Attributes | Values |
---|
rdf:type
| |
Description
| - Spread of terrorism threat over the world is more than obvious during last years. Terrorism attacks have been practiced by a wide array of organizations or groups for achieving their objectives. We can include political parties, nationalistic and religious groups, revolutionaries, ruling governments or others. Due to this fact the need of observing and discovering relations and rules of behavior based on terrorism incidents becomes very important. The authors of the paper present the usage of data mining techniques like clustering methods or association rule mining methods for discovering and representation of latent and potentially useful relations in the data. The purpose of the paper is to model synthetic social network based on relations obtained from the data about terroristic incidents to found new, often latent or unexpected characteristics and patterns of the data.
- Spread of terrorism threat over the world is more than obvious during last years. Terrorism attacks have been practiced by a wide array of organizations or groups for achieving their objectives. We can include political parties, nationalistic and religious groups, revolutionaries, ruling governments or others. Due to this fact the need of observing and discovering relations and rules of behavior based on terrorism incidents becomes very important. The authors of the paper present the usage of data mining techniques like clustering methods or association rule mining methods for discovering and representation of latent and potentially useful relations in the data. The purpose of the paper is to model synthetic social network based on relations obtained from the data about terroristic incidents to found new, often latent or unexpected characteristics and patterns of the data. (en)
|
Title
| - Application of Data Mining Technologies for Modeling Latent Relations Based on Terrorist Incidents in Context of Synthetic Social Networks
- Application of Data Mining Technologies for Modeling Latent Relations Based on Terrorist Incidents in Context of Synthetic Social Networks (en)
|
skos:prefLabel
| - Application of Data Mining Technologies for Modeling Latent Relations Based on Terrorist Incidents in Context of Synthetic Social Networks
- Application of Data Mining Technologies for Modeling Latent Relations Based on Terrorist Incidents in Context of Synthetic Social Networks (en)
|
skos:notation
| - RIV/47813059:19520/11:#0001538!RIV12-MSM-19520___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/47813059:19520/11:#0001538
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - terrorism incidents, modeling latent relations, data mining, association rules mining, social network analysis, community analysis, behavior (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Proceedings of Distance Learning, Simulation and Communication, DLSC 2011
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| - Górecki, Jan
- Slaninová, Kateřina
|
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| |
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |