441
Views
12
CrossRef citations to date
0
Altmetric
Original Articles

Fuzzy Inference Modeling with the Help of Fuzzy Clustering for Predicting the Occurrence of Adverse Events in an Active Theater of War

&

References

  • Ammar, S., and R. Wright. 2000. Applying fuzzy-set theory to performance evaluation. Socio-Economic Planning Sciences 34:285–302. doi:10.1016/S0038-0121(00)00004-5.
  • Bezdek, J. C. 1981. Pattern recognition with fuzzy objective function algorithms. New York: Plenum Press.
  • Bhattacharjee, Y. 2007. Cross-cultural research: Pentagon asks academics for help in understanding its enemies. Science 316 (5824):534–35. doi:10.1126/science.316.5824.534.
  • Brown, D., J. Dalton, and H. Hoyle. 2004. Spatial forecast methods for terrorist events in urban environments. Lecture Notes in Computer Science, 3073: 426–435.
  • Cakit, E., and W. Karwowski. 2015. Assessing the relationship between economic factors and adverse events in an active war theater using fuzzy inference system approach. International Journal of Machine Learning and Computing 5 (3):252–57. doi:10.7763/IJMLC.2015.V5.516.
  • Çakıt, E., W. Karwowski, H. Bozkurt, T. Ahram, W. Thompson, P. Mikusinski, and G. Lee. 2014. Investigating the relationship between adverse events and infrastructure development in an active war theater using soft computing techniques. Applied Soft Computing 25:204–14. doi:10.1016/j.asoc.2014.09.028.
  • Chiu, S. L. 1994. Fuzzy model identification based on cluster estimation. Journal of Intelligent and Fuzzy Systems 2 (3):267–78.
  • Clancy, J., and C. Crossett. 2007. Measuring effectiveness in irregular warfare. Parameters 37 (2):88.
  • Drapeau, M. D., and B. K. Mignone. 2007. Culture, conflict, and … climate? Science 316 (5831):1564. doi:10.1126/science.316.5831.1564b.
  • Dunn, J. C. 1973. A fuzzy relative of the ISODATA process and its use in detecting compact well-separated clusters. Journal of Cybernetics 3:32–57. doi:10.1080/01969727308546046.
  • Federation of American Scientists. 2009, May 5. A GEOINT analysis of terrorism in Afghanistan. Secrecy News. http://www.fas.org/blog/secrecy/2009/05/05 ( accessed May 3, 2012).
  • Fullér, R. 1999. Introduction to Neuro-Fuzzy Systems. Wurzburg: Physica-Verlag.
  • HSCB Modeling Program. 2009. Human Social Culture Behavior Modeling Newsletter. http://www.dtic.mil/biosys/docs/HSCB-news-spring-2009.pdf (accessed March 19, 2012).
  • Inyaem, U., P. Meesad, C. Haruechaiyasak, and D. Tran. 2010. Terrorism event classification using fuzzy inference systems. International Journal of Computer Science and Information Security 7 (3): 247–256.
  • Johnson, S. D., and E. Braithwaite. 2009. Spatio-temporal modeling of insurgency in Iraq. In Reducing terrorism through situational crime prevention: Crime prevention studies, ed J. D. Freilich, and G. R. Newman, vol. 25, 9–32. Monsey, NY: Criminal Justice Press.
  • LaFree, G., L. Dugan, M. Xie, and P. Piyusha Singh. 2012. Spatial and temporal patterns of terrorist attacks by ETA 1970 to 2007. Journal of Quantitative Criminology 28 (1):7–29. doi:10.1007/s10940-011-9133-y.
  • Łukasiewicz J., 1920. O logice trójwartościowej (in Polish). Ruch filozoficzny 5:170–171. English translation: On three-valued logic, in L. Borkowski (ed.), Selected works by Jan Łukasiewicz, North–Holland, Amsterdam, 1970, pp. 87–88.
  • Numrich, S. K., and A. Tolk 2010. Challenges for human, social, cultural, and behavioral modeling. SCS M&S Magazine ( January): 1–9.
  • Open Source Center. 2009. Afghanistan—Geospatial analysis reveal patterns in terrorist incidents 2004–2008. http://www.fas.org/irp/dni/osc/afghan-geospat.pdf ( accessed May 3, 2012).
  • Reed, G. S., W. N. Colley, and S. M. Aviles. 2013. Analyzing behavior signatures for terrorist attack forecasting. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 10 (2) 203–213.
  • Schmorrow, D., G. L. Klein, R. Foster, J. Boiney, S. Biggerstaff, P. R. Garvey, M. Koehler, and Costa, B. 2009. Applied use of socio-cultural behavior modeling and simulation: An emerging challenge for C2. Ft. Belvoir: Defense Technical Information Center, Rosslyn, VA.
  • Schmorrow, D., and D. Nicholson. 2011. Advances in cross-cultural decision making. Boca Raton, FL: CRC Press.
  • Siebeneck., L. K., R. M. Medina., I. Yamada., and G. F. Hepner. 2009. Spatial and temporal analyses of terrorist incidents in Iraq, 2004–2006. Studies in Conflict & Terrorism 32:591–610. doi:10.1080/10576100902961789.
  • Sivanandam, S. N., S. Sumathi, and S. N. Deepa. 2007. Introduction to fuzzy logic using MATLAB. New York: Springer.
  • Stanton., J. 2007. Evolutionary cognitive neuroscience: Dual use discipline for understanding & managing complexity and altering warfare. Paper presented at the International Studies Association Conference, Portugal, June 20, 2007. Available at http://ssrn.com/abstract=1946864 (accessed May 18, 2012).
  • United States Department of Defense. 2010. Irregular Warfare: Countering Irregular Threats. Joint Operating Concept Version 2.0 17 May 2010 (Irregular Warfare Joint Operations Command, 2010), p. 9.
  • Webb, J., and S. L. Cutter. 2009. The geography of U.S. terrorist incidents, 1970–2004. Terrorism & Political Violence 21:428–49. doi:10.1080/09546550902950308.
  • Willmott, C. J., and K. Matsuura. 2005. Advantages of the mean absolute error (MAE) over the root mean square error (RMSE) in assessing average model performance. Climate Research 30 (1):79–82. doi:10.3354/cr030079.
  • Zacharias, G. L., J. MacMillan, and S. B. Van Hemel, eds. 2008. Behavioral modeling and simulation: From individuals to societies. National Research Council, Washington, DC: National Academies Press.
  • Zadeh, L. A. 1965. Fuzzy sets. Information and Control 8:338–53. doi:10.1016/S0019-9958(65)90241-X.
  • Zadeh, L. A. 1968. Fuzzy algorithms. Information and Control 12:94–102. doi:10.1016/S0019-9958(68)90211-8.
  • Zadeh, L. A. 1973. Outline of a new approach to the analysis of complex systems and decision processes. IEEE Transactions on Systems, Man and Cybernetics 3:28–44. doi:10.1109/TSMC.1973.5408575.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.