysis of a City Crime Data Using Data Mining
2011 International Conference on Information and Electronics Engineering IPCSIT vol.6 (2011) (2011) IACSIT Press, Singapore An intelligent Analysis of a City Crime Data Using Data Mining Malathi. A 1,
T-61.3050 : Email Classification as Spam or Ham using Naive Bayes Classifier. Santosh Tirunagari : 245577
T-61.3050 : Email Classification as Spam or Ham using Naive Bayes Classifier Santosh Tirunagari : 245577 January 20, 2011 Abstract This term project gives a solution how to classify an email as spam or
MS1b Statistical Data Mining
MS1b Statistical Data Mining Yee Whye Teh Department of Statistics Oxford http://www.stats.ox.ac.uk/~teh/datamining.html Outline Administrivia and Introduction Course Structure Syllabus Introduction to
Predictive Data modeling for health care: Comparative performance study of different prediction models
Predictive Data modeling for health care: Comparative performance study of different prediction models Shivanand Hiremath [email protected] National Institute of Industrial Engineering (NITIE) Vihar
EFFICIENCY OF DECISION TREES IN PREDICTING STUDENT S ACADEMIC PERFORMANCE
EFFICIENCY OF DECISION TREES IN PREDICTING STUDENT S ACADEMIC PERFORMANCE S. Anupama Kumar 1 and Dr. Vijayalakshmi M.N 2 1 Research Scholar, PRIST University, 1 Assistant Professor, Dept of M.C.A. 2 Associate
II. RELATED WORK. Sentiment Mining
Sentiment Mining Using Ensemble Classification Models Matthew Whitehead and Larry Yaeger Indiana University School of Informatics 901 E. 10th St. Bloomington, IN 47408 {mewhiteh, larryy}@indiana.edu Abstract
Comparison of Data Mining Techniques used for Financial Data Analysis
Comparison of Data Mining Techniques used for Financial Data Analysis Abhijit A. Sawant 1, P. M. Chawan 2 1 Student, 2 Associate Professor, Department of Computer Technology, VJTI, Mumbai, INDIA Abstract
Keywords Data mining, Classification Algorithm, Decision tree, J48, Random forest, Random tree, LMT, WEKA 3.7. Fig.1. Data mining techniques.
International Journal of Emerging Research in Management &Technology Research Article October 2015 Comparative Study of Various Decision Tree Classification Algorithm Using WEKA Purva Sewaiwar, Kamal Kant
THE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
Machine learning for algo trading
Machine learning for algo trading An introduction for nonmathematicians Dr. Aly Kassam Overview High level introduction to machine learning A machine learning bestiary What has all this got to do with
Classification of Titanic Passenger Data and Chances of Surviving the Disaster Data Mining with Weka and Kaggle Competition Data
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2 nd, 2014 Classification of Titanic Passenger Data and Chances of Surviving the Disaster Data Mining with Weka and Kaggle Competition
Smart Security by Predicting Future Crime with GIS and LBS Technology on Mobile Device
Smart Security by Predicting Future Crime with GIS and LBS Technology on Mobile Device Gaurav Kumar 1, P. S. Game 2 1 Pune Institute of Computer Technology, Savitribai Phule Pune University, Pune, India
An Overview of Knowledge Discovery Database and Data mining Techniques
An Overview of Knowledge Discovery Database and Data mining Techniques Priyadharsini.C 1, Dr. Antony Selvadoss Thanamani 2 M.Phil, Department of Computer Science, NGM College, Pollachi, Coimbatore, Tamilnadu,
Active Learning SVM for Blogs recommendation
Active Learning SVM for Blogs recommendation Xin Guan Computer Science, George Mason University Ⅰ.Introduction In the DH Now website, they try to review a big amount of blogs and articles and find the
Data Warehousing and Data Mining in Business Applications
133 Data Warehousing and Data Mining in Business Applications Eesha Goel CSE Deptt. GZS-PTU Campus, Bathinda. Abstract Information technology is now required in all aspect of our lives that helps in business
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Tina R. Patil, Mrs. S. S. Sherekar Sant Gadgebaba Amravati University, Amravati [email protected], [email protected]
Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100
Identifying At-Risk Students Using Machine Learning Techniques: A Case Study with IS 100 Erkan Er Abstract In this paper, a model for predicting students performance levels is proposed which employs three
UNDERSTANDING THE EFFECTIVENESS OF BANK DIRECT MARKETING Tarun Gupta, Tong Xia and Diana Lee
UNDERSTANDING THE EFFECTIVENESS OF BANK DIRECT MARKETING Tarun Gupta, Tong Xia and Diana Lee 1. Introduction There are two main approaches for companies to promote their products / services: through mass
Qi Liu Rutgers Business School ISACA New York 2013
Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,
BIOINF 585 Fall 2015 Machine Learning for Systems Biology & Clinical Informatics http://www.ccmb.med.umich.edu/node/1376
Course Director: Dr. Kayvan Najarian (DCM&B, [email protected]) Lectures: Labs: Mondays and Wednesdays 9:00 AM -10:30 AM Rm. 2065 Palmer Commons Bldg. Wednesdays 10:30 AM 11:30 AM (alternate weeks) Rm.
Football Match Winner Prediction
Football Match Winner Prediction Kushal Gevaria 1, Harshal Sanghavi 2, Saurabh Vaidya 3, Prof. Khushali Deulkar 4 Department of Computer Engineering, Dwarkadas J. Sanghvi College of Engineering, Mumbai,
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES
DECISION TREE INDUCTION FOR FINANCIAL FRAUD DETECTION USING ENSEMBLE LEARNING TECHNIQUES Vijayalakshmi Mahanra Rao 1, Yashwant Prasad Singh 2 Multimedia University, Cyberjaya, MALAYSIA 1 [email protected]
Role of Social Networking in Marketing using Data Mining
Role of Social Networking in Marketing using Data Mining Mrs. Saroj Junghare Astt. Professor, Department of Computer Science and Application St. Aloysius College, Jabalpur, Madhya Pradesh, India Abstract:
10/27/14. Consumer Credit Risk Management. Tackling the Challenges of Big Data Big Data Analytics. Andrew W. Lo
The Challenge of Consumer Credit Risk Management Consumer Credit Risk Management $3T of consumer credit outstanding as of 8/13 $840B of it is revolving consumer credit Average credit card debt as of 10/13:
Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017
From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days
The Strategic Importance, Causes and Consequences of Terrorism
The Strategic Importance, Causes and Consequences of Terrorism How Terrorism Research Can Inform Policy Responses Todd Stewart, Ph.D. Major General, United States Air Force (Retired) Director, Program
6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET) January- February (2013), IAEME
INTERNATIONAL International Journal of Computer JOURNAL Engineering OF COMPUTER and Technology ENGINEERING (IJCET), ISSN 0976-6367(Print), ISSN 0976 6375(Online) & TECHNOLOGY Volume 4, Issue 1, (IJCET)
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES
BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 123 CHAPTER 7 BEHAVIOR BASED CREDIT CARD FRAUD DETECTION USING SUPPORT VECTOR MACHINES 7.1 Introduction Even though using SVM presents
Association Technique on Prediction of Chronic Diseases Using Apriori Algorithm
Association Technique on Prediction of Chronic Diseases Using Apriori Algorithm R.Karthiyayini 1, J.Jayaprakash 2 Assistant Professor, Department of Computer Applications, Anna University (BIT Campus),
INFORMATION SESSION GRADUATE CERTIFICATE IN TERRORISM ANALYSIS AT THE UNIVERSITY OF MARYLAND
INFORMATION SESSION GRADUATE CERTIFICATE IN TERRORISM ANALYSIS AT THE UNIVERSITY OF MARYLAND DR. KATE IZSAK EDUCATION DIRECTOR, START, UNIVERSITY OF MARYLAND (LAST UPDATED JULY 2011) START Vision and Mission
Data Mining Practical Machine Learning Tools and Techniques
Ensemble learning Data Mining Practical Machine Learning Tools and Techniques Slides for Chapter 8 of Data Mining by I. H. Witten, E. Frank and M. A. Hall Combining multiple models Bagging The basic idea
Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing and Developing E-mail Classifier
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-1, Issue-6, January 2013 Artificial Neural Network, Decision Tree and Statistical Techniques Applied for Designing
MACHINE LEARNING BASICS WITH R
MACHINE LEARNING [Hands-on Introduction of Supervised Machine Learning Methods] DURATION 2 DAY The field of machine learning is concerned with the question of how to construct computer programs that automatically
Mining the Software Change Repository of a Legacy Telephony System
Mining the Software Change Repository of a Legacy Telephony System Jelber Sayyad Shirabad, Timothy C. Lethbridge, Stan Matwin School of Information Technology and Engineering University of Ottawa, Ottawa,
Equity forecast: Predicting long term stock price movement using machine learning
Equity forecast: Predicting long term stock price movement using machine learning Nikola Milosevic School of Computer Science, University of Manchester, UK [email protected] Abstract Long
REVIEW OF ENSEMBLE CLASSIFICATION
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IJCSMC, Vol. 2, Issue.
A Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Data Mining Application in Direct Marketing: Identifying Hot Prospects for Banking Product
Data Mining Application in Direct Marketing: Identifying Hot Prospects for Banking Product Sagarika Prusty Web Data Mining (ECT 584),Spring 2013 DePaul University,Chicago [email protected] Keywords:
Violent Crime in Ohio s Primary and Secondary Schools
State of Ohio Office of Criminal Justice Services Violent Crime in Ohio s Primary and Secondary Schools Ohio Office of Criminal Justice Services 1970 W. Broad Street, 4th Floor Columbus, Ohio 43223 Toll-Free:
not possible or was possible at a high cost for collecting the data.
Data Mining and Knowledge Discovery Generating knowledge from data Knowledge Discovery Data Mining White Paper Organizations collect a vast amount of data in the process of carrying out their day-to-day
Homeland Security Grants Management Louisiana Emergency Preparedness Association (LEPA)
Homeland Security Grants Management Louisiana Emergency Preparedness Association (LEPA) An LEM Basic Credentialing Course 1 Objectives Using local government management systems perform: Homeland security
E-commerce Transaction Anomaly Classification
E-commerce Transaction Anomaly Classification Minyong Lee [email protected] Seunghee Ham [email protected] Qiyi Jiang [email protected] I. INTRODUCTION Due to the increasing popularity of e-commerce
Crime Pattern Analysis
Crime Pattern Analysis Megaputer Case Study in Text Mining Vijay Kollepara Sergei Ananyan www.megaputer.com Megaputer Intelligence 120 West Seventh Street, Suite 310 Bloomington, IN 47404 USA +1 812-330-01
Stock Market Forecasting Using Machine Learning Algorithms
Stock Market Forecasting Using Machine Learning Algorithms Shunrong Shen, Haomiao Jiang Department of Electrical Engineering Stanford University {conank,hjiang36}@stanford.edu Tongda Zhang Department of
The Data Mining Process
Sequence for Determining Necessary Data. Wrong: Catalog everything you have, and decide what data is important. Right: Work backward from the solution, define the problem explicitly, and map out the data
DATA MINING AND REPORTING IN HEALTHCARE
DATA MINING AND REPORTING IN HEALTHCARE Divya Gandhi 1, Pooja Asher 2, Harshada Chaudhari 3 1,2,3 Department of Information Technology, Sardar Patel Institute of Technology, Mumbai,(India) ABSTRACT The
Impact of Boolean factorization as preprocessing methods for classification of Boolean data
Impact of Boolean factorization as preprocessing methods for classification of Boolean data Radim Belohlavek, Jan Outrata, Martin Trnecka Data Analysis and Modeling Lab (DAMOL) Dept. Computer Science,
Prediction of Heart Disease Using Naïve Bayes Algorithm
Prediction of Heart Disease Using Naïve Bayes Algorithm R.Karthiyayini 1, S.Chithaara 2 Assistant Professor, Department of computer Applications, Anna University, BIT campus, Tiruchirapalli, Tamilnadu,
Ten Steps for Preventing a terrorist Attack
WAR IN IRAQ AND ONGOING THREAT OF TERRORISM COMPEL NEW URGENCY TO MISSION OF SECURITY AND PROTECTION C-level Executives, Companies Should Take Specific Actions to Protect Employees and Help Ensure Business
Protective security governance guidelines
Protective security governance guidelines Reporting incidents and conducting security investigations Approved 13 September 2011 Version 1.0 Commonwealth of Australia 2011 All material presented in this
Final Project Report
CPSC545 by Introduction to Data Mining Prof. Martin Schultz & Prof. Mark Gerstein Student Name: Yu Kor Hugo Lam Student ID : 904907866 Due Date : May 7, 2007 Introduction Final Project Report Pseudogenes
Predicting Flight Delays
Predicting Flight Delays Dieterich Lawson [email protected] William Castillo [email protected] Introduction Every year approximately 20% of airline flights are delayed or cancelled, costing
An Introduction to Data Mining. Big Data World. Related Fields and Disciplines. What is Data Mining? 2/12/2015
An Introduction to Data Mining for Wind Power Management Spring 2015 Big Data World Every minute: Google receives over 4 million search queries Facebook users share almost 2.5 million pieces of content
Introduction to Data Mining
Introduction to Data Mining Jay Urbain Credits: Nazli Goharian & David Grossman @ IIT Outline Introduction Data Pre-processing Data Mining Algorithms Naïve Bayes Decision Tree Neural Network Association
Predicting the Stock Market with News Articles
Predicting the Stock Market with News Articles Kari Lee and Ryan Timmons CS224N Final Project Introduction Stock market prediction is an area of extreme importance to an entire industry. Stock price is
CI6227: Data Mining. Lesson 11b: Ensemble Learning. Data Analytics Department, Institute for Infocomm Research, A*STAR, Singapore.
CI6227: Data Mining Lesson 11b: Ensemble Learning Sinno Jialin PAN Data Analytics Department, Institute for Infocomm Research, A*STAR, Singapore Acknowledgements: slides are adapted from the lecture notes
Towards better accuracy for Spam predictions
Towards better accuracy for Spam predictions Chengyan Zhao Department of Computer Science University of Toronto Toronto, Ontario, Canada M5S 2E4 [email protected] Abstract Spam identification is crucial
International Journal of Advanced Computer Technology (IJACT) ISSN:2319-7900 PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS
PRIVACY PRESERVING DATA MINING IN HEALTH CARE APPLICATIONS First A. Dr. D. Aruna Kumari, Ph.d, ; Second B. Ch.Mounika, Student, Department Of ECM, K L University, [email protected]; Third C.
Siemens Intelligence Platform. Non contractual; Commercial in confidence; Subject to change without notice
Siemens Intelligence Platform Agenda Challenges Requirements Intelligence Tools System Aspects Summary 2 Did you ever wonder If the person flying into your country at a particular date every month is visiting
Detection. Perspective. Network Anomaly. Bhattacharyya. Jugal. A Machine Learning »C) Dhruba Kumar. Kumar KaKta. CRC Press J Taylor & Francis Croup
Network Anomaly Detection A Machine Learning Perspective Dhruba Kumar Bhattacharyya Jugal Kumar KaKta»C) CRC Press J Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor
Theme: The Growing Role of Private Security Companies in Protecting the Homeland.
Theme: The Growing Role of Private Security Companies in Protecting the Homeland. Background on terrorist organizations: A global threat, every object is a target, infinite number of targets. Terrorist
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS
STANDARDISATION AND CLASSIFICATION OF ALERTS GENERATED BY INTRUSION DETECTION SYSTEMS Athira A B 1 and Vinod Pathari 2 1 Department of Computer Engineering,National Institute Of Technology Calicut, India
Ensemble Methods. Knowledge Discovery and Data Mining 2 (VU) (707.004) Roman Kern. KTI, TU Graz 2015-03-05
Ensemble Methods Knowledge Discovery and Data Mining 2 (VU) (707004) Roman Kern KTI, TU Graz 2015-03-05 Roman Kern (KTI, TU Graz) Ensemble Methods 2015-03-05 1 / 38 Outline 1 Introduction 2 Classification
Mining a Corpus of Job Ads
Mining a Corpus of Job Ads Workshop Strings and Structures Computational Biology & Linguistics Jürgen Jürgen Hermes Hermes Sprachliche Linguistic Data Informationsverarbeitung Processing Institut Department
International Journal of Computer Science Trends and Technology (IJCST) Volume 2 Issue 3, May-Jun 2014
RESEARCH ARTICLE OPEN ACCESS A Survey of Data Mining: Concepts with Applications and its Future Scope Dr. Zubair Khan 1, Ashish Kumar 2, Sunny Kumar 3 M.Tech Research Scholar 2. Department of Computer
Background Report: 9/11, Ten Years Later
Background Report: 9/11, Ten Years Later THE UNIQUE NATURE OF 9/11 Among terrorism incidents in the United States and around the world, al-qa ida s attacks on September 11, 21, are notably unique. FATALITIES
Sentiment analysis on news articles using Natural Language Processing and Machine Learning Approach.
Sentiment analysis on news articles using Natural Language Processing and Machine Learning Approach. Pranali Chilekar 1, Swati Ubale 2, Pragati Sonkambale 3, Reema Panarkar 4, Gopal Upadhye 5 1 2 3 4 5
PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD
PHISHING IN SEASON TAX TIME MALWARE, PHISHING AND FRAUD April 2013 As cybercriminals will have it, phishing attacks are quite the seasonal trend. It seems that every April, after showing a slight decline
