<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Big Data: A Computing Model for Knowledge Extraction on Insurgency Management</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Adeniji Oluwashola David</string-name>
          <email>od.adeniji@mail.ui.edu.ng</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, University of Ibadan</institution>
          ,
          <addr-line>Ibadan</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Federal University of Technology</institution>
          ,
          <addr-line>Minna</addr-line>
          ,
          <country country="NG">Nigeria</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>52</fpage>
      <lpage>55</lpage>
      <abstract>
        <p>-The study investigates applications of big-data in Africa using Boko Haram and Al shabaab insurgency and their effect in the society. A framework on Big Data was developed to extract knowledge based on the activities of the insurgency. The crucial information that concerns the activities of insurgent majorly cannot be easily access due to inaccurate data set. The research employs traditional computing models that were used to limit volume, velocity and variety as the major component of Big Data. The analysis of the frame work are based on different methods of attacks employed by these terrorists, development of sophisticated apparatus or technology, the relative increase in the spate of attack, and success rate in terms of causalities recorded. Big data requires exceptional technologies to efficiently process large quantities of data within tolerable elapsed time. The knowledge extraction in this research is to analyse the data sets by presenting a methodology from the application of big data to solve and offer analytical solutions using an integrated Boko Haram and Al shabaab data set.</p>
      </abstract>
      <kwd-group>
        <kwd>computing models</kwd>
        <kwd>insurgency</kwd>
        <kwd>knowledge extraction</kwd>
        <kwd>component of big data</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>INTRODUCTION</p>
      <p>The Concept of Big Data has led to the variance in the
deployment of different technologies. The deployment
variance in technology will provide data-set for extraction.
Big Data can be defined as collection of data-set from
various sources which are analyzed when certain invent took
placed. The occurrence of these invent are associated with
data at rest and data in motion. The interaction and activities
of people, process and data will provide real time data set for
knowledge extraction and discovery. The investigation of
“Boko Haram” and “Al-shabaab” in this study is timely due
to the challenges faced by Nigeria and Somalia. Insurgencies
are resources that need to be managed. The effect of
insurgencies management cannot be emphases and their
implication on investments such as Schools, Churches
Mosque and Health care centers are prime indexes for
sustainable development of any Nation. The core interest in
this research is to develop an information system basically
on Boko Haram (Nigeria) and Al-shabaab (Somalia)
insurgence in Africa that will contain timely data set
collected from several sources which will give opportunities
for new data discovery, value creation and important
decision making on how to curb insurgencies in Africa.</p>
      <p>Traditional data analytics is the traditional method of
managing structured data which includes a relational
database and schema to manage the storage and retrieval of
the dataset. This paper is organized as follows: Section 2
explains the Component of Big Data and insurgency. In
section 3 Computing models and knowledge extraction for
the model was described while in section 4 discussion of
result was provided. The conclusion of paper was made in
Section 5.</p>
      <p>II.</p>
      <p>COMPONENT OF BIG DATA</p>
      <p>
        The Complexity of handling data-set in Big Data using
on-hand management tools was describe by [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The study
based it assessment on traditional way of processing data.
However Big data can be analyzed with common software
tools which can predict, mine data, analyze text and provide
statistical analysis as discussed by [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. The data set in big
data are faced with challenges such as capturing, storing,
searching, sharing and visualization. The three major indices
for characterizing Big Data are Volume, Velocity and
Variety. Although these three indices made Big Data to be
different from the traditional way of analyzing data. Variety
manages the complexity of multiply data types which vary
from structure and unstructured data. Formatted, modeled
and organized data are refer to structured data while emails,
audio, video and images are unstructured data. Velocity is
the major characteristic of big data. Velocity provides the
speed of generation of data or how fast the data is generated
and processed in order to meet specific task. Volume refers
to the quantity of data that is generated. There are some other
characteristic of big data such as variability, veracity, value
and complexity.
      </p>
      <p>A. Insurgency</p>
      <p>
        Basically the act of rebellion directly or indirectly is
referred to insurgency [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The ideal definition of
insurgencies can be ambiguous depending on the usage [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
The review by some researcher considers insurgency has
association that is illegitimate or not lawful by the law of the
land. The act that is illicit is called Terrorism but it is more
than mere criminality [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Terrorism is the basic part of the
first part of the three phases of revolutionary warfare. Boko
Haram is an indigenous Salafist group which turned to a
Salafist Jihadist group in 2009 while al-Shabaab stems from
a Salafi- Wahhabi strand of Sunni Islam, Muhyadin [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. The
information that was gathered in the militant salafi group
1990 shows that the forerunner of al-Shabab, was Al-Ittihad
Al-Islami (AIAI, or “Unity of Islam”).The fall of the Siad
Barre military regime (1969-1991) during the outbreak of
civil war. The internet was used by Boko Haram and
alShabaab to catalyze and promote their ideology in order to
celebrate their martyrs. These two group communicate with
their audience through the internet using blog and email.
They maintain an email at; nigjihadist@yahoo.com to
communicate with intending members.
      </p>
      <p>
        They propagate Boko Haram and their interactions with
the Western World is forbidden [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The information
gathered shows that their interaction are against the Muslim
establishment and the government of Nigeria [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Their
agenda was to accuse the government of political corruption
and weak judicial structure.
      </p>
      <p>III.</p>
      <p>MATERIALS AND METHODS</p>
      <p>The computing model is made up of Use case model,
Data flow Diagram and E-R diagram. The UML diagrams
was used to specify the functionality and non-functionality of
the system. The process in the modeling is inherently
iterative. Figure 1 shows level 0, data flow diagram.</p>
      <p>
        The system requirement in the computing model
developed consists of program and database which can adapt
to modification. The operational approach of the model
deployed consists of parallel change over, direct change over
and pilot/phased change over. The system was tested to
ensure validation and invalidation data in order to ascertain
the correctness, effectiveness and efficiency of the system,
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. This is to evaluate that the complete, integrated system
complies with its specified requirement.
      </p>
      <p>IV.</p>
      <p>RESULT AND DISCUSSION</p>
      <p>Knowledge extraction will allow users to view, sort or
search by year, country or location of the information
needed. The forms that were design provide information that
is sent to the database. It also prevents duplication of records
in the database by the administrator. The extraction could be
data of terror attacks plotted against fatalities by year of
attack. Figure 2 presents the line chart of the statistical data
of terror attacks, Figure 3 presents pie chart of the statistical
data of terror attacks, and Figure 4 presents bar chart
statistical data of terror attacks.</p>
      <p>The extraction of knowledge from the figures can be
summarized in table I.</p>
      <p>The analysis presented in the table above provide the
nature and type of attack .The rate of fatalities on the line
chart increases from 2009 to 2014 and suddenly dropped at
2015. Consider 9.5k on the line chart in 2014 terror attack, it
could be deduce that a specific location in the region was
massively attacked that lead high destruction of life and
properties. From the table l also there could be more of
Bombing and explosion, likewise the data that was extracted
on the pie chart shows 59.3% terror attack in 2014. In 2009
the terror attacks was 4.7%, 2010 was 0.5%, 2012 was
11.8%, 2013 was 19.9% while in 2015 there was a drop of
0.1% in the attack. The justification from the data gathered
shows that, number of attacks increases with years showing
chronicles of cases of terror attacks.</p>
      <p>V.</p>
    </sec>
    <sec id="sec-2">
      <title>CONCLUSION</title>
      <p>The crucial information that concerns the activities of
Boko Haram and Al shabaab are vulnerable. Big Data
technology will assist the government to extract information
and provide solution on how to eradicate the insurgent.
When developing the application of big data for analysis.
Different methods of attacks were employed and deployed
which clearly revealed the success rate in terms of causalities
recorded. However the analysis shows that the fatalities in
attack periodically increase and suddenly dropped. The
applications of big-data analysis have high effect in the
society because of the numerous attacks the society is facing.</p>
      <p>VI.</p>
    </sec>
    <sec id="sec-3">
      <title>ACKNOWLEDGMENT The author wish to thank the Department of Computer Science, University of Ibadan for support in this research work.</title>
      <p>ANALYSIS SUMMARY OF THE FRAMEWORK BASED ON METHOD OF ATTACK, TECHNOLOGY USED, INCREASE IN ATTACK RATE AND SUCCESS</p>
      <p>RATE 2009 TO 2015
2009
1k
4.7%
800
2010
0.8k
0.5%
300
2011
0.9k
3.8%
700
2012
2k
11.8%
1,800
2013
2.6k
19.7%
3,000
2014</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>R. GUTH</surname>
          </string-name>
          , “
          <article-title>Deriving Intelligence from Big Data in Hadoop: A Big Data Analytics Primer</article-title>
          [Z],” Karmasphere.com,
          <year>2013</year>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>R.</given-names>
            <surname>Magoulas</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.</given-names>
            <surname>Lorica</surname>
          </string-name>
          , “
          <article-title>Big data: Technologies and techniques for large scale data,” Jimmy Gutterman</article-title>
          ,
          <year>Nov 2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>B.</given-names>
            <surname>Fall</surname>
          </string-name>
          , “
          <source>The Theory and Practice of Insurgency and Counterinsurgency”</source>
          , Naval War College Review,
          <volume>17</volume>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J.</given-names>
            <surname>Bughin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Chui</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Manyika</surname>
          </string-name>
          <article-title>“Clouds, big data, and smart assets</article-title>
          ,”
          <source>McKinsey Quarterly</source>
          ,
          <volume>1</volume>
          ,
          <string-name>
            <surname>August</surname>
          </string-name>
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>J.</given-names>
            <surname>Brock</surname>
          </string-name>
          , “
          <article-title>Nigerian Islamist sect claims bomb attack</article-title>
          ,”
          <volume>17</volume>
          (
          <issue>06</issue>
          ),
          <year>2011</year>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Roble</surname>
          </string-name>
          . “
          <string-name>
            <surname>Al-Shabaab Razes</surname>
          </string-name>
          Somali Forests To Finance Jihad,” Terrorism Monitor, vol
          <volume>8</volume>
          ,
          <string-name>
            <surname>issue</surname>
            <given-names>42</given-names>
          </string-name>
          ,
          <year>Nov 2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A.</given-names>
            <surname>Murtada</surname>
          </string-name>
          , “Boko Haram:
          <article-title>Its Beginnings, Principles and</article-title>
          Activities in Nigeria,”May,
          <year>2014</year>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Manyika</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Chui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Brown</surname>
          </string-name>
          , J. Bughin,
          <string-name>
            <given-names>R.</given-names>
            <surname>Dobbs</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Roxburgh</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A. H.</given-names>
            <surname>Byers</surname>
          </string-name>
          , “
          <article-title>Big data: The next frontier for innovation, competition</article-title>
          , and productivity,” May
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>E. G.</given-names>
            <surname>Anderson</surname>
          </string-name>
          , “
          <article-title>A Proof-of-Concept Model for Evaluating Insurgency Management Policies Using the System Dynamics Methodology.” Strategic Insights, vol VI, issue 5</article-title>
          ,
          <year>August 2007</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>