249
Views
0
CrossRef citations to date
0
Altmetric
Articles

A fuzzy overlay model for mapping adverse event risk in an active war theatre

ORCID Icon & ORCID Icon
Pages 691-701 | Received 01 Jun 2017, Accepted 17 Apr 2018, Published online: 21 May 2018

References

  • Adnan, M. M., Sarkheyli, A., Zain, A. M., & Haron, H. (2015). Fuzzy logic for modeling machining process: A review. Artificial Intelligence Review, 43(3), 345–379.10.1007/s10462-012-9381-8
  • Ahmed, M. F., Rogers, J. D., & Ismail, E. H. (2014). A regional level preliminary landslide susceptibility study of the upper Indus river basin. European Journal of Remote Sensing, 47(1), 343–373.10.5721/EuJRS20144721
  • Ammar, S., & Wright, R. (2000). Applying fuzzy-set theory to performance evaluation. Socio-Economic Planning Sciences, 34(4), 285–302.10.1016/S0038-0121(00)00004-5
  • Beck, R. A. (2003). Remote sensing and GIS as counterterrorism tools in the Afghanistan war: A case study of the Zhawar Kili region. The Professional Geographer, 55(2), 170–179.
  • Berrebi, C., & Lakdawalla, D. (2007). How does terrorism risk vary across space and time? An analysis based on the israeli experience. Defence and Peace Economics, 18(2), 113–131.10.1080/10242690600863935
  • Beucher, A., Fröjdö, S., Österholm, P., Martinkauppi, A., & Edén, P. (2014). Fuzzy logic for acid sulfate soil mapping: Application to the southern part of the Finnish coastal areas. Geoderma, 226–227, 21–30.10.1016/j.geoderma.2014.03.004
  • Bonham-Carter, G. F. (2014). Geographic information systems for geoscientists: Modelling with GIS (Vol. 13). New York, NY: Elsevier.
  • Bortoloti, F. D., Junior, R. C., Araújo, L. C., & de Morais, M. G. B. (2015). Preliminary landslide susceptibility zonation using GIS-based fuzzy logic in Vitória, Brazil. Environmental Earth Sciences, 74(3), 2125–2141.10.1007/s12665-015-4200-6
  • Brown, D., Dalton, J., & Hoyle, H. (2004, June). Spatial forecast methods for terrorist events in urban environments. In International Conference on Intelligence and Security Informatics (pp. 426–435). Berlin, Heidelberg: Springer.10.1007/b98042
  • Cakit, E., & Karwowski, W. (2015). Assessing the relationship between economic factors and adverse events in an active war theater using fuzzy inference system approach. International Journal of Machine Learning and Computing, 5(3), 252–257.10.7763/IJMLC.2015.V5.516
  • Cakit, E., & Karwowski, W. (2017). Potential applications of soft-computing techniques for human socio-cultural behavior modeling. JCP, 12(4), 284–290.
  • Çakit, E., & Karwowski, W. (2016). Gaining insight by applying geographical modeling. In J. V. Cohn, S. Schatz, H. Freeman, & D. J. Combs (Eds.), Modeling sociocultural influences on decision making: Understanding conflict, enabling stability (pp. 243–266). Boca Raton, FL: CRC Press.
  • Çakıt, E., & Karwowski, W. (2015a). Fuzzy inference modeling with the help of fuzzy clustering for predicting the occurrence of adverse events in an active theater of war. Applied Artificial Intelligence, 29(10), 945–961.
  • Çakıt, E., & Karwowski, W. (2015b). Understanding patterns of infrastructure development in the active war theater of Afghanistan over the period 2002-2010. Procedia Manufacturing, 3, 3876–3882.
  • Çakıt, E., & Karwowski, W. (2017a). Predicting the occurrence of adverse events using an adaptive neuro-fuzzy inference system (ANFIS) approach with the help of ANFIS input selection. Artificial Intelligence Review, 48(2), 139–155.
  • Çakıt, E., & Karwowski, W. (2017b, July). Understanding the social and economic factors affecting adverse events in an active theater of war: A neural network approach. In International Conference on Applied Human Factors and Ergonomics (pp. 215–223). Cham: Springer.
  • Çakıt, E., Karwowski, W., Bozkurt, H., Ahram, T., Thompson, W., Mikusinski, P., & Lee, G. (2014). Investigating the relationship between adverse events and infrastructure development in an active war theater using soft computing techniques. Applied Soft Computing, 25, 204–214.
  • Caniani, D., Lioi, D. S., Mancini, I. M., & Masi, S. (2011). Application of fuzzy logic and sensitivity analysis for soil contamination hazard classification. Waste Management, 31(3), 583–594.10.1016/j.wasman.2010.09.012
  • Demirci, S., & Suen, I. S. (2007). Spatial pattern analysis of Pkk–Kongra Gel terror incidents in Turkey: 2003–2004. In O Nikbay & S. Hancerli (Eds.), Understanding and responding to the terrorism phenomenon: A multidimensional perspective (pp. 153–163). Amsterdam: IOS Press.
  • Denning, D. (2000, May 23). Cyberterrorism: Testimony before the special oversight panel on terrorism. Committee on Armed Services, U.S. House of Representatives. Retrieved May 2, 2007, from http://www.cs.georgetown.edu/~denning/infosec/cyberterror
  • ESRI. (2014). Retrieved February 15, 2016, from http://www.esri.com
  • Federation of American Scientists. (2009, May 5). A GEOINT analysis of terrorism in Afghanistan. Secrecy News. Retrieved May 3, 2017, from http://www.fas.org/blog/secrecy/2009/05/05
  • Fotheringham, S. & Rogerson, P. (Eds.). (2013). Spatial analysis and GIS. Boca Raton, FL: CRC Press.
  • Ghosh, J. K., Bhattacharya, D., & Sharma, S. K. (2012). Fuzzy knowledge based GIS for zonation of landslide susceptibility. In Applications of chaos and nonlinear dynamics in science and engineering (Vol. 2, pp. 21–37). Berlin, Heidelberg: Springer.10.1007/978-3-642-29329-0
  • Griffiths, G., Johnson, S. D., & Chetty, K. (2017). UK-based terrorists’ antecedent behavior: A spatial and temporal analysis. Applied Geography, 86, 274–282.10.1016/j.apgeog.2017.06.007
  • Halim, Z., Kalsoom, R., Bashir, S., & Abbas, G. (2016). Artificial intelligence techniques for driving safety and vehicle crash prediction. Artificial Intelligence Review, 46(3), 351–387.10.1007/s10462-016-9467-9
  • Johnson, S. D., & Braithwaite, A. (2009). Spatio-temporal Modelling of Insurgency in Iraq. In J. D. Freilich & G. R. Newman (Eds.), Reducing terrorism through situational crime prevention: Crime prevention studies (Vol. 25, pp. 9–32). Monsey, NY: Criminal Justice Press.
  • Joss, B. N., Hall, R. J., Sidders, D. M., & Keddy, T. J. (2008). Fuzzy-logic modeling of land suitability for hybrid poplar across the Prairie Provinces of Canada. Environmental Monitoring and Assessment, 141(1–3), 79–96.10.1007/s10661-007-9880-2
  • LaFree, G., Dugan, L., Xie, M., & Singh, P. (2012). Spatial and temporal patterns of terrorist attacks by ETA 1970 to 2007. Journal of Quantitative Criminology, 28(1), 7–29.10.1007/s10940-011-9133-y
  • Li, Z., Sun, D., Chen, H., & Huang, S. Y. (2016, September). Identifying the socio-spatial dynamics of terrorist attacks in the Middle East. In Intelligence and Security Informatics (ISI), 2016 IEEE Conference on (pp. 175–180). IEEE.10.1109/ISI.2016.7745463
  • Loro, M., Ortega, E., Arce, R. M., & Geneletti, D. (2016). Assessing landscape resistance to roe deer dispersal using fuzzy set theory and multicriteria analysis: A case study in Central Spain. Landscape and Ecological Engineering, 12(1), 41–60.10.1007/s11355-015-0275-1
  • Medina, R. M., Siebeneck, L. K., & Hepner, G. F. (2011). A geographic information systems (GIS) analysis of spatiotemporal patterns of terrorist incidents in Iraq 2004–2009. Studies in Conflict & Terrorism, 34(11), 862–882.10.1080/1057610X.2011.611933
  • Nemeth, S. C., Mauslein, J. A., & Stapley, C. (2014). The primacy of the local: Identifying terrorist hot spots using geographic information systems. The Journal of Politics, 76(2), 304–317.10.1017/S0022381613001333
  • Open Source Center. (2009). Afghanistan-Geospatial analysis reveal patterns in terrorist incidents 2004–2008. Retrieved May 3, 2012, from http://www.fas.org/irp/dni/osc/afghan-geospat.pdf
  • Pradhan, B. (2011). Manifestation of an advanced fuzzy logic model coupled with Geo-information techniques to landslide susceptibility mapping and their comparison with logistic regression modelling. Environmental and Ecological Statistics, 18(3), 471–493.10.1007/s10651-010-0147-7
  • Raines, G. L., Sawatzky, D. L., & Bonham-Carter, G. F. (2010). Incorporating expert knowledge: New fuzzy logic tools in ArcGIS 10. ArcUser, 49, 8–13.
  • Reed, G. S., Colley, W. N., & Aviles, S. M. (2013). Analyzing behavior signatures for terrorist attack forecasting. The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology, 10(2), 203–213.10.1177/1548512911421184
  • Rusnak, D. M., Kennedy, L. W., Eldivan, I. S., & Caplan, J. M. (2012). Analyzing terrorism using spatial analysis techniques: A case study of Turkish cities. In Evidence-based counterterrorism policy (pp. 167–185). New York, NY: Springer.10.1007/978-1-4614-0953-3
  • Siebeneck, L. K., Medina, R. M., Yamada, I., & Hepner, G. F. (2009). Spatial and temporal analyses of terrorist incidents in Iraq, 2004–2006. Studies in Conflict & Terrorism, 32(7), 591–610.10.1080/10576100902961789
  • Venkatramanan, S., Chung, S. Y., Rajesh, R., Lee, S. Y., Ramkumar, T., & Prasanna, M. V. (2015). Comprehensive studies of hydrogeochemical processes and quality status of groundwater with tools of cluster, grouping analysis, and fuzzy set method using GIS platform: A case study of Dalcheon in Ulsan City, Korea. Environmental Science and Pollution Research, 22(15), 11209–11223.10.1007/s11356-015-4290-4
  • Webb, J. J., & Cutter, S. L. (2009). The geography of US terrorist incidents, 1970–2004. Terrorism and Political Violence, 21(3), 428–449.10.1080/09546550902950308
  • Zadeh, L. A. (1965). Fuzzy sets. Information and Control, 8, 338–353.10.1016/S0019-9958(65)90241-X

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.