Open Access   Article Go Back

A Diagnosis System Framework for the Time-series analysis of the Terrorism attacks Worldwide

Dharanija. G1 , B. Chandana Priya2 , B. Manasa Sai3 , G.V. Vishnu Vardhan Reddy4 , Sujatha. K5

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-14 , Page no. 18-22, May-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7si14.1822

Online published on May 15, 2019

Copyright © Dharanija. G, B. Chandana Priya, B. Manasa Sai, G.V. Vishnu Vardhan Reddy, Sujatha. K . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Dharanija. G, B. Chandana Priya, B. Manasa Sai, G.V. Vishnu Vardhan Reddy, Sujatha. K, “A Diagnosis System Framework for the Time-series analysis of the Terrorism attacks Worldwide,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.14, pp.18-22, 2019.

MLA Style Citation: Dharanija. G, B. Chandana Priya, B. Manasa Sai, G.V. Vishnu Vardhan Reddy, Sujatha. K "A Diagnosis System Framework for the Time-series analysis of the Terrorism attacks Worldwide." International Journal of Computer Sciences and Engineering 07.14 (2019): 18-22.

APA Style Citation: Dharanija. G, B. Chandana Priya, B. Manasa Sai, G.V. Vishnu Vardhan Reddy, Sujatha. K, (2019). A Diagnosis System Framework for the Time-series analysis of the Terrorism attacks Worldwide. International Journal of Computer Sciences and Engineering, 07(14), 18-22.

BibTex Style Citation:
@article{G_2019,
author = {Dharanija. G, B. Chandana Priya, B. Manasa Sai, G.V. Vishnu Vardhan Reddy, Sujatha. K},
title = {A Diagnosis System Framework for the Time-series analysis of the Terrorism attacks Worldwide},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {14},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {18-22},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1081},
doi = {https://doi.org/10.26438/ijcse/v7i14.1822}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i14.1822}
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1081
TI - A Diagnosis System Framework for the Time-series analysis of the Terrorism attacks Worldwide
T2 - International Journal of Computer Sciences and Engineering
AU - Dharanija. G, B. Chandana Priya, B. Manasa Sai, G.V. Vishnu Vardhan Reddy, Sujatha. K
PY - 2019
DA - 2019/05/15
PB - IJCSE, Indore, INDIA
SP - 18-22
IS - 14
VL - 07
SN - 2347-2693
ER -

           

Abstract

Social media(twitter) is easily conveyed organization for the enrolled people that may fuse content, photos, chronicles and hyperlinks. Individuals post whereabouts, opinions and information to help or against social media. The most terrified subject is terrorist strikes happening far and wide. Terrorist exploits the web-based life to consistently impart utilizing code signs or to build their backhanded proximity. The words with the hash sign related with them are broke down, get the evaluation of the twitter posts. This paper displays a methodology for sentiment analysis on terrorist related posts and to deal with the slants with their geolocations. Machine learning procedures like KNN (K-Nearest Neighbor), Random Forest are connected and the information is prepared utilizing Exploratory Data Analysis. The results are looked at and exhibited.

Key-Words / Index Term

Sentiment Analysis; Exploratory Data Analysis; KNN; Random Forest; Geolocations

References

[1] Ali, Govand A., "Identifying Terrorist Affiliations through Social Network Analysis Using Data Mining Techniques,". M.S Theses, Dept. Information Technology, Valparaiso Univ., Indiana, USA, 2016.
[2] Enghin Omer, “Using Machine Learning to Identify Jihadist Messages on Twitter,”. M.S Theses, Dept. Information Technology, Uppsala Univ., Sweden, 2015.
[3] M. Rowe and H. Saif, “Mining pro-ISIS radicalisation signals from social media users,” in Proceedings of the 10th International Conference on Web and Social Media, 2016.
[4] Abhishek Barve, “Terror Attack Identifier: Classify using KNN, SVM, Random Forest algorithm and alert through messages,” International Research Journal of Engineering and Technology (IRJET), Vidyalankar Institute of Technology, India, 2018.
[5] Agarwal, A., Xie, B., Vovsha, I., Rambow, O., and Passonneau, R, “Sentiment Analysis of Twitter Data,” in Proc of ACL HLT Conf, 2011.
[6] Go, A., Bhayani, R., and Huang, L, “Twitter Sentiment Classification using Distant Supervision,” Technical Report, Stanford Digital Library Technologies Project, 2009.
[7] Juan DU, Zhi an Yi. “A New KNN Categorization Algorithm for Harmful Information Filtering”, 2012 IEEE.
[8] Mateusz Budnik, Iwona Pozniak-Koszalka, Leszek Koszalka, “The Usage of the k-Nearest Neighbour Classifier with Classifier Ensemble”, 12th International Conference on Computational Science and Its Applications, 2012 IEEE.
[9] Mohammad Abdul Wajeed, T. Adilakshmi,” Semi- Supervised Text Classification Using Enhanced KNN”.2011 IEEE.
[10] Lijun Wang, Xiqing Zhao,” Improved Knn Classification Algorithms Research in Text Categorization”. 2012 IEEE.
[11] Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon,” What is Twitter, a Social. or a News Media?”. International World Wide Web Conference Committee (IW3C2), April 26–30, 2010.
[12] G. Kesavaraj, Dr.S. Sukumaran, “A Study on Classification Techniques in Data Mining”, IEEE 4th ICCCNT - 2013 July 4 - 6, 2013.