Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Mathematics in Practice and Theory》 2019-16
Add to Favorite Get Latest Update

Quantitative Analysis of Recorded Data of Terrorist Attacks

LI Zhen-wei;JIN Guo-peng;WANG Ping;SONG Yu-ping;School of Finance and Business, Shanghai Normal University;  
Terrorism is a common threat to mankind and fighting against it is the responsibility of every country.In-depth analysis of data related to terrorist attacks can help deepen people's understanding of terrorism and provide valuable information support for counterterrorism and terrorism prevention.Quantitative analysis in this paper,the terrorist attacks of record data,using a sum,mutation progression method,entropy method,factor analysis of four kinds of established the comprehensive evaluation system,harmful to the terrorist attacks and clustering analysis,XGBoost model for claims that classifies the terrorist event,with the Logit,SVM and random forest three machine learning methods for six terrorist attacks in key areas to predict whether the terrorist attacks of 2018 growth,at the end of the paper characteristics of terrorist incident in Russia are analyzed,The results showed that terrorist organizations/individuals were more likely to launch terrorist attacks in the run-up to the festival.
【Fund】: 全国统计科学研究重点项目《非平稳高频金融数据的统计推断及实证研究》(2018LZ05);; 上海师范大学第十期重点学科数量经济学(310-AC7031-19-004221)
【CateGory Index】: D815.5
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【Citations】
Chinese Journal Full-text Database 5 Hits
1 GONG Wei-zhi;LIU Zeng-liang;WANG Ye;XU Jian-hong;School of Automation and Electrical Engineering,University of Science and Technology Beijing;National Defense University PLA China;;Research and Simulation of Terrorist Attack Risk Prediction Based on Big Data Analysis[J];计算机仿真;2015-04
2 WU Feng-ping;CHENG Tie-jun;Business School,Hohai University;;The Classification of Emergency based on Improved Gray Clustering Model[J];中国管理科学;2013-S1
3 Ou Chaomin,Lecturer,National University of Defense Technology;Tan Yuejin,Professor,National University of Defense Technology.;A Dynamic Analysis of International Terrorism after September 11:An ARMA Interrupted Model Ou Chaomin[J];世界经济与政治;2011-12
4 YANG He-ping~1, HE Wei-feng~(1,2), WU Ying-ming~1, FU Yu~1,LI Jian-feng~(2,3) , YAO Xiao-hui~3(1 Department of Services and Command, College of Military Economics,Wuhan 430223, China; 2 Urban Public Safety ResearchCenter, Nankai University, Tianjin 300071, China; 3 Beijing MunicipalInstitutes of Labor Protection, Beijing 100054, China);Ways of controlling the risks of the terrorist attack through social network analysis[J];安全与环境学报;2009-03
5 ZHAO Guo-min, LIU Mao, ZHANG Qing-song, YANG Yang, WANG Li(Urban Public Safety Research Center, Nankai University, Tianjin 300071, China);Terror attack risk assessment of subway station based of game theory[J];安全与环境学报;2006-03
【Co-citations】
Chinese Journal Full-text Database 10 Hits
1 Ding Xue-feng;School of Management,Shanghai University;;A Risk Evaluation of Grid System under a Sudden Terrorist Attack[J];工业工程;2015-06
2 DING Xuefeng;School of Management,Shanghai University;;Defense Resource Optimal Allocation Problem of Sudden Terrorism Attack Incident[J];同济大学学报(自然科学版);2015-07
3 WU Zuxin;DAI Ran;ZHANG Jun;Navigation College,Dalian Maritime Univ.;Dalian Maritime Safety Administration;;Ship emergency evacuation model based on variable weight grey clustering[J];上海海事大学学报;2015-01
4 YANG Xu;XIAO Heng;LIAO Shan;School of Economics and Management,Harbin Engineering University;School of Economics and Management,Hunan Institute of Technology;;Study on Evaluation of Continuous Innovation Ability of High-end Equipment Manufacturing Enterprises Based on MC-ZF-HD-DS[J];运筹与管理;2015-01
5 Zhang Yanqiong;Chen Zuqin;Su Xinning;School of Information Management,Nanjing University;Nanjing Technical College of Special Education;Jiangsu Key Laboratory of Data Engineering and Knowledge Service(Nanjing University);;The Classification of Emergency Events Based on Cloud Model[J];情报学报;2015-01
6 LIU Meng-fei;QIAN Yu;XIA Qiu;School of Environment,Nanjing University;;Accident Probability Assessment of Road Transportation of Dangerous Goods Based on AHP-FCE[J];安全与环境工程;2014-06
7 CHONG Peng-yun;SHUAI Bin;School of Transportation and Logistics,Southwest Jiaotong University;;Model of cascading failure in hazardous materials transportation network under series of terrorist attacks[J];系统工程理论与实践;2014-04
8 HU Xiao-yi;SHUAI Bin;CHONG Peng-yun;School of Transportation & Logistics,Southwest Jiaotong University;;Hazardous materials transportion network risk assessment of terrorist attack[J];计算机应用研究;2014-06
9 CHONG Peng-yun;SHUAI Bin;School of Transportation and Logistics,Southwest Jiaotong University;;Simulation Analysis on Hazardous Materials Transportation Network Survivability Under Terrorist Attack[J];计算机工程;2013-09
10 ZHANG Jing, YANG Rui, SHEN Shifei(Center for Public Safety Research, Department of Engineering Physics, Tsinghua University, Beijing 100084, China);Emergency information disclosure strategies in situations with intentional threats[J];清华大学学报(自然科学版);2010-08
【Secondary Citations】
Chinese Journal Full-text Database 10 Hits
1 WANG Yan;GAI Ming-jiu;ZHANG Jin-chun;Naval Aeronautical and Astronautical University Graduate Students’ Brigade;Naval Aeronautical and Astronautical University Department of Basic Sciences;;Priority Degree Evaluation of Chaotic Time Series Prediction Algorithm[J];海军航空工程学院学报;2014-05
2 CHEN Qiaoyu;BAN Zhijie;School of Computer Science, Inner Mongolia University;;Link prediction algorithm based on link importance and data field[J];计算机应用;2014-08
3 Fang Quanliang;Information Department,Tibet Armed PoliceCorps;;Adaptive initial QP prediction algorithmin vedio coding[J];微型机与应用;2014-13
4 ZHANG Chenyu;MEI Jun;ZHENG Jianyong;GUO Shaoqing;ZHOU Fuju;College of Electrical Engineering,Southeast University;;Adaptive forecasting algorithm without load-side harmonic detection for active power filter control[J];电力自动化设备;2014-06
5 LUO Zhi-lin;CHEN Ting;CAI Wan-dong;School of Computer,Northwestern Polytechnic University;School of Computer,Beijing University of Posts and Telecommunications;School of Computer,Northwestern Polytechnic University,Xi'an 710129,China;;Microblogging Retweet Prediction Algorithm Based on Random Forest[J];计算机科学;2014-04
6 SUN Hong;WANG Xiao-wan;WU Qian-zhong;QIN Shou-wen;ZHANG Jian-hong;TU Qian-wei;School of Optical-Electrical and Computer Engineering,University of Shanghai for Science and Technology;Shanghai Key Lab of Modern Optical System;;Algorithm of real-time object tracking and prediction[J];信息技术;2014-03
7 ZHANG Yongqiang;WANG Shuanglong;School of Information & Electrical Engineering,Hebei University of Engineering;;Intra Prediction of AVS Based on Zero-block and Fast MPPM[J];电视技术;2014-05
8 PANG Bo;XIE Zhuo-chen;MA Lu;LIU Hui-jie;Shanghai Institute of Microsystem and Information Technology,Chinese Academy of Sciences;Shanghai Engineering Center for Microsatellites;;An algorithm of interference prediction based on historical information[J];信息技术;2014-02
9 GUAN Jie;LI Guo-ning;WEN Yu-jun;School of Automation and Electrical Engineering,Lanzhou Jiaotong University;Department of market CCCC SHB Electric Engineering Co. ,Ltd.;;Prediction Algorithm of GSM-R Field Intensity Coverage Based on GRNN[J];铁道标准设计;2014-02
10 XIA Nu;LI Wei;LUO Jun-Zhou;YU Feng;LU You;School of Computer Science and Engineering,Southeast University;;A Routing Node Behavior Prediction Algorithm Based on Fluctuation Type Identification[J];计算机学报;2014-02
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved