Skip to main content

Web Data mining For Terrorism Analysis

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 11 Issue: 04 | Apr 2024

p-ISSN: 2395-0072

www.irjet.net

Web Data mining For Terrorism Analysis Prof. Jayshree Muley1, Anirudh Dhokale2, Sudarshan Khedkar3, Prajwal Aher 4, Sairup Urudwad5 1

Guide and Professor, Department of Computer Engineering 2,3,4 Students, Department of Computer Engineering Jayawantrao Sawant College of Engineering, Pune, India

---------------------------------------------------------------------***---------------------------------------------------------------------

Abstract - The rise of the internet and social media

capabilities and user authentication, are key steps. Thorough testing ensures functionality across various languages before deploying on a suitable platform. Continuous monitoring post-deployment ensures optimal performance, while iterative feedback collection drives refinement and improvement to meet user needs effectively.

platforms has revolutionized communication, enabling individuals and groups with extremist ideologies to propagate their beliefs and recruit followers on a global scale. This paper presents a comprehensive overview of the methods and technologies employed in the detection of the online spread of terrorism. Terrorist organizations exploit the anonymity and reach of the internet to disseminate propaganda, coordinate activities, and radicalize individuals. Detecting and preventing these activities are critical for national security and the preservation of online spaces as platforms for free expression.

1. Characterize Goals and Extension: • Obviously frame the goals of the venture. Figure out what dialects the site will support and what highlights it will offer. • Characterize the extent of the undertaking, including the interest group and a particular necessities or requirements.

Key Words: Online Terrorism, Terrorism Detection, Extremism Online, Counter terrorism, Machine Learning, Online Safety.

2. Market Exploration and Investigation: • Direct statistical surveying to comprehend the interest for language interpretation benefits and recognize expected contenders. • Dissect existing language interpretation sites to grasp their highlights, assets, and shortcomings.

1. INTRODUCTION The detection of the online spread of terrorism involves monitoring and identifying individuals or groups that use the internet and social media platforms to promote, plan, or execute acts of terrorism. This is a critical aspect of counterterrorism efforts in the digital age, as the internet provides a powerful platform for recruitment, radicalization, communication, and propaganda by extremist organizations and individuals.

3. Requirements Social affair: • Assemble definite necessities from partners, including language support, friendly UI, upheld document types, and so forth. 4. Technology Stack Choice:

The detection of the online spread of terrorism is an ongoing challenge that requires a multifaceted approach, including technology, international cooperation, legal frameworks, and efforts to counter radicalization and extremism. It is a dynamic field that continues to evolve as terrorists adapt to new online platforms and communication methods.

• This could incorporate programming dialects, structures, and libraries for frontend and backend improvement, as well as data set arrangements. 5. Design Stage: • Make wireframes and models to picture the design and usefulness of the site. • Plan the UI (UI) and client experience (UX) to guarantee natural route and availability.

2. METHODOLOGY The methodology for developing a Terrorism Detection starts with defining clear objectives and selecting appropriate technologies. Following this, architects design the system's structure while developers create an intuitive user interface. Integration of translation logic with chosen APIs or libraries, as well as implementation of NLP

© 2024, IRJET

|

Impact Factor value: 8.226

6. Development: • Carry out the frontend and backend usefulness as per the endorsed plans and prerequisites.

|

ISO 9001:2008 Certified Journal

|

Page 1157


Turn static files into dynamic content formats.

Create a flipbook
Web Data mining For Terrorism Analysis by IRJET Journal - Issuu