ๅฐŠๆ•ฌ็š„ ๅพฎไฟกๆฑ‡็Ž‡๏ผš1ๅ†† โ‰ˆ 0.046215 ๅ…ƒ ๆ”ฏไป˜ๅฎๆฑ‡็Ž‡๏ผš1ๅ†† โ‰ˆ 0.046306ๅ…ƒ [้€€ๅ‡บ็™ปๅฝ•]
SlideShare a Scribd company logo
project proposal on
๏ต Prediction of terrorist on the basis of Semantic Association building
Ontology
Niroj Paudel
MED. ICT 3rd semester
Sanothimi Campus
Background and Introduction
๏ถ Terrorism is a global problem.
๏ถ Terrorist have fake name, multi identification, fake
passports and stolen credit cards.
๏ถ Their relations with the local and international terrorists or
underground forces.
๏ถ The prediction system can predict terrorist And terrorist
activities before the event.
Statement of problems
๏ถ Terrorism is the network of personal connections that
allows the terrorist organization to function.
Objectives
๏ถ To predict the terrorist on the basis of semantic web
portal
Scope and Limitation
Scope
๏ถ Application is web based, it has wide reach among millions
of users among which many users are intended to learn.
๏ถ It is focused to Counter-terrorist activities that may include
the Intelligence Bureau in army, police or national
Investigation.
Limitation
๏ถ Particular terrorist group
๏ถ Certain period of time
Feasibility study
๏ถ Economic
๏ถ Schedule
๏ถ Technical
๏ถ Operational
Data collection
๏ถ Primary Data
๏ถ Secondary Data
Testing tool
๏ถ Unit testing
๏ถ Integration testing
๏ถ Alpha testing
๏ถ Beta testing
๏ถ System testing
Project timeline (Gantt Chart)
ID Task Name Start Finish Duration
Apr 2072 May 2072
4/24 5/1 5/8 5/15 5/22
1 6d5/1/20724/25/2072System Stady
2 15d5/18/20725/2/2072System Analysis
3 12d6/1/20725/19/2072System Design
4 15d6/19/20726/2/2072Coding
5 5d6/24/20726/20/2072Testing
6 5d6/30/20726/26/2072Implements
7 58d6/30/20724/25/2072Documentation
Jun 2072
5/29 6/5 6/12 6/19 6/26

More Related Content

What's hot

Extended summary of "A different cup of TI? The added value of commercial thr...
Extended summary of "A different cup of TI? The added value of commercial thr...Extended summary of "A different cup of TI? The added value of commercial thr...
Extended summary of "A different cup of TI? The added value of commercial thr...
AlessandraAmato4
ย 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensics
Mustapha Mugisa
ย 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
IJCSIS Research Publications
ย 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
Pranto26
ย 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
bharatsvnit
ย 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
newbie2019
ย 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
Param Nanavati
ย 
cybercrime landscape for moldova
cybercrime landscape for moldovacybercrime landscape for moldova
cybercrime landscape for moldova
moldovaictsummit2016
ย 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
Ankita Jain
ย 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
ijcisjournal
ย 
Machine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applicationsMachine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applications
Venkat Projects
ย 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
Konstantinos Demertzis
ย 
Making Strong Security Easier
Making Strong Security EasierMaking Strong Security Easier
Making Strong Security Easier
Fen Labalme
ย 
Futuristic data mining technologies for cyber security
Futuristic data mining technologies for cyber securityFuturistic data mining technologies for cyber security
Futuristic data mining technologies for cyber security
Pankaj Choudhary
ย 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information Security
Gary Bahadur
ย 
SAML Security Contacts
SAML Security ContactsSAML Security Contacts
SAML Security Contacts
jbasney
ย 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)
ijcisjournal
ย 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
Amrit Chhetri
ย 
Firewalls
FirewallsFirewalls

What's hot (19)

Extended summary of "A different cup of TI? The added value of commercial thr...
Extended summary of "A different cup of TI? The added value of commercial thr...Extended summary of "A different cup of TI? The added value of commercial thr...
Extended summary of "A different cup of TI? The added value of commercial thr...
ย 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensics
ย 
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
Malicious Code Intrusion Detection using Machine Learning and Indicators of C...
ย 
Role of data mining in cyber security
Role of data mining in cyber securityRole of data mining in cyber security
Role of data mining in cyber security
ย 
data mining for security application
data mining for security applicationdata mining for security application
data mining for security application
ย 
Pendahuluan it forensik
Pendahuluan it forensikPendahuluan it forensik
Pendahuluan it forensik
ย 
Risks and Security of Internet and System
Risks and Security of Internet and SystemRisks and Security of Internet and System
Risks and Security of Internet and System
ย 
cybercrime landscape for moldova
cybercrime landscape for moldovacybercrime landscape for moldova
cybercrime landscape for moldova
ย 
Internship ankita jain
Internship ankita jainInternship ankita jain
Internship ankita jain
ย 
International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)International Journal on Cryptography and Information Security (IJCIS)
International Journal on Cryptography and Information Security (IJCIS)
ย 
Machine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applicationsMachine learning techniques applied to detect cyber attacks on web applications
Machine learning techniques applied to detect cyber attacks on web applications
ย 
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
ย 
Making Strong Security Easier
Making Strong Security EasierMaking Strong Security Easier
Making Strong Security Easier
ย 
Futuristic data mining technologies for cyber security
Futuristic data mining technologies for cyber securityFuturistic data mining technologies for cyber security
Futuristic data mining technologies for cyber security
ย 
Industry Trendsin Information Security
Industry Trendsin Information SecurityIndustry Trendsin Information Security
Industry Trendsin Information Security
ย 
SAML Security Contacts
SAML Security ContactsSAML Security Contacts
SAML Security Contacts
ย 
International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)International Journal on Cryptography and Information Security ( IJCIS)
International Journal on Cryptography and Information Security ( IJCIS)
ย 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
ย 
Firewalls
FirewallsFirewalls
Firewalls
ย 

Viewers also liked

Going Green
Going GreenGoing Green
Going Green
MrG
ย 
Presentation on pre micro laxmi abasti
Presentation on pre micro laxmi abastiPresentation on pre micro laxmi abasti
Presentation on pre micro laxmi abasti
Nawaraj Ghimire
ย 
Eco-Friendly Construction By Shubham Shinde,Akshay Phadtare & Ganesh Phadtare
Eco-Friendly Construction By Shubham Shinde,Akshay Phadtare & Ganesh PhadtareEco-Friendly Construction By Shubham Shinde,Akshay Phadtare & Ganesh Phadtare
Eco-Friendly Construction By Shubham Shinde,Akshay Phadtare & Ganesh Phadtare
akshayphadtare
ย 
Blast resistant structure
Blast resistant structureBlast resistant structure
Blast resistant structure
Ranjeet Patil
ย 
Design of Blast resistance structures
Design of Blast resistance structuresDesign of Blast resistance structures
Design of Blast resistance structures
Sneha Kaira
ย 
Transparent concrete (translucent)
Transparent concrete (translucent)Transparent concrete (translucent)
Eco friendly building materials
Eco friendly building materialsEco friendly building materials
Eco friendly building materials
lstikore
ย 

Viewers also liked (7)

Going Green
Going GreenGoing Green
Going Green
ย 
Presentation on pre micro laxmi abasti
Presentation on pre micro laxmi abastiPresentation on pre micro laxmi abasti
Presentation on pre micro laxmi abasti
ย 
Eco-Friendly Construction By Shubham Shinde,Akshay Phadtare & Ganesh Phadtare
Eco-Friendly Construction By Shubham Shinde,Akshay Phadtare & Ganesh PhadtareEco-Friendly Construction By Shubham Shinde,Akshay Phadtare & Ganesh Phadtare
Eco-Friendly Construction By Shubham Shinde,Akshay Phadtare & Ganesh Phadtare
ย 
Blast resistant structure
Blast resistant structureBlast resistant structure
Blast resistant structure
ย 
Design of Blast resistance structures
Design of Blast resistance structuresDesign of Blast resistance structures
Design of Blast resistance structures
ย 
Transparent concrete (translucent)
Transparent concrete (translucent)Transparent concrete (translucent)
Transparent concrete (translucent)
ย 
Eco friendly building materials
Eco friendly building materialsEco friendly building materials
Eco friendly building materials
ย 

Similar to Prediction of terrorist on the basis of semantic association building ontology niroj

Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AI
IJCI JOURNAL
ย 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
AIRCC Publishing Corporation
ย 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
AIRCC Publishing Corporation
ย 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
AIRCC Publishing Corporation
ย 
Comparison study of machine learning classifiers to detect anomalies
Comparison study of machine learning classifiers  to detect anomalies Comparison study of machine learning classifiers  to detect anomalies
Comparison study of machine learning classifiers to detect anomalies
IJECEIAES
ย 
Techniques for predicting dark web events focused on the delivery of illicit ...
Techniques for predicting dark web events focused on the delivery of illicit ...Techniques for predicting dark web events focused on the delivery of illicit ...
Techniques for predicting dark web events focused on the delivery of illicit ...
IJECEIAES
ย 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
IJMIT JOURNAL
ย 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
IJMIT JOURNAL
ย 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
IJNSA Journal
ย 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
Laura Martin
ย 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET Journal
ย 
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
IDSECCONF 2020 :  A Tale Story of Building and Maturing Threat Hunting ProgramIDSECCONF 2020 :  A Tale Story of Building and Maturing Threat Hunting Program
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
Digit Oktavianto
ย 
Guide to high volume data sources for SIEM
Guide to high volume data sources for SIEMGuide to high volume data sources for SIEM
Guide to high volume data sources for SIEM
Joseph DeFever
ย 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
CSITiaesprime
ย 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
Editor IJCATR
ย 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
IRJET Journal
ย 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineering
ijtsrd
ย 
Literature Review.docx
Literature Review.docxLiterature Review.docx
Literature Review.docx
AliAgral2
ย 
20TL045_IDS for Cyber Security AI,ML Based (1).pptx
20TL045_IDS for Cyber Security AI,ML Based (1).pptx20TL045_IDS for Cyber Security AI,ML Based (1).pptx
20TL045_IDS for Cyber Security AI,ML Based (1).pptx
zahidab112233
ย 
Review on effectiveness of deep learning approach in digital forensics
Review on effectiveness of deep learning approach in digital  forensicsReview on effectiveness of deep learning approach in digital  forensics
Review on effectiveness of deep learning approach in digital forensics
IJECEIAES
ย 

Similar to Prediction of terrorist on the basis of semantic association building ontology niroj (20)

Empowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AIEmpowering Cyber Threat Intelligence with AI
Empowering Cyber Threat Intelligence with AI
ย 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
ย 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
ย 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
ย 
Comparison study of machine learning classifiers to detect anomalies
Comparison study of machine learning classifiers  to detect anomalies Comparison study of machine learning classifiers  to detect anomalies
Comparison study of machine learning classifiers to detect anomalies
ย 
Techniques for predicting dark web events focused on the delivery of illicit ...
Techniques for predicting dark web events focused on the delivery of illicit ...Techniques for predicting dark web events focused on the delivery of illicit ...
Techniques for predicting dark web events focused on the delivery of illicit ...
ย 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
ย 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
ย 
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
A SYSTEMATIC REVIEW ON MACHINE LEARNING INSIDER THREAT DETECTION MODELS, DATA...
ย 
Securing And Protecting Information
Securing And Protecting InformationSecuring And Protecting Information
Securing And Protecting Information
ย 
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...IRJET-  	  Security Risk Assessment on Social Media using Artificial Intellig...
IRJET- Security Risk Assessment on Social Media using Artificial Intellig...
ย 
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
IDSECCONF 2020 :  A Tale Story of Building and Maturing Threat Hunting ProgramIDSECCONF 2020 :  A Tale Story of Building and Maturing Threat Hunting Program
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
ย 
Guide to high volume data sources for SIEM
Guide to high volume data sources for SIEMGuide to high volume data sources for SIEM
Guide to high volume data sources for SIEM
ย 
Selected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testingSelected advanced themes in ethical hacking and penetration testing
Selected advanced themes in ethical hacking and penetration testing
ย 
A Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation ProcessA Proactive Approach in Network Forensic Investigation Process
A Proactive Approach in Network Forensic Investigation Process
ย 
Intrusion Detection System using Data Mining
Intrusion Detection System using Data MiningIntrusion Detection System using Data Mining
Intrusion Detection System using Data Mining
ย 
Credential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social EngineeringCredential Harvesting Using Man in the Middle Attack via Social Engineering
Credential Harvesting Using Man in the Middle Attack via Social Engineering
ย 
Literature Review.docx
Literature Review.docxLiterature Review.docx
Literature Review.docx
ย 
20TL045_IDS for Cyber Security AI,ML Based (1).pptx
20TL045_IDS for Cyber Security AI,ML Based (1).pptx20TL045_IDS for Cyber Security AI,ML Based (1).pptx
20TL045_IDS for Cyber Security AI,ML Based (1).pptx
ย 
Review on effectiveness of deep learning approach in digital forensics
Review on effectiveness of deep learning approach in digital  forensicsReview on effectiveness of deep learning approach in digital  forensics
Review on effectiveness of deep learning approach in digital forensics
ย 

More from Nawaraj Ghimire

Study abroad australia group presentation titi traning
Study abroad australia group presentation titi traningStudy abroad australia group presentation titi traning
Study abroad australia group presentation titi traning
Nawaraj Ghimire
ย 
Class observation in janamaitri campus by parshuram
Class observation in janamaitri campus by parshuramClass observation in janamaitri campus by parshuram
Class observation in janamaitri campus by parshuram
Nawaraj Ghimire
ย 
Observation report of pushpalal memorial college niroj poudel
Observation report of pushpalal memorial college niroj poudelObservation report of pushpalal memorial college niroj poudel
Observation report of pushpalal memorial college niroj poudel
Nawaraj Ghimire
ย 
Class observation report nawaraj ghimire
Class observation report nawaraj ghimireClass observation report nawaraj ghimire
Class observation report nawaraj ghimire
Nawaraj Ghimire
ย 
Free and open source sw
Free and open source swFree and open source sw
Free and open source sw
Nawaraj Ghimire
ย 
Free and open source sw
Free and open source swFree and open source sw
Free and open source sw
Nawaraj Ghimire
ย 
Hostel management system bhanu
Hostel management system bhanuHostel management system bhanu
Hostel management system bhanu
Nawaraj Ghimire
ย 
Cafeteria management system in sanothimi campus(cms) suresh
Cafeteria management system in sanothimi campus(cms) sureshCafeteria management system in sanothimi campus(cms) suresh
Cafeteria management system in sanothimi campus(cms) suresh
Nawaraj Ghimire
ย 
Gas agency management system for nepal gas anil
Gas agency management system for nepal gas anilGas agency management system for nepal gas anil
Gas agency management system for nepal gas anil
Nawaraj Ghimire
ย 
Canteen management system of โ€œhimalayan academyโ€ sapana
Canteen management system of โ€œhimalayan academyโ€ sapanaCanteen management system of โ€œhimalayan academyโ€ sapana
Canteen management system of โ€œhimalayan academyโ€ sapana
Nawaraj Ghimire
ย 
Online examination system for sanothimi campus purshuram
Online examination system for sanothimi campus purshuramOnline examination system for sanothimi campus purshuram
Online examination system for sanothimi campus purshuram
Nawaraj Ghimire
ย 
Spm global shopping nawaraj ghimire
Spm  global shopping  nawaraj ghimireSpm  global shopping  nawaraj ghimire
Spm global shopping nawaraj ghimire
Nawaraj Ghimire
ย 
Online examination system of open and distance education kunti
Online examination system of open and distance education kuntiOnline examination system of open and distance education kunti
Online examination system of open and distance education kunti
Nawaraj Ghimire
ย 

More from Nawaraj Ghimire (13)

Study abroad australia group presentation titi traning
Study abroad australia group presentation titi traningStudy abroad australia group presentation titi traning
Study abroad australia group presentation titi traning
ย 
Class observation in janamaitri campus by parshuram
Class observation in janamaitri campus by parshuramClass observation in janamaitri campus by parshuram
Class observation in janamaitri campus by parshuram
ย 
Observation report of pushpalal memorial college niroj poudel
Observation report of pushpalal memorial college niroj poudelObservation report of pushpalal memorial college niroj poudel
Observation report of pushpalal memorial college niroj poudel
ย 
Class observation report nawaraj ghimire
Class observation report nawaraj ghimireClass observation report nawaraj ghimire
Class observation report nawaraj ghimire
ย 
Free and open source sw
Free and open source swFree and open source sw
Free and open source sw
ย 
Free and open source sw
Free and open source swFree and open source sw
Free and open source sw
ย 
Hostel management system bhanu
Hostel management system bhanuHostel management system bhanu
Hostel management system bhanu
ย 
Cafeteria management system in sanothimi campus(cms) suresh
Cafeteria management system in sanothimi campus(cms) sureshCafeteria management system in sanothimi campus(cms) suresh
Cafeteria management system in sanothimi campus(cms) suresh
ย 
Gas agency management system for nepal gas anil
Gas agency management system for nepal gas anilGas agency management system for nepal gas anil
Gas agency management system for nepal gas anil
ย 
Canteen management system of โ€œhimalayan academyโ€ sapana
Canteen management system of โ€œhimalayan academyโ€ sapanaCanteen management system of โ€œhimalayan academyโ€ sapana
Canteen management system of โ€œhimalayan academyโ€ sapana
ย 
Online examination system for sanothimi campus purshuram
Online examination system for sanothimi campus purshuramOnline examination system for sanothimi campus purshuram
Online examination system for sanothimi campus purshuram
ย 
Spm global shopping nawaraj ghimire
Spm  global shopping  nawaraj ghimireSpm  global shopping  nawaraj ghimire
Spm global shopping nawaraj ghimire
ย 
Online examination system of open and distance education kunti
Online examination system of open and distance education kuntiOnline examination system of open and distance education kunti
Online examination system of open and distance education kunti
ย 

Recently uploaded

Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
ย 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
ย 
A Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by QuizzitoA Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by Quizzito
Quizzito The Quiz Society of Gargi College
ย 
family welfare programme-pptx details welfare
family welfare programme-pptx details welfarefamily welfare programme-pptx details welfare
family welfare programme-pptx details welfare
AnushreeBhunia
ย 
Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
EducationNC
ย 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
MJDuyan
ย 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
blueshagoo1
ย 
Post init hook in the odoo 17 ERP Module
Post init hook in the  odoo 17 ERP ModulePost init hook in the  odoo 17 ERP Module
Post init hook in the odoo 17 ERP Module
Celine George
ย 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
EduSkills OECD
ย 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
Celine George
ย 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
ย 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
Derek Wenmoth
ย 
Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
whatchangedhowreflec
ย 
Keynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse CityKeynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse City
PJ Caposey
ย 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ShwetaGawande8
ย 
Project- Comparison among Chhattisgarh and kerala.pptx
Project- Comparison among Chhattisgarh and kerala.pptxProject- Comparison among Chhattisgarh and kerala.pptx
Project- Comparison among Chhattisgarh and kerala.pptx
jeevankraghuraman
ย 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
indexPub
ย 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
ย 
Bแป˜ Bร€I TแบฌP TEST THEO UNIT - FORM 2025 - TIแบพNG ANH 12 GLOBAL SUCCESS - KรŒ 1 (B...
Bแป˜ Bร€I TแบฌP TEST THEO UNIT - FORM 2025 - TIแบพNG ANH 12 GLOBAL SUCCESS - KรŒ 1 (B...Bแป˜ Bร€I TแบฌP TEST THEO UNIT - FORM 2025 - TIแบพNG ANH 12 GLOBAL SUCCESS - KรŒ 1 (B...
Bแป˜ Bร€I TแบฌP TEST THEO UNIT - FORM 2025 - TIแบพNG ANH 12 GLOBAL SUCCESS - KรŒ 1 (B...
Nguyen Thanh Tu Collection
ย 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
RandolphRadicy
ย 

Recently uploaded (20)

Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
ย 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
ย 
A Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by QuizzitoA Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by Quizzito
ย 
family welfare programme-pptx details welfare
family welfare programme-pptx details welfarefamily welfare programme-pptx details welfare
family welfare programme-pptx details welfare
ย 
Opportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive themOpportunity scholarships and the schools that receive them
Opportunity scholarships and the schools that receive them
ย 
Information and Communication Technology in Education
Information and Communication Technology in EducationInformation and Communication Technology in Education
Information and Communication Technology in Education
ย 
CIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdfCIS 4200-02 Group 1 Final Project Report (1).pdf
CIS 4200-02 Group 1 Final Project Report (1).pdf
ย 
Post init hook in the odoo 17 ERP Module
Post init hook in the  odoo 17 ERP ModulePost init hook in the  odoo 17 ERP Module
Post init hook in the odoo 17 ERP Module
ย 
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...
ย 
How to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRMHow to Create a Stage or a Pipeline in Odoo 17 CRM
How to Create a Stage or a Pipeline in Odoo 17 CRM
ย 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
ย 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
ย 
Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
ย 
Keynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse CityKeynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse City
ย 
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
INTRODUCTION TO HOSPITALS & AND ITS ORGANIZATION
ย 
Project- Comparison among Chhattisgarh and kerala.pptx
Project- Comparison among Chhattisgarh and kerala.pptxProject- Comparison among Chhattisgarh and kerala.pptx
Project- Comparison among Chhattisgarh and kerala.pptx
ย 
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...
ย 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
ย 
Bแป˜ Bร€I TแบฌP TEST THEO UNIT - FORM 2025 - TIแบพNG ANH 12 GLOBAL SUCCESS - KรŒ 1 (B...
Bแป˜ Bร€I TแบฌP TEST THEO UNIT - FORM 2025 - TIแบพNG ANH 12 GLOBAL SUCCESS - KรŒ 1 (B...Bแป˜ Bร€I TแบฌP TEST THEO UNIT - FORM 2025 - TIแบพNG ANH 12 GLOBAL SUCCESS - KรŒ 1 (B...
Bแป˜ Bร€I TแบฌP TEST THEO UNIT - FORM 2025 - TIแบพNG ANH 12 GLOBAL SUCCESS - KรŒ 1 (B...
ย 
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxxSimple-Present-Tense xxxxxxxxxxxxxxxxxxx
Simple-Present-Tense xxxxxxxxxxxxxxxxxxx
ย 

Prediction of terrorist on the basis of semantic association building ontology niroj

  • 1. project proposal on ๏ต Prediction of terrorist on the basis of Semantic Association building Ontology Niroj Paudel MED. ICT 3rd semester Sanothimi Campus
  • 2. Background and Introduction ๏ถ Terrorism is a global problem. ๏ถ Terrorist have fake name, multi identification, fake passports and stolen credit cards. ๏ถ Their relations with the local and international terrorists or underground forces. ๏ถ The prediction system can predict terrorist And terrorist activities before the event.
  • 3. Statement of problems ๏ถ Terrorism is the network of personal connections that allows the terrorist organization to function.
  • 4. Objectives ๏ถ To predict the terrorist on the basis of semantic web portal
  • 5. Scope and Limitation Scope ๏ถ Application is web based, it has wide reach among millions of users among which many users are intended to learn. ๏ถ It is focused to Counter-terrorist activities that may include the Intelligence Bureau in army, police or national Investigation. Limitation ๏ถ Particular terrorist group ๏ถ Certain period of time
  • 6. Feasibility study ๏ถ Economic ๏ถ Schedule ๏ถ Technical ๏ถ Operational
  • 7. Data collection ๏ถ Primary Data ๏ถ Secondary Data
  • 8. Testing tool ๏ถ Unit testing ๏ถ Integration testing ๏ถ Alpha testing ๏ถ Beta testing ๏ถ System testing
  • 9. Project timeline (Gantt Chart) ID Task Name Start Finish Duration Apr 2072 May 2072 4/24 5/1 5/8 5/15 5/22 1 6d5/1/20724/25/2072System Stady 2 15d5/18/20725/2/2072System Analysis 3 12d6/1/20725/19/2072System Design 4 15d6/19/20726/2/2072Coding 5 5d6/24/20726/20/2072Testing 6 5d6/30/20726/26/2072Implements 7 58d6/30/20724/25/2072Documentation Jun 2072 5/29 6/5 6/12 6/19 6/26
  ็ฟป่ฏ‘๏ผš