Font Size: a A A

Design And Realization Of Data Mining Based Counter-terrorism Information System

Posted on:2017-08-13Degree:MasterType:Thesis
Country:ChinaCandidate:P XieFull Text:PDF
GTID:2416330590468422Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Violent terrorist activities have seriously threatened the global peace and security,various countries of Europe and America have successively carried out the counter-terrorism data collection and terrorism activity inspection against extreme violent organizations,such as “Al-Qaeda”,and China is also faced with severe counter-terrorism pressure.Specific to China's counter-terrorism situation,in order to effectively screen and control the domestic terrorists and terrorism activities,the public security departments shall fully draw lessons from the counter-terrorism experiences of the countries of Europe and America,based on the possession of population,tourism,ticket business,vehicles and other public security information sources,rapidly discover the suspicious terrorism information and eliminate the terrorism hazard.In front of the massive data,if we want to rapidly acquire the valid information,the manual screening cannot effectively process lots of data.However,the information of the terrorists is hidden in the massive normal information;how to rapidly screen out the valid information is the critical issue at present.The paper introduces the DM(data mining)technology in the “counter-terrorism information system”,by analyzing the terrorists' activity features,establishes the terrorist model,improve the associate rule algorithm,confirms the screening rules,and design and realizes the counter-terrorism information system.The specific research works are as follows:1)Analyze the terrorist regulations and features by combining the information sources.Based on the case investigation situation and supported by the population information,tourism lodging,vehicle situations and other public security information resources,study the terrorists' important activity in China.2)Analyze the DM technology and associate analysis algorithm,research the role of the associate analysis algorithm in the terrorism case investigation,improve the assignment points for the algorithm suitable for counter-terrorism analysis,and provide different reference decision-making to the investigators according to different points.3)Analyze the demands of counter-terrorism information system.Centering on the terrorists' activity features,structure the key special subject database of access to special places,communication with key terrorists and application of suspicious software,etc,and confirm the data model for the system.4)Design and realize the counter-terrorism information system.Based on the DM technology,research and design the key terrorist screening module,allocate the databases through SQL Server,and realize the system development by using C/S structure.At present,the system has been operated on line inside the public security system,and the screening efficiency via the system witnesses an increase of 26% compared by the previous manual judgment.Since the terrorist activities are with strong elusiveness and the regulation features are also rapidly changed,it is necessary to strengthen the research on and improvement of associate algorithm and model design,and further improve the construction of counter-terrorism information system.
Keywords/Search Tags:Counter-terrorism System, Data Mining, Associate Analysis, Information Screening
PDF Full Text Request
Related items