Journal of Computer and Communications

Volume 8, Issue 7 (July 2020)

ISSN Print: 2327-5219   ISSN Online: 2327-5227

Google-based Impact Factor: 1.12  Citations  

Improvised Technique for Analyzing Data and Detecting Terrorist Attack Using Machine Learning Approach Based on Twitter Data

HTML  XML Download Download as PDF (Size: 2034KB)  PP. 50-62  
DOI: 10.4236/jcc.2020.87005    537 Downloads   2,128 Views  Citations

ABSTRACT

Social media are interactive computer mediated technology that facilitates the sharing of information via virtual communities and networks. And Twitter is one of the most popular social media for social interaction and microblogging. This paper introduces an improved system model to analyze twitter data and detect terrorist attack event. In this model, a ternary search is used to find the weights of predefined keywords and the Aho-Corasick algorithm is applied to perform pattern matching and assign the weight which is the main contribution of this paper. Weights are categorized into three categories: Terror attack, Severe Terror Attack and Normal Data and the weights are used as attributes for classification. K-Nearest Neighbor (KNN) and Support Vector Machine (SVM) are two machine learning algorithms used to predict whether a terror attack happened or not. We compare the accuracy with our actual data by using confusion matrix and measure whether our result is right or wrong and the achieved result shows that the proposed model performs better.

Share and Cite:

Sarker, A. , Chakraborty, P. , Sha, S. , Khatun, M. , Hasan, M. and Banerjee, K. (2020) Improvised Technique for Analyzing Data and Detecting Terrorist Attack Using Machine Learning Approach Based on Twitter Data. Journal of Computer and Communications, 8, 50-62. doi: 10.4236/jcc.2020.87005.

Cited by

[1] An Intelligent Approach Based on Cleaning up of Inutile Contents for Extremism Detection and Classification in Social Networks
ACM Transactions on …, 2023
[2] Bangla handwritten character recognition using convolutional neural network
… Intelligence and Data …, 2022
[3] Fake Profile Detection Using Machine Learning Techniques
Journal of Computer and …, 2022
[4] Bengali Fake News Detection: Transfer Learning Based Technique with Masked LM Process by BERT
… Computing Technology: 7th …, 2022
[5] Eye-Gaze-Controlled Wheelchair System with Virtual Keyboard for Disabled Person Using Raspberry Pi
… Intelligence and Data …, 2022
[6] Predicting Terror Attacks Using Neo4j Sandbox and Machine Learning Algorithms
2022 6th International Conference On …, 2022
[7] COVID-19 in Bangladesh: An Exploratory Data Analysis and Prediction of Neurological Syndrome Using Machine Learning Algorithms Based on Comorbidity
Machine Intelligence and …, 2022
[8] Forecasting of COVID-19 Trends in Bangladesh Using Machine Learning Approaches
Machine Intelligence and …, 2022
[9] Comparative Performance Evaluation of Supervised Classification Models on Large Static Malware Dataset
Machine Intelligence and …, 2022
[10] Machine Learning to Classify Religious Communities and Detect Extremism on Social Networks: ML to CRCs and DE Through Text Tweets on SNs
International Journal of …, 2022
[11] Sentiment analysis of Bengali facebook data using classical and deep learning approaches
Innovation in Electrical Power …, 2022
[12] IoT-based smart home security and automation system
… Engineering: Proceedings of 5th ICMETE 2021, 2022
[13] Ascertaining polarity of public opinions on Bangladesh cricket using machine learning techniques
2021

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.