2009 Second International Conference on Computer and Electrical Engineering 2009
DOI: 10.1109/iccee.2009.46
|View full text |Cite
|
Sign up to set email alerts
|

Notice of Violation of IEEE Publication Principles - Detecting Terror-Related Activities on the Web with Using Data Mining Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…The Web pages downloaded are fed as the input to the Vector Generator module as shown in Figure 1, which converts the pages into vectors of weighted terms (each page into a vector). These vectors are stored for future processing in the vector of Terrorist Transaction in DB [9]. The unsupervised clustering is performed on these vectors.…”
Section: Learning Typical Terrorist Behaviormentioning
confidence: 99%
See 1 more Smart Citation
“…The Web pages downloaded are fed as the input to the Vector Generator module as shown in Figure 1, which converts the pages into vectors of weighted terms (each page into a vector). These vectors are stored for future processing in the vector of Terrorist Transaction in DB [9]. The unsupervised clustering is performed on these vectors.…”
Section: Learning Typical Terrorist Behaviormentioning
confidence: 99%
“…The document D is represented by the n-dimensional vector V= (v 1 , v 2 , v 3 …v n) where v i represents the frequency-based weight of term i in D. The similarity between the two documents represented as vectors may be computed by using one of the known vector distance measuring methods such as Euclidian distance or Cosine. The cosine similarity measure is commonly used to estimate the similarity between an accessed Web page and a given set of terrorists' topic of interest [9].…”
Section: Vector-space Modelmentioning
confidence: 99%
“…The Web pages downloaded are fed as the input to the Vector Generator module which converts the pages into vectors of weighted terms (each page into a vector). These vectors are stored for future processing in the vector of Terrorist Transaction in DB [9].…”
Section: Learning Typical Terrorist Behaviormentioning
confidence: 99%
“…The cosine similarity measure is commonly used to estimate the similarity between an accessed Web page and a given set of terrorists' topic of interest [9].…”
Section: Vector-space Modelmentioning
confidence: 99%