Intelligent Defense System for Identifying, Predicting and Mitigating Terrorist Activities

Abstract

Reconnaissance is a crucial part of military combat; as well as attack prediction and develop necessary mitigation and combat strategies to fight back or retreat. Simultaneously communicating this information among the troops is pivotal to saving lives. The advancement of drone technology has opened up new possibilities for monitoring and combating terrorist activities. In this research study, the objective is utilizing image data obtained through drone monitoring to predict target variables related to terrorist attacks, specifically concentrating on the prediction of attack types. And depending on that data predicting and developing necessary defense strategies. And finally, the predicted strategies will be communicated securely among the friendly allies and troops. The system is anchored upon developing the system cost effective and more budgetary feasible manner. Focusing on developing countries suffering from a variety of wars.

Country : Sri Lanka

1 Laksahan H. G. V.2 Abeywicrama W. P U.3 Lukshithan K. H. K.4 Liyanapathirana J. B.5 Nelum Amarasena6 Supipi Karunathilake

  1. Faculty of Computing, Department of Software Engineering, Sri Lanka Institute of Information Technology, Sri Lanka
  2. Faculty of Computing, Department of Information Systems Engineering, Sri Lanka Institute of Information Technology, Sri Lanka
  3. Faculty of Computing, Department of Software Engineering, Sri Lanka Institute of Information Technology, Sri Lanka
  4. Faculty of Computing, Department of Software Engineering, Sri Lanka Institute of Information Technology, Sri Lanka
  5. Faculty of Computing, Department of Information Technology, Sri Lanka Institute of Information Technology, Sri Lanka
  6. Faculty of Computing, Department of Information Technology, Sri Lanka Institute of Information Technology, Sri Lanka

IRJIET, Volume 7, Issue 11, November 2023 pp. 87-93

doi.org/10.47001/IRJIET/2023.711012

References

  1. C. J. Rogers, “The Study of Ancient and Medieval Military History: Benefits for professional military education,” Est. Yearb. Mil. Hist., vol. 9, pp. 9–28, 2019, doi: 10.22601/saa.2019.08.01.
  2. M. D. Begg, An introduction to categorical data analysis (2nd edn). Alan Agresti, John Wiley & Sons, Inc., Hoboken, New Jersey, 2007. No. of Pages: 400. Price: $100.95. ISBN: 978-0-471-22618-5, vol. 28, no. 11. 2009. doi: 10.1002/sim.3564.
  3. T. Maseng, R. Landry, and K. Young, “Military communications,” IEEE Commun. Mag., vol. 48, no. 10, pp. 50–52, 2010, doi: 10.1109/MCOM.2010.5594676.
  4. J. H. Friedman, “Stochastic gradient boosting,” Comput. Stat. Data Anal., vol. 38, no. 4, pp. 367–378, 2002, doi: 10.1016/S0167- 9473(01)00065-2.
  5. A.J.  Mantau, I. W. Widayat, J. S. Leu, and M. Ko¨ppen, “A  Human- Detection Method Based on YOLOv5 and Transfer Learning Using Thermal Image Data from UAV Perspective for Surveillance System,” Drones, vol. 6, no. 10, pp. 1–12, 2022, doi: 10.3390/drones6100290.
  6. M. Kasper-Eulaers, N. Hahn, P. E. Kummervold, S. Berger, T. Sebu- lonsen, and Ø. Myrland, “Short communication: Detecting heavy goods vehicles in rest areas in winter conditions using YOLOv5,” Algorithms, vol. 14, no. 4, 2021, doi: 10.3390/a14040114.
  7. H. Chen, W. Chung, J. J. Xu, G. Wang, Y. Qin, and M. Chau, “Crime data mining: A general framework and some examples,” Com- puter (Long. Beach. Calif)., vol. 37, no. 4, pp. 50–56, 2004, doi: 10.1109/MC.2004.1297301.
  8. V. E. Krebs, “Mapping Networks of Terrorist Cells,”   Connec- tions, vol. 24, no. 3, pp. 43–52, 2002, [Online]. Available: http://www.insna.org/pubs/connections/v24.html.
  9. P. V Marsden, “Reviewer: University ofNorth Carolina at Chapel Hill 974 I Social Forces Volume 61 : 3 , March 1983,” pp. 973–974, 1981.
  10. A.O. Bang and P. L. Ramteke, “MANET : History , Challenges And Applications,” no. March, pp. 7–10, 2019.
  11. S. Tan, X. Li, and Q. Dong, “Trust based routing mechanism for securing OSLR-based MANET,” Ad Hoc Networks, vol. 30, no. March, pp. 84–98, 2015, doi: 10.1016/j.adhoc.2015.03.004.
  12. T. Eissa, S. Abdul Razak, R. H. Khokhar, and N. Samian, “Trust-based routing mechanism in MANET: Design and implementation,” Mob. Networks Appl., vol. 18, no. 5, pp. 666–677, 2013, doi: 10.1007/s11036- 011-0328-0.
  13. G. Kulkarni, B. Patel, and P. Laxkar, “Time stamp based cross layer MANET security protocol,” IET Conf. Publ., vol. 2013, no. CP646, pp. 191–199, 2013, doi: 10.1049/cp.2013.2591.
  14. A.Bang and P. Ramteke, “MANET: History, Challenges And Applica- tions,” Int. J. Appl. or Innov. Eng. Manag. , vol. 2, no. 9, pp. 249–251, 2013.
  15. S. J. Krieg, C. W. Smith, R. Chatterjee, and N. V. Chawla, “Predicting terrorist attacks in the United States using localized news data,” PLoS One, vol. 17, no. 6 June, pp. 1–26, 2022, doi:10.1371/journal.pone.0270681.
  16. M. Rath, B. K. Pattanayak, and B. Pati, Energy Efficient MANET Protocol Using Cross Layer Design for Military Applications, Def. Sci. J. J., vol. 66, no. 2, pp. 146 150, 2016, doi: 10.14429/dsj.66.9705.