website statistics

Researchers have developed an algorithm that can predict the probability of future insurgent attacks using the data from Wikileaks.
1 Star2 Stars3 Stars4 Stars5 Stars (Rate This)
Loading...

Wikileaks has long been eyed as something that is dangerous and undesirable by the authorities, especially in US. However, the data divulged by Wikileaks is now being put to a use that may change this opinion in Washington. Researchers are using the leaked data on Wikileakes to predict the rise in insurgency in different Afghan regions.


Modelling of the Afghan War

This has now been reported in Proceedings of the National Academy of Sciences. In the study undertaken by the researchers, 77,000 logs from the Afghan War Diary were analyzed. These logs were released by Wikileaks on July 25, 2010. The logs contain information about the insurgencies that occurred during 2004 and 2009.

With the help of this huge sample size, researchers have been able to come up with an algorithm that can predict future insurgencies. The algorithm takes into account the ‘volatility’ of a region to accurately predict future insurgencies. If the volatility of a region is high, it becomes hard to accurately predict future incidents. However, if the volatility is low, the algorithm is able to predict future events quite accurately.

For instance, the Baghlan province in Afghanistan is not too volatile. In 2009, 100 insurgent incidents were reported in the province. Based on the algorithm, the researchers predicted that in 2010, this number would rise to 228. The actual number of insurgent events that occurred in 2010 were 222. That is very close to the predicted number, showing how accurate the algorithm is.

But, don’t hold your breath thinking the hawks in Washington will open up towards the whole concept of such data leaks and begin to tolerate them, because of its new found usefulness.

Source: PNAS

Courtesy: The Verge

Buy Cheapest Related Product From Amazon.com


Aegis Parka – A Pollution Resistant Jacket For You

Samsung MV900F – New Camera With Wi-Fi, Gesture Control
You can also press the left/right arrow key on your keyboard to go to previous/next post
  On July 19, 2012(4 years, 0 months ago.)

You May Also Like:

What Do You Think?

1 Response

  1. Minka Ross Says:

    The volatility is low, the algorithm is able to predict future events quite accurately.

    http://www.appster.com.au/

    Posted on July 20th, 2012 at 1:10 PM

Leave a Reply




Loading Facebook Comments ...

FTC Disclosure: Some of the links of this website are "affiliate links." This means if you click on the link and purchase the item, we will receive an affiliate commission.


Recent Search

Recent Tutorials

If you are trying to jailbreak iPhone, iPad or iPod on iOS 9.2 - 9.3.3 without using a computer or Apple ID, then check this video tutorial.
Pokemon Go users are complaining about the crashing and server issues. Check out the tutorial to solve error problems and thanks us later.
Turning off Wi-Fi Assist is a great way to save mobile data since it automatically starts using cellular data when Wi-Fi signal is poor .
If you want to secure your SIM card from others using it, then check out this tutorial to know how to set up the SIM Pin code on your iPhone.
CiderTV is a great alternative to control Apple TV from the Notification Center. Check out this tutorial to set up CiderTV on your iPhone.
Are you annoyed by the split screen mode on the iPhone 6 Plus or 6s Plus? Check out this quick tutorial to turn off split screen feature.
If you could not wait to installed the iOS 10 beta version on you iPhone and now struggling for the errors, then this tutorial is for you.
Siri might not understand the question you asked. But you can use Siri by editing the text that you asked & it will give an updated answer.
Perhaps, you are new Apple user and you might have no idea how to change name of your iPhone. Check out this tutorial to change the name.
Check out this tutorial to lock Android phone using PIN code, Password or Pattern. Following the easy steps, you can secure your smartphone.
Close You Have To Login
User:
Pass:
Login With »Login With TwitterLogin With Facebook