Please wait a minute...
Data Analysis and Knowledge Discovery  2018, Vol. 2 Issue (10): 21-26    DOI: 10.11925/infotech.2096-3467.2018.0768
Current Issue | Archive | Adv Search |
Risk Assessment of Civil Aviation Terrorism Based on K-means Clustering
Liu Minghui()
School of Criminal Investigation and Counter Terrorism, People’s Public Security University of China, Beijing 100038, China
Download: PDF (680 KB)   HTML ( 8
Export: BibTeX | EndNote (RIS)      
Abstract  

[Objective]This paper tries to assess the terrorism risks facing civil aviation industry quantitatively and objectively. [Methods] We proposed a risk assessment model based on K-means clustering, and then examined it with the data of terrorist attacks from 1992 to 2015. We calculated the risk of different types of attacks and their targets objectively. [Results] The risk of aircraft bombing, armed assault against the airport and airline staff were the highest, the risk of hijacking, bombing/explosion aginst the airport or airline staff were at medium level, and the risk of other attacks were relatively low. We used this method to predict the risk of terrorist attacks against the civil aviation in 2016, and the prediction accuracy was up to 92.3%. [Limitations] The proposed method for risk assessment is only suitable for processing numerical data. [Conclusions] The K-means clustering method can assess risk based on statistical data without human intervention, which could be applied to similar studies.

Key wordsK-means      Clustering      Aviation System      Risk Assessment     
Received: 15 July 2018      Published: 12 November 2018
ZTFLH:  D815.5 G35  

Cite this article:

Liu Minghui. Risk Assessment of Civil Aviation Terrorism Based on K-means Clustering. Data Analysis and Knowledge Discovery, 2018, 2(10): 21-26.

URL:

https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/10.11925/infotech.2096-3467.2018.0768     OR     https://manu44.magtech.com.cn/Jwk_infotech_wk3/EN/Y2018/V2/I10/21

袭击手段 飞机 机场 民航工作人员 总计
武装袭击 20 24 8 54
暗杀 1 2 4 7
爆炸 27 236 27 290
基础设施攻击 1 12 8 21
劫机 106 1 - 107
劫持人质 1 2 - 3
绑架 3 4 2 9
徒手攻击 1 1 2
其他 3 8 4 15
合计 162 290 54 508
袭击手段 死亡人数 受伤人数
飞机 机场 民航
工作人员
飞机 机场 民航
工作人员
武装袭击 9 117 9 26 44 12
暗杀 0 0 3 2 0 2
爆炸 635 266 0 25 780 0
基础设施攻击 0 1 0 0 13 0
劫机 60 0 0 19 0 0
劫持人质 123 1 0 0 2 0
绑架 0 12 0 0 1 0
其他 2 11 0 0 15 0
合计 829 408 12 72 855 14
xi(j) j=1 j=2 j=3
i=1 0.1235 0.0109 0.3611
i=2 0.0062 0.0000 0.0278
i=3 0.1667 0.7660 0.3472
i=4 0.0062 0.0000 0.0000
i=5 0.6543 0.0724 0.2639
i=6 0.0062 0.1484 0.0000
i=7 0.0185 0.0000 0.0000
i=8 0.0000 0.0000 0.0000
武装
袭击
暗杀 爆炸 基础
设施攻击
劫机 劫持
人质
绑架 徒手
攻击
袭击手段 飞机 机场 民航工作人员
武装袭击
暗杀
爆炸
基础设施攻击
劫机
劫持人质
绑架
徒手攻击
袭击手段 飞机 机场 民航工作人员
武装袭击
暗杀
爆炸
基础设施攻击
劫机
劫持人质
绑架
徒手攻击
其他
[1] Han J, Kamber M, Pei J.数据挖掘概念与技术[M]. 范明, 孟小峰译. 第3版. 北京: 机械工业出版社, 2012.
[1] (Han J, Kamber M, Pei J.Data Mining: Concepts and Techniques[M]. Translated by Fan Ming, Meng Xiaofeng. The 3rd Edition. Beijing: China Machine Press, 2012.)
[2] Wagstaff K, Cardie C, Rogers S.Constrained K-means Clustering with Background Knowledge[C]// Proceedings of the 18th International Conference on Machine Learning. 2001: 577-584.
[3] Krishna K, Murty M N.Genetic K-Means Algorithm[J]. IEEE Transactions on Systems, Man, and Cybernetics: Part B(Cybernetics), 1999, 29(3): 433-439.
doi: 10.1109/3477.764879
[4] Arai K, Ali R B.Hierarchical K-means: An Algorithm for Centroids Initialization for K-means[J]. Reports of the Faculty of Science and Engineering, 2007, 36(1): 25-31.
[5] 雷小锋, 谢昆青, 林帆, 等. 一种基于K-Means局部最优性的高效聚类算法[J]. 软件学报, 2008, 19(7): 1683-1692.
[5] (Lei Xiaofeng, Xie Kunqing, Lin Fan, et al.An Efficient Clustering Algorithm Based on Local Optimality of K-Means[J]. Journal of Software, 2008, 19(7): 1683-1692.)
[6] 曾亮. 多层次模糊评估法在民航不安全事件风险评估中的应用[J]. 中国安全科学学报, 2008, 18(1): 131-138.
doi: 10.3969/j.issn.1003-3033.2008.01.023
[6] (Zeng Liang.Application of Multi-layer Fuzzy Evaluation Method to Risk Assessment in Civil Aviation[J]. China Safety Science Journal, 2008, 18(1): 131-138.)
doi: 10.3969/j.issn.1003-3033.2008.01.023
[7] 王衍洋, 李敬, 曹义华. 中国民航安全评价方法研究[J]. 中国安全生产科学技术, 2008, 4(5): 111-113.
doi: 10.3969/j.issn.1673-193X.2008.05.026
[7] (Wang Yanyang, Li Jing, Cao Yihua.Study on Safety Assessment of China Civil Aviation Industry[J]. Journal of Safety Science and Technology, 2008, 4(5): 111-113.)
doi: 10.3969/j.issn.1673-193X.2008.05.026
[8] 吕学梅, 王永刚, 荆增强. 风险管理在民航事故预防中的应用[J]. 安全与环境学报, 2006, 6(S1): 153-155.
doi: 10.3969/j.issn.1009-6094.2006.z1.053
[8] (Lv Xuemei, Wang Yonggang, Jing Zengqiang.Application of Risk Management in Civil Aviation System[J]. Journal of Safety and Environment, 2006, 6(S1): 153-155.)
doi: 10.3969/j.issn.1009-6094.2006.z1.053
[9] 王永刚, 张秀艳. 民航系统三维风险评价模型的研究[J]. 中国水运, 2007, 5(7): 147-148.
[9] (Wang Yonggang, Zhang Xiuyan.The Research of Three-Dimension Risk Assessment Model for Civil Aviation System[J]. China Water Transport, 2007, 5(7): 147-148.)
[10] Stewart M G, Mueller J.Terrorism Risks and Cost-Benefit Analysis of Aviation Security[J]. Risk Analysis, 2013, 33(5): 893-908.
doi: 10.1111/j.1539-6924.2012.01905.x pmid: 23035984
[11] 郭璇, 吴文辉, 肖治庭. 基于事件树和PRA的民航机场恐怖袭击风险评估模型[J]. 计算机应用研究, 2017, 34(6): 1809-1811.
[11] (Guo Xuan, Wu Wenhui, Xiao Zhiting.Civil Aviation Airport Terrorism Risk Assessment Model Based on Event Tree and PRA[J]. Application Research of Computers, 2017, 34(6): 1809-1811.)
[12] 王振, 刘茂. 定量风险分析在恐怖袭击风险评估中的应用[J]. 中国公共安全:学术版, 2006, 7(4): 18-22.
doi: 10.3969/j.issn.1672-2396.2006.04.003
[12] (Wang Zhen, Liu Mao.Application of Quantitative Risk Assessment on Terrorism Attack[J]. China Public Security: Academy Edition, 2006, 7(4): 18-22.)
doi: 10.3969/j.issn.1672-2396.2006.04.003
[13] 贺元骅, 魏中许, 蔡正涛. 民航公共交通运输系统恐怖威胁评估模型分析[J]. 中国公共安全:学术版, 2009, 14(1): 11-14.
doi: 10.3969/j.issn.1672-2396.2009.01.002
[13] (He Yuanhua, Wei Zhongxu, Cai Zhengtao.A Study of Threat Assessing Model on Terrorism in Traffic System[J]. China Public Security: Academy Edition, 2009, 14(1): 11-14.)
doi: 10.3969/j.issn.1672-2396.2009.01.002
[14] 梅建明, 刘明辉, 蒋东龙. 城市反恐危机管理: 理论、方法与实务[M]. 北京: 中国人民公安大学出版社, 2017.
[14] (Mei Jianming, Liu Minghui, Jiang Donglong.Crisis Management of Urban Counter Terrorism: Theory, Methods and Practice[M]. Beijing: Publishing House of People’s Public Security University of China, 2017.)
[15] Institute for Economics & Peace. Global Terrorism Index [EB/OL]. [2018-02-20]. .
[1] Wang Ruolin, Niu Zhendong, Lin Qika, Zhu Yifan, Qiu Ping, Lu Hao, Liu Donglei. Disambiguating Author Names with Embedding Heterogeneous Information and Attentive RNN Clustering Parameters[J]. 数据分析与知识发现, 2021, 5(8): 13-24.
[2] Wang Xiwei,Jia Ruonan,Wei Yanan,Zhang Liu. Clustering User Groups of Public Opinion Events from Multi-dimensional Social Network[J]. 数据分析与知识发现, 2021, 5(6): 25-35.
[3] Lu Linong,Zhu Zhongming,Zhang Wangqiang,Wang Xiaochun. Cross-database Knowledge Integration and Fingerprint of Institutional Repositories with Lingo3G Clustering Algorithm[J]. 数据分析与知识发现, 2021, 5(5): 127-132.
[4] Zhang Mengyao, Zhu Guangli, Zhang Shunxiang, Zhang Biao. Grouping Microblog Users of Trending Topics Based on Sentiment Analysis[J]. 数据分析与知识发现, 2021, 5(2): 43-49.
[5] Ding Hao, Ai Wenhua, Hu Guangwei, Li Shuqing, Suo Wei. A Personalized Recommendation Model with Time Series Fluctuation of User Interest[J]. 数据分析与知识发现, 2021, 5(11): 45-58.
[6] Yang Chen, Chen Xiaohong, Wang Chuhan, Liu Tingting. Recommendation Strategy Based on Users’ Preferences for Fine-Grained Attributes[J]. 数据分析与知识发现, 2021, 5(10): 94-102.
[7] Yu Fengchang,Cheng Qikai,Lu Wei. Locating Academic Literature Figures and Tables with Geometric Object Clustering[J]. 数据分析与知识发现, 2021, 5(1): 140-149.
[8] Wu Jinming,Hou Yuefang,Cui Lei. Automatic Expression of Co-occurrence Clustering Based on Indexing Rules of Medical Subject Headings[J]. 数据分析与知识发现, 2020, 4(9): 133-144.
[9] Wen Pingmei,Ye Zhiwei,Ding Wenjian,Liu Ying,Xu Jian. Developments of Named Entity Disambiguation[J]. 数据分析与知识发现, 2020, 4(9): 15-25.
[10] Xi Yunjiang, Du Diedie, Liao Xiao, Zhang Xuehong. Analyzing & Clustering Enterprise Microblog Users with Supernetwork[J]. 数据分析与知识发现, 2020, 4(8): 107-118.
[11] Yang Xu,Qian Xiaodong. Synchronous Clustering Algorithm for Social Networks Based on Improved Vicsek Model[J]. 数据分析与知识发现, 2020, 4(4): 119-128.
[12] Xiong Huixiang,Li Xiaomin,Li Yueyan. Group Recommendation Based on Attribute Mining of Book Reviews[J]. 数据分析与知识发现, 2020, 4(2/3): 214-222.
[13] Wei Jiaze,Dong Cheng,He Yanqing,Liu Zhihui,Peng Keyun. Detecting News Topics Based on Equalized Paragraph and Sub-topic Vector[J]. 数据分析与知识发现, 2020, 4(10): 70-79.
[14] Huaming Zhao,Li Yu,Qiang Zhou. Determining Best Text Clustering Number with Mean Shift Algorithm[J]. 数据分析与知识发现, 2019, 3(9): 27-35.
[15] Shan Li,Yehui Yao,Hao Li,Jie Liu,Karmapemo. ISA Biclustering Algorithm for Group Recommendation[J]. 数据分析与知识发现, 2019, 3(8): 77-87.
  Copyright © 2016 Data Analysis and Knowledge Discovery   Tel/Fax:(010)82626611-6626,82624938   E-mail:jishu@mail.las.ac.cn