Font Size: a A A

Network Counter-terrorism Information Collection And Enemy Information Database Construction

Posted on:2019-06-21Degree:MasterType:Thesis
Country:ChinaCandidate:Q WangFull Text:PDF
GTID:2428330563957304Subject:Software engineering
Abstract/Summary:PDF Full Text Request
The economic cooperation between China and Pakistan has deepened in recent years,thus the construction of Sino-Pakistan Economic Corridor which has been regarded as the flagship project of "The Belt and Road",plays a significant part in the realization of the strategic goal.However,with the wide spread of terrorism,regional separatism and fundamentalism as well as the increasing sectarian conflicts and violence,the national security situation in Pakistan is not optimistic and China's construction projects,personnel safety and investment environment in Pakistan are faced with multiple risks and challenges.Because it is difficult to obtain the behavior traces of organizers and conduct data analysis and source-tracing before and after terrorist attacks,which makes it difficult to grasp the identity,organization and purpose of attackers.So it is time to develop a system of Network Counter-terrorism Information Collection and Enemy Information Database Construction.User can use big data analysis techniques and methods and combination analysis of human with computer,it is of great importance in summarizing experience and offering advice on combating terrorist activities and protecting our country's interests in Pakistan.The thesis reflects the current condition and existing problems about the Network Counter-terrorism Information Collection in our country by systematic requirement analysis method.combining the relevant circumstances,the thought and approach to solve has come up,including designing systematic user management,Information crawling,dealing,revealing,storage and searching.With the learning and grasping of key techniques,the systematic setting and scanning of counter-terrorism information,the input,searching and output of enemy intelligence database can be designed and achieved.Using Web crawler technology to search the key words in the terrorism related websites,blogs and forums,to divide and store the obtained Network counter-terrorism information and to develop the anti-terrorism database.With the storage of long-term,comprehensive and massive certain information.Using full-text retrieval technology to link organizations,people,events,and activities that are of key concern.It shows systematic designing thinking and functional achievements with the examples,offering technical reference to certain sectors.
Keywords/Search Tags:Sino-Pakistan Economic Corridor, Security threat, Network Counter-terrorism Information, Enemy intelligence database, Web crawler technology, Big data analysis
PDF Full Text Request
Related items