Modeling and Quantitative Analysis of Terrorist Attack Task List

被引:0
|
作者
Zuo, Baishun [1 ]
Zhu, Wei [1 ]
Li, Feng [1 ]
Zhuo, Jia [1 ]
机构
[1] Natl Univ Def Technol, Sch Informat & Commun, Wuhan, Hubei, Peoples R China
关键词
Analytic Hierarchy Process; Fuzzy Clustering Method; Terrorist Attack;
D O I
10.1109/itnec48623.2020.9084780
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Terrorism has become a major threat to global non-traditional security, characterized by localization, decentralization and networking. Based on GTD database, with the help of big data thinking, this paper optimizes the GTD related data of terrorist attacks by using mathematical methods such as hierarchical analysis, fuzzy clustering analysis and regression analysis, screens the main influencing factors of the harmfulness of terrorist incidents, and uses the analytic hierarchy process to carry out weight analysis. Hazard coefficients are defined for different influencing factors, and a quantitative model of terrorist attack hazards is constructed based on the weight of influencing factors. The hazard values of all events in the sample set are calculated by the model, and the hazard values are sorted and graded. Based on the model, the terrorist events in GTD are graded, calculated and ranked. Based on the self-defined similarity coefficient, the suspicion degree of terrorists about typical events is determined, thus the global counter-terrorism situation is effectively predicted.
引用
收藏
页码:1439 / 1444
页数:6
相关论文
共 50 条
  • [1] Quantitative Research on Global Terrorist Attacks and Terrorist Attack Classification
    Hu, Xueli
    Lai, Fujun
    Chen, Gufan
    Zou, Rongcheng
    Feng, Qingxiang
    SUSTAINABILITY, 2019, 11 (05)
  • [2] Texas Task Force responds to terrorist attack
    不详
    IIE SOLUTIONS, 2001, 33 (12): : 10 - 10
  • [3] Modeling and simulation analysis of crowd evacuation behavior under terrorist attack
    Liu, Jing
    Jia, Yang
    Mao, Tianlu
    Wang, Zhaoqi
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2022, 604
  • [4] FIRE - A TERRORIST WEAPON - AN ANALYSIS OF THE MOVE CONFRONTATION AS A TERRORIST ATTACK
    KING, S
    KING, CG
    FIRE ENGINEERING, 1986, 139 (10) : 26 - &
  • [5] Modeling heterogeneous behaviors with different strategies in a terrorist attack
    Bi, Le
    Liu, Tingting
    Liu, Zhen
    Teo, Jason
    Zhao, Yumeng
    Chai, Yanjie
    Virtual Reality and Intelligent Hardware, 2023, 5 (04): : 351 - 365
  • [6] Modeling heterogeneous behaviors with different strategies in a terrorist attack
    Le BI
    Tingting LIU
    Zhen LIU
    Jason TEO
    Yumeng ZHAO
    Yanjie CHAI
    虚拟现实与智能硬件(中英文), 2023, 5 (04) : 351 - 365
  • [7] The Terrorist List, vol 5
    Johnson, Ryan
    LIBRARY JOURNAL, 2011, 136 (09) : 107 - 107
  • [8] Evaluation of responders to a terrorist attack
    Mcwilliams, R.
    Prerzant, D.
    Wartenberg, D.
    Hallman, W.
    Andreasen, G.
    Kelly, K.
    Kipen, H.
    EPIDEMIOLOGY, 2006, 17 (06) : S199 - S199
  • [9] Numerical Simulation of a Terrorist Attack
    Andreotti, Riccardo
    Riganti, Gianmario
    Boniardi, Marco
    PERFORMANCE, PROTECTION AND STRENGTHENING OF STRUCTURES UNDER EXTREME LOADING, 2011, 82 : 308 - +
  • [10] Identifying terrorist attack victims
    Arrighi, Elvire
    Charlot, Amandine Matricon
    FORENSIC SCIENCES RESEARCH, 2020, 5 (03) : 236 - 241