What is it about?
Analysis of the terrorist network is a process to analyze or deriving Useful information from the available network data. Ranking The Terrorist nodes within a terrorist network in identifying the most influential node is essential for the elaboration of Covert network mining. The purpose of this paper is to implement an approach of two dimensional criteria weight determination along with logarithmic concept implementation for vital node investigation in term of their influential ability. Betweenness, Closeness, Eigenvector, Hub, In-degree, Inverse closeness, Out-degree and Total degree considered as criteria and terrorist involved in 9/11 terrorist attack considered as alternatives used to formulate a decision problem. Although an integrated approach of Fuzzy based subjective-Aggregation concept based objective criteria weight determination and Ranking alternatives by the implementation of the logarithmic concept is used to solve multi criteria decision problems in order to show the application of most centralized node identification process which can be obtained easily by classification and selection problem solution using multiple criteria and alternatives.
Photo by Sean Lee on Unsplash
Why is it important?
A terrorist organization has a defining structure and any main objective, with the help of which any terrorist organization can be easily identified. In the last few years, terrorist organizations have become opaque and more spreading. The hidden structure in any terrorist network is to get information called Social Network Analysis (SNA). This article will explain about the Social Network Analysis as well as it will also explain how to use SNA to investigate terrorist organization activities and other covert networks information.
Read the Original
This page is a summary of: A fuzzy based integrated model for identification of vital node in terrorist network using logarithmic concept, Journal of Intelligent & Fuzzy Systems, October 2020, IOS Press, DOI: 10.3233/jifs-191899.
You can read the full text:
The following have contributed to this page