This HTML5 document contains 45 embedded RDF statements represented using HTML+Microdata notation.

The embedded RDF content will be recognized by any processor of HTML5 Microdata.

Namespace Prefixes

PrefixIRI
n13http://linked.opendata.cz/ontology/domain/vavai/riv/typAkce/
dctermshttp://purl.org/dc/terms/
n17http://purl.org/net/nknouf/ns/bibtex#
n10http://localhost/temp/predkladatel/
n19http://linked.opendata.cz/resource/domain/vavai/riv/tvurce/
n21http://linked.opendata.cz/resource/domain/vavai/subjekt/
n8http://linked.opendata.cz/ontology/domain/vavai/
n15https://schema.org/
shttp://schema.org/
skoshttp://www.w3.org/2004/02/skos/core#
n3http://linked.opendata.cz/ontology/domain/vavai/riv/
n2http://linked.opendata.cz/resource/domain/vavai/vysledek/
rdfhttp://www.w3.org/1999/02/22-rdf-syntax-ns#
n6http://linked.opendata.cz/resource/domain/vavai/vysledek/RIV%2F47813059%3A19520%2F11%3A%230001538%21RIV12-MSM-19520___/
n7http://linked.opendata.cz/ontology/domain/vavai/riv/klicoveSlovo/
n18http://linked.opendata.cz/ontology/domain/vavai/riv/duvernostUdaju/
xsdhhttp://www.w3.org/2001/XMLSchema#
n14http://linked.opendata.cz/ontology/domain/vavai/riv/jazykVysledku/
n4http://linked.opendata.cz/ontology/domain/vavai/riv/aktivita/
n16http://linked.opendata.cz/ontology/domain/vavai/riv/obor/
n9http://linked.opendata.cz/ontology/domain/vavai/riv/druhVysledku/
n11http://reference.data.gov.uk/id/gregorian-year/

Statements

Subject Item
n2:RIV%2F47813059%3A19520%2F11%3A%230001538%21RIV12-MSM-19520___
rdf:type
n8:Vysledek skos:Concept
dcterms:description
Spread of terrorism threat over the world is more than obvious during last years. Terrorism attacks have been practiced by a wide array of organizations or groups for achieving their objectives. We can include political parties, nationalistic and religious groups, revolutionaries, ruling governments or others. Due to this fact the need of observing and discovering relations and rules of behavior based on terrorism incidents becomes very important. The authors of the paper present the usage of data mining techniques like clustering methods or association rule mining methods for discovering and representation of latent and potentially useful relations in the data. The purpose of the paper is to model synthetic social network based on relations obtained from the data about terroristic incidents to found new, often latent or unexpected characteristics and patterns of the data. Spread of terrorism threat over the world is more than obvious during last years. Terrorism attacks have been practiced by a wide array of organizations or groups for achieving their objectives. We can include political parties, nationalistic and religious groups, revolutionaries, ruling governments or others. Due to this fact the need of observing and discovering relations and rules of behavior based on terrorism incidents becomes very important. The authors of the paper present the usage of data mining techniques like clustering methods or association rule mining methods for discovering and representation of latent and potentially useful relations in the data. The purpose of the paper is to model synthetic social network based on relations obtained from the data about terroristic incidents to found new, often latent or unexpected characteristics and patterns of the data.
dcterms:title
Application of Data Mining Technologies for Modeling Latent Relations Based on Terrorist Incidents in Context of Synthetic Social Networks Application of Data Mining Technologies for Modeling Latent Relations Based on Terrorist Incidents in Context of Synthetic Social Networks
skos:prefLabel
Application of Data Mining Technologies for Modeling Latent Relations Based on Terrorist Incidents in Context of Synthetic Social Networks Application of Data Mining Technologies for Modeling Latent Relations Based on Terrorist Incidents in Context of Synthetic Social Networks
skos:notation
RIV/47813059:19520/11:#0001538!RIV12-MSM-19520___
n8:predkladatel
n21:orjk%3A19520
n3:aktivita
n4:O
n3:aktivity
O
n3:dodaniDat
n11:2012
n3:domaciTvurceVysledku
n19:6108229 n19:1797190
n3:druhVysledku
n9:D
n3:duvernostUdaju
n18:S
n3:entitaPredkladatele
n6:predkladatel
n3:idSjednocenehoVysledku
186758
n3:idVysledku
RIV/47813059:19520/11:#0001538
n3:jazykVysledku
n14:eng
n3:klicovaSlova
terrorism incidents, modeling latent relations, data mining, association rules mining, social network analysis, community analysis, behavior
n3:klicoveSlovo
n7:terrorism%20incidents n7:modeling%20latent%20relations n7:association%20rules%20mining n7:social%20network%20analysis n7:behavior n7:data%20mining n7:community%20analysis
n3:kontrolniKodProRIV
[A140B27F685F]
n3:mistoKonaniAkce
Brno
n3:mistoVydani
Brno
n3:nazevZdroje
Proceedings of Distance Learning, Simulation and Communication, DLSC 2011
n3:obor
n16:IN
n3:pocetDomacichTvurcuVysledku
2
n3:pocetTvurcuVysledku
2
n3:rokUplatneniVysledku
n11:2011
n3:tvurceVysledku
Slaninová, Kateřina Górecki, Jan
n3:typAkce
n13:EUR
n3:zahajeniAkce
2011-05-10+02:00
s:numberOfPages
7
n17:hasPublisher
Univerzita obrany
n15:isbn
978-80-7231-695-3
n10:organizacniJednotka
19520