Your Ad Here
RSS Bookmark and Share
 
Skip Navigation LinksHome > Computers and Electronics > Online Surveillance & Data Mining
SUBMIT VIDEO LINKS AND EARN MONEY -- Visit Submit Videos Page
Online Surveillance & Data Mining
Views: 5747
13 Votes
Report Broken Link
Email Bookmark and Share
You have not rated
Related videos: Computers and Electronics
views:6281
00:23:27
10 Votes
views:6422
00:03:51
12 Votes
views:6579
00:02:40
11 Votes
views:8286
00:05:07
9 Votes
views:7846
00:08:41
18 Votes
views:25450
01:20:11
17 Votes
views:8340
00:05:43
16 Votes
views:8498
00:03:40
6 Votes
views:5040
00:09:31
10 Votes
views:12780
00:02:31
9 Votes
123
Summary
A fully automatic program combs the internet in search of militants and their followers. The software tries to identify anonymous authors using text criteria such as word length, punctuation, syntax and content to create a profile almost as unique as a human fingerprint. The software then provides a graphic representation of the results known as a ‘right print’. The software can also recognize the opinion leaders among the center of the network. Hsinchun Chen, the head of the “Dark Web Project” explains that they have expanded the software to about 25,000 to 30,000 features that can be identified. Attempts to misguide the computer by changing the style of action by a terrorist can also be counterfeited by the software as is explained in this wonderful video. The video also contains various other instances of computer surveillance and data mining based methods being used to detect and catch militants and miscreants.
Keywords: Data Mining, Online Surveillance, Terrorists, Militants, Dark Web Project, Text Mining, Natural Language Processing, Graph Drawing, Signature, Fingerprint, Feature Extraction, Clustering, Classification
Your Ad Here





Your Ad Here