Network analysis: A promising tool for food safety

DP Naughton, T Nepusz, A Petroczi - Current Opinion in Food Science, 2015 - Elsevier
Highlights•A network analysis tool allows rapid interrogation of large databases.•The 'live
tool'is capable of automatic or manual data download.•It comes as a desktop application …

[KİTAP][B] Discrete problems in nature inspired algorithms

A Shukla, R Tiwari - 2017 - taylorfrancis.com
This book includes introduction of several algorithms which are exclusively for graph based
problems, namely combinatorial optimization problems, path formation problems, etc. Each …

A fuzzy based integrated model for identification of vital node in terrorist network using logarithmic concept

AK Mishra, N Joshi, I Mathur - Journal of Intelligent & Fuzzy …, 2020 - content.iospress.com
Abstract Analysis of the terrorist network is a process to analyze or deriving Useful
information from the available network data. Ranking The Terrorist nodes within a terrorist …

Fuzzy based optimization of social network with special reference to terrorist network mining

S Tiwari, S Shrivastava, M Gupta - … International Conference on …, 2015 - ieeexplore.ieee.org
The vast region of Social network analysis has led the law enforcement agencies to study
the behavior of social network. Law enforcement agencies in the world have begun to study …

An avant-garde approach for detection of key individuals with leader hierarchy determination using FIMAX Model (Anti—Terrorism approach)

S Singh, D Indurkhya, A Tiwari - 2018 International Conference …, 2018 - ieeexplore.ieee.org
The current study attempts to examine the terrorist network. The purpose of this study is to
explore the relationship among terrorist nodes and their importance. The study employed a …

[PDF][PDF] Design Method Based on Fuzzy Logic and Genetic Algorithm in Terrorist Network

AK Mishra, N Joshi, I Mathur - papers.ssrn.com
Along with the modernization of technological era, the technological advancement has also
raised concerns about the security of web activities. These activities are in a way or the other …

[PDF][PDF] Year of Publication: 2016

S Tiwari, LK Tiwari - 2016 - academia.edu
With the explosion of service based web application like online news, shop**, bidding,
libraries great amount of information is available. Due to this information overload problem …

[PDF][PDF] A New Fuzzy based Approach for Destabilization of Terrorist Network

S Tiwari, S Shrivastava, M Gupta - International Journal of Computer …, 2015 - Citeseer
The wide scope of Social network analysis has led the law require agencies to study the
performance of social network. The main objective of this study is to identify the key nodes …

[ALINTI][C] Terrorism in the cyber space: The new battlefield

S Gupta, A Tiwari - International Journal of Advanced Research in …, 2016