Full Project – Online terrorism detection system using data mining

Full Project – Online terrorism detection system using data mining

Click here to Get this Complete Project Chapter 1-5

   CHAPTER ONE

INTRODUCTION

1.0       Background of the Study

According to AU’s article 1 (3), Terrorism is defined as any act which is a violation of the criminal laws of a State Party and which may endanger the life, physical integrity or freedom of, or cause serious injury or death to any person, any number or group of persons or causes or may cause damage to public or private property, natural resources, environmental or cultural heritage and is calculated or intended to:

  1. Intimidate, put in fear, coerce or induce any government, body, institution, the general public or any segment thereof, to do or abstain from doing any act, or to adopt or abandon a particular standpoint or to act according to certain principles; or
  2. Disrupt any public service, the delivery of any essential service to the public or to create a public emergency; or
  • Create general insurrection in a State.

 

The AU, in article 3(1), also notes that:

  1. The struggle waged by peoples in accordance with the principles of international law for their liberation or self-determination, including armed struggle against colonialism, occupation, aggression and domination by foreign forces.
  2. Political, philosophical, ideological, racial, ethnic, religious or other motives shall not be a justifiable defense against a terrorist act.

 

More so, in recent decades, as it’s become clear that the internet can be used to connect people both for good and for ill, Face book and other social media companies have made it a priority to minimize the way criminals can use new technology. One of the greatest challenges in this arena has been terror groups, which have embraced the internet as a way to spread propaganda and recruit others to their extremist ideologies. These groups don’t confine their efforts to one social media service or online distribution mechanism. Instead, they try a variety of avenues to get their message out.But even as governments, companies and nonprofits have battled terrorist propaganda online, social media companies have faced a complex question over what’s the best way to tackle a global challenge that can proliferate in different ways, across different parts of the web.

Often analysts and observers will ask that, with the vast databases and advanced technology, why can’t social media companies block nefarious activity using technology alone. The truth remains that both technology and people are needed to stop the spread of terrorist content across the entire internet. It is based on this that the researcher painstakingly undertakes the voyage through the Online Terrorism Detection System which uses data mining to analyze audio and visual content for terrorism propaganda in our communities, and also to checking terrorist attempts to recruit people to their cause, and then spread fear in our society.

 

1.1       Statement of the Problem

The manual means of fighting terrorism has failed drastically both in the past and in recent times.  These methods includes:

  1. Relying on community policing/vigilante groups
  2. Declaring state of Emergency in some communities through selective engagement;
  • Securitizing the physical relationships/contacts of individuals, terrorists, intending terrorist and sponsors of terrorism
  1. Unintentionally giving the appearance that the police support particular individuals or groups, which could either undermine the legitimacy of those in a position to exercise a positive influence within the community or alienate other community members or communities.

Thus, these and more are the problems facing the traditional method of detecting and handling terrorism/terrorist movements and efforts.

1.2       Aim and Objectives of the Study

The aim of this project is to design a model that will assist in detecting terrorism and planned attacks. In accordance with this aim, the specific objectives for achieving the aim are:

  1. Curb the spread of terrorism and terrorist activities using data mining technique
  2. Ensure that any person who participates in the financing, planning, prepa­ration or perpetration of terrorist acts or in supporting terrorist acts is tracked down.
  • Keep records of terrorist, terrorist sponsors and terrorism in general
  1. Make it quite easy to carry out all of these activities through the net

1.3       Significance of the Study

The importance of this research work are as follows;

  1. The system will avoid/keep in check the activities of terrorist thereby reducing it to the barest minimum
  2. It will reduce the risk in loss of lives and properties as the face to face combats will be reduced
  • Ensure that there is a clear distinction between counterterrorism opera­tions and community police work and also ensure that there is effective co-ordination between these operations;
  1. It will create an avenue for members of the armed forces to be trained and properly managed

1.4       Scope and Limitation of the Study

This work is bounded between the following scopes;

  1. The detection algorithm would be based on the content of existing terrorist sites and known terrorist traffic on the Web.
  2. Detection would be carried out in real-time. This goal can be achieved only if terrorist information interests are presented in a compact manner for efficient processing.
  • The detection sensitivity should be controlled by user-defined parameters to enable calibration of the desired detection performance.

However, this work was also limited to consulting networking manuals, textbooks and handouts as well as the use of internet services. Other problem like the financial constraint, syntax and semantic programming error etc. were encountered. All these had in one way contributed to the inaccuracy and perfection of the design system.

 1.5       Definition of Terms

  1. Terrorism: the unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims
  2. Terrorist: a person who uses unlawful violence and intimidation, especially against civilians, in the pursuit of political aims.
  3. System: a set of things working together as parts of a mechanism or an interconnecting network; a complex whole.
  4. Terrorist Attack: act of terrorism, terrorism, terrorist act. the calculated use of violence (or the threat of violence) against civilians in order to attain goals that are political or religious or ideological in nature; this is done through intimidation or coercion or instilling fear. coup de main, surprise attack.
  5. Data: it is a collection of raw facts, charts and objects that are processed to produce meaningful and useful information.
  6. Suspect: someone that is presumed to be guilty without prove.
  7. Data Mining Technique: methods used are top downreasoning where we start with a hypothesisand then determine whether the hypothesisis true or bottom up reasoning where westart with examples and then come up with ahypothesis

 

Get the Complete Project

This is a premium project material and the complete research project plus questionnaires and references can be gotten at an affordable rate of N3,000 for Nigerian clients and $8 for international clients.

Click here to Get this Complete Project Chapter 1-5

 

 

 

 

 

You can also check other Research Project here:

  1. Accounting Research Project
  2. Adult Education
  3. Agricultural Science
  4. Banking & Finance
  5. Biblical Theology & CRS
  6. Biblical Theology and CRS
  7. Biology Education
  8. Business Administration
  9. Computer Engineering Project
  10. Computer Science 2
  11. Criminology Research Project
  12. Early Childhood Education
  13. Economic Education
  14. Education Research Project
  15. Educational Administration and Planning Research Project
  16. English
  17. English Education
  18. Entrepreneurship
  19. Environmental Sciences Research Project
  20. Guidance and Counselling Research Project
  21. History Education
  22. Human Kinetics and Health Education
  23. Management
  24. Maritime and Transportation
  25. Marketing
  26. Marketing Research Project 2
  27. Mass Communication
  28. Mathematics Education
  29. Medical Biochemistry Project
  30. Organizational Behaviour

32    Other Projects pdf doc

  1. Political Science
  2. Psychology
  3. Public Administration
  4. Public Health Research Project
  5. More Research Project
  6. Transportation Management
  7. Nursing

Education

Essay 

 

 

Full Project – Online terrorism detection system using data mining

Click here to Get The Complete Research Project Chapter 1-5

RESEARCH PROJECT CONTENTS
CHAPTER ONE - INTRODUCTION
1.1 Background of the study
1.2 Statement of problem
1.3 Objective of the study
1.4 Research Hypotheses
1.5 Significance of the study
1.6 Scope and limitation of the study
1.7 Definition of terms
1.8 Organization of the study
CHAPETR TWO – LITERATURE REVIEW
2.1. Introduction
2.2. Conceptual Framework
2.3. Theoretical Framework
2.4 Empirical Review
CHAPETR THREE - RESEARCH METHODOLOGY
3.1 Research Design
3.2 Study Area
3.3 Population of the Study
3.4 Sample Size and Sampling Technique
3.5 Instrument for Data Collection
3.6 Validity of the Instrument
3.7 Reliability of the Instrument
3.8 Method of Data Collection
3.9 Method of Data Analysis
3.9 Method of Data Analysis
3.10 Ethical Considerations
CHAPTER FOUR - DATA PRESENTATION AND ANALYSIS
4.1. Introduction
4.2 Demographic Profiles of Respondents
4.2 Research Questions
4.3. Testing of Research Hypothesis
4.4 Discussion of Findings
CHAPTER FIVE – SUMMARY, CONCLUSION & RECOMMENDATIONS
5.1 Introduction
5.2 Summary
5.3 Conclusion
5.4 Recommendation
REFERENCES
APPENDIX


Frequently Asked Questions | Https://eduschooler.com

Frequently Asked Questions

How do I get my choice complete project on any topic?
Simply click on the Download button above and follow the procedure stated.
I have a fresh topic that is not on your website. How do I go about it?
Chat with us on WhatsApp or contact our Instant Help Desk for a custom research project on your topic.
How fast can I get this complete project on any project topic?
Within 15 minutes if you want this exact project topic without adjustment.
Is it a complete research project or just materials?
It is a Complete Research Project i.e Chapters 1-5, Abstract, Table of Contents, Full References, Questionnaires / Secondary Data.
What if I want to change the case study for this topic?
Chat with Our Instant Help Desk Now: +234 708 7083 227 and you will be responded to immediately.
How will I get my complete project?
Your Complete Project Material will be sent to your Email Address in Ms Word document format.
Can I get my Complete Project through WhatsApp?
Yes! We can send your Complete Research Project to your WhatsApp Number.
What if my Project Supervisor made some changes to a topic I picked from your website?
Call Our Instant Help Desk Now: +234 708 7083 227 and you will be responded to immediately.
Do you assist students with Assignment and Project Proposal?
Yes! Call Our Instant Help Desk Now: +234 708 7083 227 and you will be responded to immediately.
What if I do not have any project topic idea at all?
Smiles! We've Got You Covered. Chat with us on WhatsApp Now to Get Instant Help: +234 708 7083 227.
How can I trust this site?
We are genuine and duly registered with the Corporate Affairs Commission. This site runs on Secure Sockets Layer (SSL), ensuring all transactions are highly secure and safe.
Customer Testimonials | Https://eduschooler.com

Our Customers are Happy

Ademola A.

★★★★★

I was skeptical at first, but after placing my order, my full project arrived in my email in under 15 minutes! The process was smooth, clear, and professional. Truly amazing service!

Kwabena K.

★★★★★

I needed a custom project on a new topic. Https://eduschooler.com delivered within 3 days, and the quality was outstanding. They even guided me on how to defend it. Highly recommend!

Michael H.

★★★★★

Fast, reliable, and very professional. My research project was delivered on time, with no hidden charges. The team is trustworthy and supportive.

Fatou B.

★★★★★

I got my full project in minutes and my custom request within 3 days. Their communication is clear, and the material is top-notch. Excellent experience!

James O.

★★★★★

https://eduschooler.com is a lifesaver! My project was delivered exactly as requested. The team is friendly, professional, and highly responsive. Very satisfied!

Ngozi E.

★★★★★

I was worried about paying online, but the team reassured me and delivered my complete project instantly. Transparent and professional service!

Ama S.

★★★★★

I requested a custom topic project and received it in just 3 days. The guidance and quality were excellent. I recommend eduschooler.com to everyone!

Sarah W.

★★★★★

The service is dependable and efficient. My project arrived on time, and every step was transparent. Truly a professional service I trust.

Emmanuel T.

★★★★★

Fast and reliable. My full project was delivered in minutes, and the custom project in 3 days. Communication was excellent throughout.

Aisha N.

★★★★★

Extremely satisfied with the service. My project was delivered promptly, fully transparent, and of high quality. A trustworthy academic partner!

Live Chat
Admin is typing...