SlideShare a Scribd company logo
1 of 8
Download to read offline
Data Mining for Integration and Verification of
Socio-Geographical Trend Statements in the Context of Conflict
Risk
Vera Kamp, Jean-Pierre Knust, Reinhard Moratz, Kevin Stehn, Soeren Stoehrmann
{vera.kamp, jp, kevin.stehn, soeren.stoehrmann}@data42.de
data42 GmbH
moratz@uni-muenster.de
University of Muenster
Abstract. Data mining enables an innovative, largely automatic meta-analysis of the relation-
ship between political and economic geography analyses of crisis regions. As an example, the
two approaches Global Conflict Risk Index (GCRI) and Fragile States Index (FSI) can be re-
lated to each other. The GCRI is a quantitative conflict risk assessment based on open source
data and a statistical regression method developed by the Joint Research Centre of the Euro-
pean Commission. The FSI is based on a conflict assessment framework developed by The
Fund for Peace in Washington, DC. In contrast to the quantitative GCRI, the FSI is essentially
focused on qualitative data from systematic interviews with experts.
Both approaches therefore have closely related objectives, but very different methodologies
and data sources. It is therefore hoped that the two complementary approaches can be com-
bined to form an even more meaningful meta-analysis, or that contradictions can be discov-
ered, or that a validation of the approaches can be obtained if there are similarities. We propose
an approach to automatic meta-analysis that makes use of machine learning (data mining).
Such a procedure represents a novel approach in the meta-analysis of conflict risk analyses.
1 Introduction
Data mining enables an innovative, largely automatic meta-analysis of the relationship
between political and economic geography analyses of crisis regions. As an example, the
two approaches Global Conflict Risk Index (GCRI) and Fragile States Index (FSI) can be
related to each other. The GCRI is a quantitative conflict risk assessment based on open
source data and a statistical regression method developed by the Joint Research Centre of
the European Commission. The FSI is based on a conflict assessment framework developed
by The Fund for Peace in Washington, DC. In contrast to the quantitative GCRI, the FSI is
essentially focused on qualitative data.
Both approaches therefore have closely related objectives, but very different method-
ologies and data sources. It is therefore hoped that the two complementary approaches can
be combined to form an even more meaningful meta-analysis, or that contradictions can be
discovered, or that a validation of the approaches can be obtained if there are similarities.
We propose an approach to automatic meta- analysis that makes use of machine learn-
ing (data mining). Such a procedure represents a novel approach in the meta-analysis of
conflict risk analyses.
1DOI : 10.5121/ijaia.2019.10401
International Journal of Artificial Intelligence & Applications (IJAIA) Vol.10, No.4, July 2019
In our context, the use of so-called multi-layered perceptrons is a suitable approach.
Perceptrons are the central and classical approach within the field of so-called artificial neu-
ral networks (ANN). These perceptrons are typically trained by backpropagation. Back-
propagation belongs to the group of supervised learning methods and is applied to multi-
layered perceptrons in that an external teaching function knows the desired output, the
target value, for a sample of inputs. This sample is also known as a training set. In the next
section, we briefly summarize the mathematical properties of this robust and proven data
mining approach.
2 Principles of Multi-Layer Perceptrons
A single-layer perceptron realizes a mapping from an input vector i with e components
to an output vector o with a components. The mapping function of the perceptron is de-
termined by its weight matrix G (a e × a matrix), its threshold vector s (a vector with a
components) and its threshold function θ The techniques discussed in this work use the
threshold function θσ. The threshold function θσ is thus defined:
θσ
















x1
x2
...
j
...
















=








y1
y2
...
yj
...








, yj =
1
1 + e−xj
Then o is calculated from i as follows:
o = θ(Gi + s)
A multi-layered perceptron can be constructed as a sequence of several coupled single-
layer perceptrons. Let i be the input of the first single-layer perceptron, its output is as v1 (a
vector with h1 components). The input of the second perceptron is then v1, whose output
is v2, and so on. The output of the last single-layer perceptron in this chain is is o and thus
also the output of the entire multilayer perceptrons. The number of layers is z. The weight
matrices of the perceptrons are G1, G2, . . . , Gz. their threshold vectors s1, s2, . . . , sz.
The output vector l ”a ”is then calculated like this:
v1 = θ (G1i + s1)
v2 θ (G2v1 + s1)
...
o = θ (Gzvz−1 + sz)
o = θ(Gz . . . θ (G2 θ (G1i + s1) + s2) . . . + sz)
2
InternationalJournal of ArtificialIntelligence & Applications(IJAIA) Vol.10,No.4,July2019
Fig. 1. A multi-layered perceptron and its parameters.
There is a network representation of this calculation process. Thereby vectors
i, v1, . . . , vz−1, o are each viewed as layers of processing nodes (in the network perspec-
tive, the input vector is also a node layer). Then each component of these vectors is viewed
as processing node. These processing nodes are also called neurons.
2.1 Backpropagation
With the backpropagation training procedure, multi-layer perceptrons with the threshold
function θσ can be adapted to a training set (e.g. supervised machine learning). The pro-
cedure is carried out on a two-stage network with a The feed node is auto-explained. This
network has the parameters G1,G2,s1 and s2. Since the threshold function θσ is used, the
value is of the output node is a real number from the interval from 0 to 1. For a given Me
series (ym, xm), the total error is to be set to of this sample fk((ym, xm)) must be mini-
mal. Since the backpropagation procedure is the method of the steepest descent is used, a
constant expression must be found, which is has a minimum at fk((ym, xm)) = 0.
3
InternationalJournal of ArtificialIntelligence & Applications(IJAIA) Vol.10,No.4,July2019
Use a quadratic Error function JBP .
JBP (G1, G2, s1, s2) =
m
i=1
1
2
· (yi − (θσ (G2 θσ (G1xi + s1) + s2)))2
This error function has a minimum value of 0, if there is an error-free solution of the
loading problem. The backpropagation procedure follows this schema:
Startup:
All components from G1, G2, s1, s2 get pseudo-random numbers with values between -
0.5 and 0.5.
Iteration
GNew
1 := Gold
1 + λ ·
∂JBP Galt
1 , Galt
2 , salt
1 , salt
2
∂Galt
1
Gnew
2 := Gold
2 + λ ·
∂JBP Galt
1 , Galt
2 , salt
1 , salt
2
∂Galt
2
snew
1 := sold
1 + λ ·
∂JBP Galt
1 , Galt
2 , salt
1 , salt
2
∂salt
1
snew
2 := sold
2 + λ ·
∂JBP Galt
1 , Galt
2 , salt
1 , salt
2
∂salt
2
This ensures that after each step under the condition λ → 0 the inequality
JBP (Gnew
1 , Gnew
2 , snew
1 , snew
2 ) ≤ JBP Galt
1 , Galt
2 , salt
1 , salt
2 applies.
Termination condition:
JBP Galt
1 , Galt
2 , salt
1 , salt
2 − JBP (Gnew
1 , Gnew
2 , snew
1 , snew
2 ) < Tolerance value
The final state, where the gradients amountm ”a ”sig go towards 0 and no modification
of the weights takes place any more corresponds to a minimum of the error function. This
minimum can be set in a In our case, it must be a local minimum (see Tesi92[10]).
In order to speed up the loading process we usually use a the so-called momentum term,
which allows for weight ”changes earlier steps included (see Rumelhart86[23], Chapter 8).
3 Numerical data mining for cross-validation of GCRI and FSI
In a first experiment, we created an objective function based on the numerical indicators
of the Global Conflict Risk Index (GCRI) as input. These numerical indicators are already
4
InternationalJournal of ArtificialIntelligence & Applications(IJAIA) Vol.10,No.4,July2019
standardized to the interval 0.0 to 10.0. Since multi-layer perceptrons with their activation
levels can assume values between 0.0 and 1.0, the GCRI values must be multiplied by 0.1
to obtain regular input values for a perceptron. A series of input values from the GCRI then
corresponds to an input vector o (see section 2) of the perceptron. This input vector is given
a series of target values, the target vector as a desired output according to the corresponding
Fragile-State-Index component. In the first experiment we took the data from the Fragile-
State- Index/Fundforpeace as target values (source: http://fsi.fundforpeace.org/data). In
this first experiment, the input vector is assigned with respect to year yi of the country
lj a target vector of the same country lj and of the same year yi. For this purpose the
names of the countries must be matched from GCRI and Fragile-State-Index. In our exper-
iment we used the ISO country coding. The target vectors are then also normalized to the
interval from 0.0 to 1.0.
We started with a multi-layer perceptron with only one hidden layer. We started with
five hidden nodes and then went with increments of 5 to a previously calculated maximum
number of h hidden nodes. The parameter h was calculated according to the following
rule of thumb: One calculates per edge weight two bits information memory capacity. The
dimension of the input vector is e , the dimension of the output vector and at the same time
of the target vector is a (see section 2).
Thus the net has calculated approximatively i ∗ h + h ∗ o edge weights and then a
memory dependence Cnet = (2 ∗ i ∗ h + h ∗ o) Bit. The training set has approximatively
calculated a data content of Dtrain = number of the example vector pairs ∗∗o∗4∗o
bit. A network with too many hidden nodes has so much data storage capacity Cnet, that
it contains the data content Dtrain of the Training data set ”can learn by heart” can and
then in the worst case hardly generalize to new/unknown data. So h is chosen so that
Cnet < Dtrain applies.
After the multi-layer perceptron backpropated thousands of such value pairs, the mean
error on the original scale of fragile state indices with the interval from 0 to 10 was 0.71 for
the validation sample. The corresponding net then has 25 hidden nodes. A prediction with a
mean error of only 0.77 is already achieved with only 5 hidden nodes. This very impressive
result and its application aspects are discussed in the next section. As a technical detail you
can see on the diagram on the next page that with a very large number of hidden nodes the
effect described above with the capacity calculation actually occurs. A very high storage
capacity of the network can lead to an over-adaptation to the training sample only and the
prediction quality measured at the validation sample becomes significantly worse.
As a first practical benefit we can deduce for the year 1999 from GCRI data generate
hypothetical fragile state index estimates. As the fragile state index is only available until
2005, this is an added value.
In the next steps, predictions from the near present into the near future are aimed at.
For example, the Global Conflict Risk Index can use numerical indicators for 2014, 2015,
2016 of a country lj, to predict the fragile state index for 2017 of this country lj (i.e. it
doesn’t even exist yet). GCRI data of the years yi, yi+1, yi+2 are used as input vector and
5
InternationalJournal of ArtificialIntelligence & Applications(IJAIA) Vol.10,No.4,July2019
fragile state index. of the year yi+3 as target vectors. The multi-layered perceptron then
has the triple the entrance width.
In the third experiment, we will specify the difference of two consecutive years in the
fragile state index as the target value. Then an increase or decrease of the state of a country
with respect to instability ”at is trained as a prediction. In the fourth experiment, pairs
of input and target vectors are identified in the training set that indicate a deterioration
of a country. These risk pairs are added in three copies to the original training set. Thus,
the weight of risk predictions is weighted fourfold. This corresponds to a one-sided error
philosophy. Ideally, the system then becomes good at predicting possible risk situations
and is particularly sensitive to negative developments. The system can also generate ”false
alarms”, but these are considered to be much less dangerous than if the system were to
Risk situations ”overlooks”.
Fig. 2. Overfitting reduces the generalization performance.
6
InternationalJournal of ArtificialIntelligence & Applications(IJAIA) Vol.10,No.4,July2019
4 Discussion and outlook
The relatively small error in predicting from the Global Conflict Risk Index 2014 data
to the Fragile State Index 2014 data means that not only can the perceptron reproduce
the given data from 2006 to 2012, but it has learned regular relationships between GCRI
and FSI that can also be successfully applied to data not included in the training sample,
such as the 2014 data. For example, for the year 1999, GCRI data can be used to generate
hypothetical FSI data. As the Fragile State Index only dates back to 2005, this is already
an interesting added value.
With our data mining approach, we have succeeded in correlating the two approaches
Global Conflict Risk Index (GCRI) and Fragile States Index (FSI). We were able to predict
the FSI Index relatively accurately with a mean deviation of 0.7 from the GCRI Index for
the same year. This also clearly shows that the quantitative approach using open source
data from the GCRI and the qualitative conflict assessment framework of the FSI, which
is based on expert ratings, correlate strongly. This finding strengthens confidence in the
meaningfulness of both approaches.
Both approaches thus seem to generate comparable descriptions through their closely
related objectives, although they are based on very different methodologies and data
sources. Both approaches thus support each other, as we were able to show with our ap-
proach to automatic meta-analysis using machine learning (data mining). Our method thus
represents a novel approach in the meta-analysis of conflict risk analyses.
Furthermore, there are interesting possibilities to extend our approach. For example,
you can train predictions from the present into the near future. For example, use GCRI
indicators for 2017, 2018, 2019 of a country to predict FSI indicators for 2020 of that
country (i.e. which do not yet exist). For this purpose, Global Conflict Risk Index data of
the years can be used as input vectors and Fragile State Index of the year as target vectors.
Our innovative approach can therefore be extended directly to predict future trends.
References
1. E. B. Baum: On the Capabilities of Multilayer Perceptrons, Journal of Complexity, Vol.4, No.3, (1988).
2. E. B. Baum, D. Haussler: What Size Net gives Valid Generalisation ? Advances in Neural Information
Processing Systems, D. Touretzky, Ed., Morgan Kaufmann, San Mateo, CA, page 81-90 (1989).
3. E. B. Baum: On Learning a Union of Half Spaces, Journal of Complexity, Volume 6, Page 67-101 (1990).
4. E. B. Baum: When Are K-Nearest Neighbour and Backpropagation Accurate for Feasible Sized Sets of
Examples, in [?]
5. E. B. Baum: A Polynomial Time Algorithm That Learns Two Hidden Unit Nets, Neural Computation 2,
510-522, (1991).
6. A. Blum, R. Rivest: Training a 3-Node Neural Network is NP-complete, in COLT88[?] Page 211-218
(1988).
7. T. M. Cover: Geometrical and statistical properties of systems of linear inequalities with applications in
pattern recogniton, IEEE Trans. Electron. Comput. EC-14, 326-334.
8. De Groeve T, Hachemer P, Vernaccini L. The global conflict risk index (GCRI): a quantitative model.
Concept and Methodology. 2014.
9. Goodfellow, Ian, Yoshua Bengio, and Aaron Courville. Deep learning. MIT press, 2016.
7
InternationalJournal of ArtificialIntelligence & Applications(IJAIA) Vol.10,No.4,July2019
10. M. Gori, A. Tesi On the Problem of Local Minima in Backpropagation, IEEE Transactions on Pattern
Analysis and Machine Intelligence, Volume 14, No. 1, (1992).
11. Haken, Nate, J. J. Messner, Krista Hendry, Patricia Taft, Kendall Lawrence, Laura Brisard, and Felipe
Uman?a. 2014. Failed State Index 2014: The Book. Washington, D.C.: Fund for Peace.
12. D. O. Hebb: The Organisation of Behaviour, New York: Wiley (1949).
13. J. Hertz, A. Krogh, R. G. Palmer Introduction to the Theory of Neural Computation, Addison-Wesley,
Redwood City, Ca, (1991).
14. G. E. Hinton: Wie neuronale Netze aus Erfahrung lernen, in Spektrum der Wissenschaft, November-
Ausgabe, Heidelberg, (1992).
15. Marsland, Stephen. Machine learning: an algorithmic perspective. Chapman and Hall CRC, 2011.
16. J. S. Judd: Neural Network Design and the Complexity of Learning, MIT Press, Cambridge, MA (1990).
17. J. L. McClelland, D. E. RumelhartParallel Distributed Processing: Explorations in the Microstructure of
Cognition, A Handbook of Models, Programs, and Exercises, Cambridge, MA: MIT Press 1988.
18. W. S. McCulloch, W. Pitts: A Logical Calculus of the Ideas Imanent in Nervous Activity, Bull. Math.
Biophys. 5, 115-133 (1943).
19. M. Minsky, S. Papert: Perceptrons, Cambridge, MA: MIT Press 1969.
20. G. J. Mitchison, R. M. Durbin: Bounds on the Learning Capacity of some Multi-Layer Networks, Biol.
Cybern. Vol. 60, No.5, (1989).
21. B. K. Natarajan: Machine Learning, A Theoretical Approach, Morgan Kaufmann, San Mateo, CA, (1991).
22. F. Rosenblatt: Principles of Neurodynamics, New York: Spartan (1962).
23. D. E. Rumelhart, J. A. McClelland: Parallel Distributed Processing: Explorations in the Microstructure
of Cognition, Cambridge, MA: MIT Press 1986.
24. L. G. Valiant: A Theory of the Learnable, Communications of the ACM, Band 27, Nr.11. Seite 1134-1142
25. V. Vapnik: Estimation of Dependences Based on Empirical Data, Springer-Verlag, New York (1982).
26. G. Widrow, M. E. Hoff: Adaptive Switching Circuits, Institute of Radio Engineers, convention Record,
Part 4, 96-104 (1960).
8
InternationalJournal of ArtificialIntelligence & Applications(IJAIA) Vol.10,No.4,July2019

More Related Content

What's hot

Unexpected Default in an Information based model
Unexpected Default in an Information based modelUnexpected Default in an Information based model
Unexpected Default in an Information based modelMatteo Bedini
 
Scalable trust-region method for deep reinforcement learning using Kronecker-...
Scalable trust-region method for deep reinforcement learning using Kronecker-...Scalable trust-region method for deep reinforcement learning using Kronecker-...
Scalable trust-region method for deep reinforcement learning using Kronecker-...Willy Marroquin (WillyDevNET)
 
El text.tokuron a(2019).jung190711
El text.tokuron a(2019).jung190711El text.tokuron a(2019).jung190711
El text.tokuron a(2019).jung190711RCCSRENKEI
 
OPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTION
OPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTIONOPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTION
OPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTIONsipij
 
A C OMPARATIVE A NALYSIS A ND A PPLICATIONS O F M ULTI W AVELET T RANS...
A C OMPARATIVE  A NALYSIS  A ND  A PPLICATIONS  O F  M ULTI  W AVELET  T RANS...A C OMPARATIVE  A NALYSIS  A ND  A PPLICATIONS  O F  M ULTI  W AVELET  T RANS...
A C OMPARATIVE A NALYSIS A ND A PPLICATIONS O F M ULTI W AVELET T RANS...IJCI JOURNAL
 
An Effective PSO-inspired Algorithm for Workflow Scheduling
An Effective PSO-inspired Algorithm for Workflow Scheduling An Effective PSO-inspired Algorithm for Workflow Scheduling
An Effective PSO-inspired Algorithm for Workflow Scheduling IJECEIAES
 
An Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing ProblemAn Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing ProblemCSCJournals
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
Exploration of genetic network programming with two-stage reinforcement learn...
Exploration of genetic network programming with two-stage reinforcement learn...Exploration of genetic network programming with two-stage reinforcement learn...
Exploration of genetic network programming with two-stage reinforcement learn...TELKOMNIKA JOURNAL
 

What's hot (14)

Seminar
SeminarSeminar
Seminar
 
PhD defense talk slides
PhD  defense talk slidesPhD  defense talk slides
PhD defense talk slides
 
Unexpected Default in an Information based model
Unexpected Default in an Information based modelUnexpected Default in an Information based model
Unexpected Default in an Information based model
 
Scalable trust-region method for deep reinforcement learning using Kronecker-...
Scalable trust-region method for deep reinforcement learning using Kronecker-...Scalable trust-region method for deep reinforcement learning using Kronecker-...
Scalable trust-region method for deep reinforcement learning using Kronecker-...
 
El text.tokuron a(2019).jung190711
El text.tokuron a(2019).jung190711El text.tokuron a(2019).jung190711
El text.tokuron a(2019).jung190711
 
OPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTION
OPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTIONOPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTION
OPTIMAL GLOBAL THRESHOLD ESTIMATION USING STATISTICAL CHANGE-POINT DETECTION
 
A C OMPARATIVE A NALYSIS A ND A PPLICATIONS O F M ULTI W AVELET T RANS...
A C OMPARATIVE  A NALYSIS  A ND  A PPLICATIONS  O F  M ULTI  W AVELET  T RANS...A C OMPARATIVE  A NALYSIS  A ND  A PPLICATIONS  O F  M ULTI  W AVELET  T RANS...
A C OMPARATIVE A NALYSIS A ND A PPLICATIONS O F M ULTI W AVELET T RANS...
 
50120140503004
5012014050300450120140503004
50120140503004
 
Cell calculation
Cell calculationCell calculation
Cell calculation
 
An Effective PSO-inspired Algorithm for Workflow Scheduling
An Effective PSO-inspired Algorithm for Workflow Scheduling An Effective PSO-inspired Algorithm for Workflow Scheduling
An Effective PSO-inspired Algorithm for Workflow Scheduling
 
Bd31386389
Bd31386389Bd31386389
Bd31386389
 
An Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing ProblemAn Ant Algorithm for Solving QoS Multicast Routing Problem
An Ant Algorithm for Solving QoS Multicast Routing Problem
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
Exploration of genetic network programming with two-stage reinforcement learn...
Exploration of genetic network programming with two-stage reinforcement learn...Exploration of genetic network programming with two-stage reinforcement learn...
Exploration of genetic network programming with two-stage reinforcement learn...
 

Similar to Data Mining for Integration and Verification of Socio-Geographical Trend Statements in the Context of Conflict Risk

25 16285 a hybrid ijeecs 012 edit septian
25 16285 a hybrid ijeecs 012 edit septian25 16285 a hybrid ijeecs 012 edit septian
25 16285 a hybrid ijeecs 012 edit septianIAESIJEECS
 
Rigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy SystemRigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy Systeminventy
 
New Data Association Technique for Target Tracking in Dense Clutter Environme...
New Data Association Technique for Target Tracking in Dense Clutter Environme...New Data Association Technique for Target Tracking in Dense Clutter Environme...
New Data Association Technique for Target Tracking in Dense Clutter Environme...CSCJournals
 
Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...ijdpsjournal
 
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)neeraj7svp
 
An Improved Empirical Mode Decomposition Based On Particle Swarm Optimization
An Improved Empirical Mode Decomposition Based On Particle Swarm OptimizationAn Improved Empirical Mode Decomposition Based On Particle Swarm Optimization
An Improved Empirical Mode Decomposition Based On Particle Swarm OptimizationIJRES Journal
 
Prediction model of algal blooms using logistic regression and confusion matrix
Prediction model of algal blooms using logistic regression and confusion matrix Prediction model of algal blooms using logistic regression and confusion matrix
Prediction model of algal blooms using logistic regression and confusion matrix IJECEIAES
 
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...IJITCA Journal
 
Quantum inspired evolutionary algorithm for solving multiple travelling sales...
Quantum inspired evolutionary algorithm for solving multiple travelling sales...Quantum inspired evolutionary algorithm for solving multiple travelling sales...
Quantum inspired evolutionary algorithm for solving multiple travelling sales...eSAT Publishing House
 
Development, Optimization, and Analysis of Cellular Automaton Algorithms to S...
Development, Optimization, and Analysis of Cellular Automaton Algorithms to S...Development, Optimization, and Analysis of Cellular Automaton Algorithms to S...
Development, Optimization, and Analysis of Cellular Automaton Algorithms to S...IRJET Journal
 
Behavior study of entropy in a digital image through an iterative algorithm
Behavior study of entropy in a digital image through an iterative algorithmBehavior study of entropy in a digital image through an iterative algorithm
Behavior study of entropy in a digital image through an iterative algorithmijscmcj
 
An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...
An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...
An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...IJRESJOURNAL
 
Preconditioning in Large-scale VDA
Preconditioning in Large-scale VDAPreconditioning in Large-scale VDA
Preconditioning in Large-scale VDAJoseph Parks
 
A comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistributionA comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistributionIJCNCJournal
 
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...IJECEIAES
 
IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...
IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...
IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...IRJET Journal
 

Similar to Data Mining for Integration and Verification of Socio-Geographical Trend Statements in the Context of Conflict Risk (20)

AROPUB-IJPGE-14-30
AROPUB-IJPGE-14-30AROPUB-IJPGE-14-30
AROPUB-IJPGE-14-30
 
25 16285 a hybrid ijeecs 012 edit septian
25 16285 a hybrid ijeecs 012 edit septian25 16285 a hybrid ijeecs 012 edit septian
25 16285 a hybrid ijeecs 012 edit septian
 
Rigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy SystemRigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy System
 
New Data Association Technique for Target Tracking in Dense Clutter Environme...
New Data Association Technique for Target Tracking in Dense Clutter Environme...New Data Association Technique for Target Tracking in Dense Clutter Environme...
New Data Association Technique for Target Tracking in Dense Clutter Environme...
 
Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...Derivative threshold actuation for single phase wormhole detection with reduc...
Derivative threshold actuation for single phase wormhole detection with reduc...
 
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
PSF_Introduction_to_R_Package_for_Pattern_Sequence (1)
 
An Improved Empirical Mode Decomposition Based On Particle Swarm Optimization
An Improved Empirical Mode Decomposition Based On Particle Swarm OptimizationAn Improved Empirical Mode Decomposition Based On Particle Swarm Optimization
An Improved Empirical Mode Decomposition Based On Particle Swarm Optimization
 
Prediction model of algal blooms using logistic regression and confusion matrix
Prediction model of algal blooms using logistic regression and confusion matrix Prediction model of algal blooms using logistic regression and confusion matrix
Prediction model of algal blooms using logistic regression and confusion matrix
 
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...
APPLYING DYNAMIC MODEL FOR MULTIPLE MANOEUVRING TARGET TRACKING USING PARTICL...
 
Quantum inspired evolutionary algorithm for solving multiple travelling sales...
Quantum inspired evolutionary algorithm for solving multiple travelling sales...Quantum inspired evolutionary algorithm for solving multiple travelling sales...
Quantum inspired evolutionary algorithm for solving multiple travelling sales...
 
Development, Optimization, and Analysis of Cellular Automaton Algorithms to S...
Development, Optimization, and Analysis of Cellular Automaton Algorithms to S...Development, Optimization, and Analysis of Cellular Automaton Algorithms to S...
Development, Optimization, and Analysis of Cellular Automaton Algorithms to S...
 
Bz02516281633
Bz02516281633Bz02516281633
Bz02516281633
 
Behavior study of entropy in a digital image through an iterative algorithm
Behavior study of entropy in a digital image through an iterative algorithmBehavior study of entropy in a digital image through an iterative algorithm
Behavior study of entropy in a digital image through an iterative algorithm
 
An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...
An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...
An Improved Adaptive Multi-Objective Particle Swarm Optimization for Disassem...
 
Preconditioning in Large-scale VDA
Preconditioning in Large-scale VDAPreconditioning in Large-scale VDA
Preconditioning in Large-scale VDA
 
A comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistributionA comparison of efficient algorithms for scheduling parallel data redistribution
A comparison of efficient algorithms for scheduling parallel data redistribution
 
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
A Mixed Binary-Real NSGA II Algorithm Ensuring Both Accuracy and Interpretabi...
 
IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...
IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...
IRJET- A Particle Swarm Optimization Algorithm for Total Cost Minimization in...
 
Fcm1
Fcm1Fcm1
Fcm1
 
Fcm1
Fcm1Fcm1
Fcm1
 

More from gerogepatton

10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...gerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...gerogepatton
 
13th International Conference on Software Engineering and Applications (SEA 2...
13th International Conference on Software Engineering and Applications (SEA 2...13th International Conference on Software Engineering and Applications (SEA 2...
13th International Conference on Software Engineering and Applications (SEA 2...gerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATION
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATIONAN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATION
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATIONgerogepatton
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...gerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullyinggerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)gerogepatton
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...gerogepatton
 
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATION
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATIONWAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATION
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATIONgerogepatton
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...gerogepatton
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...gerogepatton
 
The International Journal of Artificial Intelligence & Applications (IJAIA)
The International Journal of Artificial Intelligence & Applications (IJAIA)The International Journal of Artificial Intelligence & Applications (IJAIA)
The International Journal of Artificial Intelligence & Applications (IJAIA)gerogepatton
 
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer ArchitectureFoundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecturegerogepatton
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...gerogepatton
 

More from gerogepatton (20)

10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
THE TRANSFORMATION RISK-BENEFIT MODEL OF ARTIFICIAL INTELLIGENCE:BALANCING RI...
 
13th International Conference on Software Engineering and Applications (SEA 2...
13th International Conference on Software Engineering and Applications (SEA 2...13th International Conference on Software Engineering and Applications (SEA 2...
13th International Conference on Software Engineering and Applications (SEA 2...
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATION
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATIONAN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATION
AN IMPROVED MT5 MODEL FOR CHINESE TEXT SUMMARY GENERATION
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
A Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of CyberbullyingA Machine Learning Ensemble Model for the Detection of Cyberbullying
A Machine Learning Ensemble Model for the Detection of Cyberbullying
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)10th International Conference on Data Mining (DaMi 2024)
10th International Conference on Data Mining (DaMi 2024)
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
 
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATION
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATIONWAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATION
WAVELET SCATTERING TRANSFORM FOR ECG CARDIOVASCULAR DISEASE CLASSIFICATION
 
International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)International Journal of Artificial Intelligence & Applications (IJAIA)
International Journal of Artificial Intelligence & Applications (IJAIA)
 
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...
Passive Sonar Detection and Classification Based on Demon-Lofar Analysis and ...
 
10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...10th International Conference on Artificial Intelligence and Applications (AI...
10th International Conference on Artificial Intelligence and Applications (AI...
 
The International Journal of Artificial Intelligence & Applications (IJAIA)
The International Journal of Artificial Intelligence & Applications (IJAIA)The International Journal of Artificial Intelligence & Applications (IJAIA)
The International Journal of Artificial Intelligence & Applications (IJAIA)
 
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer ArchitectureFoundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture
Foundations of ANNs: Tolstoy’s Genius Explored using Transformer Architecture
 
2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...2nd International Conference on Computer Science, Engineering and Artificial ...
2nd International Conference on Computer Science, Engineering and Artificial ...
 

Recently uploaded

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 

Recently uploaded (20)

Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 

Data Mining for Integration and Verification of Socio-Geographical Trend Statements in the Context of Conflict Risk

  • 1. Data Mining for Integration and Verification of Socio-Geographical Trend Statements in the Context of Conflict Risk Vera Kamp, Jean-Pierre Knust, Reinhard Moratz, Kevin Stehn, Soeren Stoehrmann {vera.kamp, jp, kevin.stehn, soeren.stoehrmann}@data42.de data42 GmbH moratz@uni-muenster.de University of Muenster Abstract. Data mining enables an innovative, largely automatic meta-analysis of the relation- ship between political and economic geography analyses of crisis regions. As an example, the two approaches Global Conflict Risk Index (GCRI) and Fragile States Index (FSI) can be re- lated to each other. The GCRI is a quantitative conflict risk assessment based on open source data and a statistical regression method developed by the Joint Research Centre of the Euro- pean Commission. The FSI is based on a conflict assessment framework developed by The Fund for Peace in Washington, DC. In contrast to the quantitative GCRI, the FSI is essentially focused on qualitative data from systematic interviews with experts. Both approaches therefore have closely related objectives, but very different methodologies and data sources. It is therefore hoped that the two complementary approaches can be com- bined to form an even more meaningful meta-analysis, or that contradictions can be discov- ered, or that a validation of the approaches can be obtained if there are similarities. We propose an approach to automatic meta-analysis that makes use of machine learning (data mining). Such a procedure represents a novel approach in the meta-analysis of conflict risk analyses. 1 Introduction Data mining enables an innovative, largely automatic meta-analysis of the relationship between political and economic geography analyses of crisis regions. As an example, the two approaches Global Conflict Risk Index (GCRI) and Fragile States Index (FSI) can be related to each other. The GCRI is a quantitative conflict risk assessment based on open source data and a statistical regression method developed by the Joint Research Centre of the European Commission. The FSI is based on a conflict assessment framework developed by The Fund for Peace in Washington, DC. In contrast to the quantitative GCRI, the FSI is essentially focused on qualitative data. Both approaches therefore have closely related objectives, but very different method- ologies and data sources. It is therefore hoped that the two complementary approaches can be combined to form an even more meaningful meta-analysis, or that contradictions can be discovered, or that a validation of the approaches can be obtained if there are similarities. We propose an approach to automatic meta- analysis that makes use of machine learn- ing (data mining). Such a procedure represents a novel approach in the meta-analysis of conflict risk analyses. 1DOI : 10.5121/ijaia.2019.10401 International Journal of Artificial Intelligence & Applications (IJAIA) Vol.10, No.4, July 2019
  • 2. In our context, the use of so-called multi-layered perceptrons is a suitable approach. Perceptrons are the central and classical approach within the field of so-called artificial neu- ral networks (ANN). These perceptrons are typically trained by backpropagation. Back- propagation belongs to the group of supervised learning methods and is applied to multi- layered perceptrons in that an external teaching function knows the desired output, the target value, for a sample of inputs. This sample is also known as a training set. In the next section, we briefly summarize the mathematical properties of this robust and proven data mining approach. 2 Principles of Multi-Layer Perceptrons A single-layer perceptron realizes a mapping from an input vector i with e components to an output vector o with a components. The mapping function of the perceptron is de- termined by its weight matrix G (a e × a matrix), its threshold vector s (a vector with a components) and its threshold function θ The techniques discussed in this work use the threshold function θσ. The threshold function θσ is thus defined: θσ                 x1 x2 ... j ...                 =         y1 y2 ... yj ...         , yj = 1 1 + e−xj Then o is calculated from i as follows: o = θ(Gi + s) A multi-layered perceptron can be constructed as a sequence of several coupled single- layer perceptrons. Let i be the input of the first single-layer perceptron, its output is as v1 (a vector with h1 components). The input of the second perceptron is then v1, whose output is v2, and so on. The output of the last single-layer perceptron in this chain is is o and thus also the output of the entire multilayer perceptrons. The number of layers is z. The weight matrices of the perceptrons are G1, G2, . . . , Gz. their threshold vectors s1, s2, . . . , sz. The output vector l ”a ”is then calculated like this: v1 = θ (G1i + s1) v2 θ (G2v1 + s1) ... o = θ (Gzvz−1 + sz) o = θ(Gz . . . θ (G2 θ (G1i + s1) + s2) . . . + sz) 2 InternationalJournal of ArtificialIntelligence & Applications(IJAIA) Vol.10,No.4,July2019
  • 3. Fig. 1. A multi-layered perceptron and its parameters. There is a network representation of this calculation process. Thereby vectors i, v1, . . . , vz−1, o are each viewed as layers of processing nodes (in the network perspec- tive, the input vector is also a node layer). Then each component of these vectors is viewed as processing node. These processing nodes are also called neurons. 2.1 Backpropagation With the backpropagation training procedure, multi-layer perceptrons with the threshold function θσ can be adapted to a training set (e.g. supervised machine learning). The pro- cedure is carried out on a two-stage network with a The feed node is auto-explained. This network has the parameters G1,G2,s1 and s2. Since the threshold function θσ is used, the value is of the output node is a real number from the interval from 0 to 1. For a given Me series (ym, xm), the total error is to be set to of this sample fk((ym, xm)) must be mini- mal. Since the backpropagation procedure is the method of the steepest descent is used, a constant expression must be found, which is has a minimum at fk((ym, xm)) = 0. 3 InternationalJournal of ArtificialIntelligence & Applications(IJAIA) Vol.10,No.4,July2019
  • 4. Use a quadratic Error function JBP . JBP (G1, G2, s1, s2) = m i=1 1 2 · (yi − (θσ (G2 θσ (G1xi + s1) + s2)))2 This error function has a minimum value of 0, if there is an error-free solution of the loading problem. The backpropagation procedure follows this schema: Startup: All components from G1, G2, s1, s2 get pseudo-random numbers with values between - 0.5 and 0.5. Iteration GNew 1 := Gold 1 + λ · ∂JBP Galt 1 , Galt 2 , salt 1 , salt 2 ∂Galt 1 Gnew 2 := Gold 2 + λ · ∂JBP Galt 1 , Galt 2 , salt 1 , salt 2 ∂Galt 2 snew 1 := sold 1 + λ · ∂JBP Galt 1 , Galt 2 , salt 1 , salt 2 ∂salt 1 snew 2 := sold 2 + λ · ∂JBP Galt 1 , Galt 2 , salt 1 , salt 2 ∂salt 2 This ensures that after each step under the condition λ → 0 the inequality JBP (Gnew 1 , Gnew 2 , snew 1 , snew 2 ) ≤ JBP Galt 1 , Galt 2 , salt 1 , salt 2 applies. Termination condition: JBP Galt 1 , Galt 2 , salt 1 , salt 2 − JBP (Gnew 1 , Gnew 2 , snew 1 , snew 2 ) < Tolerance value The final state, where the gradients amountm ”a ”sig go towards 0 and no modification of the weights takes place any more corresponds to a minimum of the error function. This minimum can be set in a In our case, it must be a local minimum (see Tesi92[10]). In order to speed up the loading process we usually use a the so-called momentum term, which allows for weight ”changes earlier steps included (see Rumelhart86[23], Chapter 8). 3 Numerical data mining for cross-validation of GCRI and FSI In a first experiment, we created an objective function based on the numerical indicators of the Global Conflict Risk Index (GCRI) as input. These numerical indicators are already 4 InternationalJournal of ArtificialIntelligence & Applications(IJAIA) Vol.10,No.4,July2019
  • 5. standardized to the interval 0.0 to 10.0. Since multi-layer perceptrons with their activation levels can assume values between 0.0 and 1.0, the GCRI values must be multiplied by 0.1 to obtain regular input values for a perceptron. A series of input values from the GCRI then corresponds to an input vector o (see section 2) of the perceptron. This input vector is given a series of target values, the target vector as a desired output according to the corresponding Fragile-State-Index component. In the first experiment we took the data from the Fragile- State- Index/Fundforpeace as target values (source: http://fsi.fundforpeace.org/data). In this first experiment, the input vector is assigned with respect to year yi of the country lj a target vector of the same country lj and of the same year yi. For this purpose the names of the countries must be matched from GCRI and Fragile-State-Index. In our exper- iment we used the ISO country coding. The target vectors are then also normalized to the interval from 0.0 to 1.0. We started with a multi-layer perceptron with only one hidden layer. We started with five hidden nodes and then went with increments of 5 to a previously calculated maximum number of h hidden nodes. The parameter h was calculated according to the following rule of thumb: One calculates per edge weight two bits information memory capacity. The dimension of the input vector is e , the dimension of the output vector and at the same time of the target vector is a (see section 2). Thus the net has calculated approximatively i ∗ h + h ∗ o edge weights and then a memory dependence Cnet = (2 ∗ i ∗ h + h ∗ o) Bit. The training set has approximatively calculated a data content of Dtrain = number of the example vector pairs ∗∗o∗4∗o bit. A network with too many hidden nodes has so much data storage capacity Cnet, that it contains the data content Dtrain of the Training data set ”can learn by heart” can and then in the worst case hardly generalize to new/unknown data. So h is chosen so that Cnet < Dtrain applies. After the multi-layer perceptron backpropated thousands of such value pairs, the mean error on the original scale of fragile state indices with the interval from 0 to 10 was 0.71 for the validation sample. The corresponding net then has 25 hidden nodes. A prediction with a mean error of only 0.77 is already achieved with only 5 hidden nodes. This very impressive result and its application aspects are discussed in the next section. As a technical detail you can see on the diagram on the next page that with a very large number of hidden nodes the effect described above with the capacity calculation actually occurs. A very high storage capacity of the network can lead to an over-adaptation to the training sample only and the prediction quality measured at the validation sample becomes significantly worse. As a first practical benefit we can deduce for the year 1999 from GCRI data generate hypothetical fragile state index estimates. As the fragile state index is only available until 2005, this is an added value. In the next steps, predictions from the near present into the near future are aimed at. For example, the Global Conflict Risk Index can use numerical indicators for 2014, 2015, 2016 of a country lj, to predict the fragile state index for 2017 of this country lj (i.e. it doesn’t even exist yet). GCRI data of the years yi, yi+1, yi+2 are used as input vector and 5 InternationalJournal of ArtificialIntelligence & Applications(IJAIA) Vol.10,No.4,July2019
  • 6. fragile state index. of the year yi+3 as target vectors. The multi-layered perceptron then has the triple the entrance width. In the third experiment, we will specify the difference of two consecutive years in the fragile state index as the target value. Then an increase or decrease of the state of a country with respect to instability ”at is trained as a prediction. In the fourth experiment, pairs of input and target vectors are identified in the training set that indicate a deterioration of a country. These risk pairs are added in three copies to the original training set. Thus, the weight of risk predictions is weighted fourfold. This corresponds to a one-sided error philosophy. Ideally, the system then becomes good at predicting possible risk situations and is particularly sensitive to negative developments. The system can also generate ”false alarms”, but these are considered to be much less dangerous than if the system were to Risk situations ”overlooks”. Fig. 2. Overfitting reduces the generalization performance. 6 InternationalJournal of ArtificialIntelligence & Applications(IJAIA) Vol.10,No.4,July2019
  • 7. 4 Discussion and outlook The relatively small error in predicting from the Global Conflict Risk Index 2014 data to the Fragile State Index 2014 data means that not only can the perceptron reproduce the given data from 2006 to 2012, but it has learned regular relationships between GCRI and FSI that can also be successfully applied to data not included in the training sample, such as the 2014 data. For example, for the year 1999, GCRI data can be used to generate hypothetical FSI data. As the Fragile State Index only dates back to 2005, this is already an interesting added value. With our data mining approach, we have succeeded in correlating the two approaches Global Conflict Risk Index (GCRI) and Fragile States Index (FSI). We were able to predict the FSI Index relatively accurately with a mean deviation of 0.7 from the GCRI Index for the same year. This also clearly shows that the quantitative approach using open source data from the GCRI and the qualitative conflict assessment framework of the FSI, which is based on expert ratings, correlate strongly. This finding strengthens confidence in the meaningfulness of both approaches. Both approaches thus seem to generate comparable descriptions through their closely related objectives, although they are based on very different methodologies and data sources. Both approaches thus support each other, as we were able to show with our ap- proach to automatic meta-analysis using machine learning (data mining). Our method thus represents a novel approach in the meta-analysis of conflict risk analyses. Furthermore, there are interesting possibilities to extend our approach. For example, you can train predictions from the present into the near future. For example, use GCRI indicators for 2017, 2018, 2019 of a country to predict FSI indicators for 2020 of that country (i.e. which do not yet exist). For this purpose, Global Conflict Risk Index data of the years can be used as input vectors and Fragile State Index of the year as target vectors. Our innovative approach can therefore be extended directly to predict future trends. References 1. E. B. Baum: On the Capabilities of Multilayer Perceptrons, Journal of Complexity, Vol.4, No.3, (1988). 2. E. B. Baum, D. Haussler: What Size Net gives Valid Generalisation ? Advances in Neural Information Processing Systems, D. Touretzky, Ed., Morgan Kaufmann, San Mateo, CA, page 81-90 (1989). 3. E. B. Baum: On Learning a Union of Half Spaces, Journal of Complexity, Volume 6, Page 67-101 (1990). 4. E. B. Baum: When Are K-Nearest Neighbour and Backpropagation Accurate for Feasible Sized Sets of Examples, in [?] 5. E. B. Baum: A Polynomial Time Algorithm That Learns Two Hidden Unit Nets, Neural Computation 2, 510-522, (1991). 6. A. Blum, R. Rivest: Training a 3-Node Neural Network is NP-complete, in COLT88[?] Page 211-218 (1988). 7. T. M. Cover: Geometrical and statistical properties of systems of linear inequalities with applications in pattern recogniton, IEEE Trans. Electron. Comput. EC-14, 326-334. 8. De Groeve T, Hachemer P, Vernaccini L. The global conflict risk index (GCRI): a quantitative model. Concept and Methodology. 2014. 9. Goodfellow, Ian, Yoshua Bengio, and Aaron Courville. Deep learning. MIT press, 2016. 7 InternationalJournal of ArtificialIntelligence & Applications(IJAIA) Vol.10,No.4,July2019
  • 8. 10. M. Gori, A. Tesi On the Problem of Local Minima in Backpropagation, IEEE Transactions on Pattern Analysis and Machine Intelligence, Volume 14, No. 1, (1992). 11. Haken, Nate, J. J. Messner, Krista Hendry, Patricia Taft, Kendall Lawrence, Laura Brisard, and Felipe Uman?a. 2014. Failed State Index 2014: The Book. Washington, D.C.: Fund for Peace. 12. D. O. Hebb: The Organisation of Behaviour, New York: Wiley (1949). 13. J. Hertz, A. Krogh, R. G. Palmer Introduction to the Theory of Neural Computation, Addison-Wesley, Redwood City, Ca, (1991). 14. G. E. Hinton: Wie neuronale Netze aus Erfahrung lernen, in Spektrum der Wissenschaft, November- Ausgabe, Heidelberg, (1992). 15. Marsland, Stephen. Machine learning: an algorithmic perspective. Chapman and Hall CRC, 2011. 16. J. S. Judd: Neural Network Design and the Complexity of Learning, MIT Press, Cambridge, MA (1990). 17. J. L. McClelland, D. E. RumelhartParallel Distributed Processing: Explorations in the Microstructure of Cognition, A Handbook of Models, Programs, and Exercises, Cambridge, MA: MIT Press 1988. 18. W. S. McCulloch, W. Pitts: A Logical Calculus of the Ideas Imanent in Nervous Activity, Bull. Math. Biophys. 5, 115-133 (1943). 19. M. Minsky, S. Papert: Perceptrons, Cambridge, MA: MIT Press 1969. 20. G. J. Mitchison, R. M. Durbin: Bounds on the Learning Capacity of some Multi-Layer Networks, Biol. Cybern. Vol. 60, No.5, (1989). 21. B. K. Natarajan: Machine Learning, A Theoretical Approach, Morgan Kaufmann, San Mateo, CA, (1991). 22. F. Rosenblatt: Principles of Neurodynamics, New York: Spartan (1962). 23. D. E. Rumelhart, J. A. McClelland: Parallel Distributed Processing: Explorations in the Microstructure of Cognition, Cambridge, MA: MIT Press 1986. 24. L. G. Valiant: A Theory of the Learnable, Communications of the ACM, Band 27, Nr.11. Seite 1134-1142 25. V. Vapnik: Estimation of Dependences Based on Empirical Data, Springer-Verlag, New York (1982). 26. G. Widrow, M. E. Hoff: Adaptive Switching Circuits, Institute of Radio Engineers, convention Record, Part 4, 96-104 (1960). 8 InternationalJournal of ArtificialIntelligence & Applications(IJAIA) Vol.10,No.4,July2019