

{"id":1064,"date":"2015-09-22T02:00:39","date_gmt":"2015-09-22T06:00:39","guid":{"rendered":"https:\/\/sites.temple.edu\/tudsc\/?p=1064"},"modified":"2020-04-22T15:55:22","modified_gmt":"2020-04-22T19:55:22","slug":"beginning-stages-of-terrain-modeling-jrasing","status":"publish","type":"post","link":"https:\/\/sites.temple.edu\/tudsc\/2015\/09\/22\/beginning-stages-of-terrain-modeling-jrasing\/","title":{"rendered":"Beginning Stages of Terrain Modeling"},"content":{"rendered":"<p>By Joyce Rasing<\/p>\n<p><!--more--><\/p>\n<p>I am interested in violent non-state actors&#8217; (VNSAs) terrorist campaigns whilst linking their mode of attack and target type with the terrain in which the incident occurs. I found inspiration for this project after reading Miles Kahler\u2019s \u201cCollective Action and Clandestine Networks: The Case of Al Qaeda\u201d[1] in Spring 2014. I had decided to narrow the scope in which I work on this project-I looked at the FBI\u2019s Most Wanted Terrorists list and decided to narrow in on a Filipino terrorist group which finds its roots in Islamic fundamentalism. Two[2] out of 28 individuals on <a href=\"https:\/\/www.fbi.gov\/wanted\/wanted_terrorists\">this list<\/a> is outwardly associated with the group I am researching, Abu Sayyaf. Over this semester, you can expect project developments in two areas:<\/p>\n<ol>\n<li>terrain analysis of islands of the southern part\u00a0of the Philippines with the location of Abu Sayyaf events since its inception[3] which delineates their modes of attack and their target types over time<\/li>\n<li>social network analysis after data mining articles archived of these events. I want to find out more information about the individuals that were involved in these campaigns.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>Here are the beginning stages of Part 1 of my project:<\/p>\n<figure id=\"attachment_1066\" aria-describedby=\"caption-attachment-1066\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Philippines.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1066 size-large\" src=\"https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Philippines-1024x580.png\" alt=\"QGIS Philippines-Location of some Abu Sayyaf terrorist attacks.\" width=\"1024\" height=\"580\" srcset=\"https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Philippines.png 1024w, https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Philippines-300x170.png 300w, https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Philippines-700x396.png 700w, https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Philippines-232x131.png 232w, https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Philippines-464x263.png 464w, https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Philippines-624x353.png 624w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption id=\"caption-attachment-1066\" class=\"wp-caption-text\">Figure 1: Geocoded elements of some Abu Sayyaf terrorist attacks in the Philippines ranging from 1994-2014 in QGIS.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>What<\/strong>: What you\u2019re viewing are a few of the 7,000+ islands of the Philippines in their southern region, along with geocoded locations of Abu Sayyaf terrorist attacks by x- and y- coordinates listed from the Global Terrorism Database[4]. These locations will not remain simple points, but are starting indicators of Figure 2 listed below. I am storing the dates in which they occur for a later stage in Part 1 of my project\u00a0in case there are correlations between seasonal attacks, and\/or patterns over the years.<\/p>\n<p><strong>Software Used<\/strong>: QGIS has an OpenLayers plugin and you are viewing the Philippines in Google OpenStreetMap. Also in the picture, streets and municipality shapefiles[5] are\u00a0open on the screen. I plan to work more with this once I can focus on specific clusters of incidents.<\/p>\n<p>&nbsp;<\/p>\n<figure id=\"attachment_1067\" aria-describedby=\"caption-attachment-1067\" style=\"width: 1024px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Contour-DEM.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1067 size-large\" src=\"https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Contour-DEM-1024x552.png\" alt=\"QGIS-Contour-DEMhillshade\" width=\"1024\" height=\"552\" srcset=\"https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Contour-DEM-1024x552.png 1024w, https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Contour-DEM-300x162.png 300w, https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Contour-DEM-700x378.png 700w, https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Contour-DEM-1400x755.png 1400w, https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Contour-DEM-232x125.png 232w, https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Contour-DEM-464x250.png 464w, https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Contour-DEM-624x337.png 624w, https:\/\/sites.temple.edu\/tudsc\/files\/2015\/09\/QGIS-Contour-DEM.png 1559w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><figcaption id=\"caption-attachment-1067\" class=\"wp-caption-text\">Figure 2: You\u2019re looking at an example of the contour lines I formed from Philippines\u2019 DEM data for an island called Panglima-Sugala; also where two Abu Sayyaf attacks occurred.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>What<\/strong>: I grabbed digital elevation model (DEM) data from the CGIAR-CSI <a href=\"http:\/\/srtm.csi.cgiar.org\/\">website <\/a>which is\u00a0SRTM (NASA Shuttle Radar Topography Mission) data, and then will create contour lines to show elevation. This is currently what I am working on, and have exemplified the difference between contour lines and a hillshade effect from DEM\u00a0for visual purposes and the content will be edited in upcoming steps of the project. I am also exploring other raster datasets that use a different type of sensor. As I move forward, I&#8217;ll be able to determine which dataset is the most effective at achieving the end goal.<\/p>\n<p><strong>Software<\/strong>: I have been working back and forth with QGIS and ArcGIS for this terrain.\u00a0I plan to make progress by finishing the building of the contour lines, as well as look for patterns among the attacks listed by the Global Terrorism Database.<\/p>\n<p>&nbsp;<\/p>\n<p>Data:<\/p>\n<p><em>CGIAR-CSI<\/em><\/p>\n<p>Jarvis A., H.I. Reuter, A.\u00a0 Nelson, E. Guevara. (2008). <em>SRTM 90m Digital Elevation Database v4.1<\/em>. (2008).<\/p>\n<p>Retrieved from CGIAR-CSI SRTM 90m Database http:\/\/srtm.csi.cgiar.org.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Global Terrorism Database<\/em><\/p>\n<p>National Consortium for the Study of Terrorism and Responses to Terrorism (START). <em>Global Terrorism <\/em><\/p>\n<p><em>\u00a0 \u00a0 \u00a0 Database 1992-2010 Dataset<\/em> (June 2015). Retrieved from <a href=\"http:\/\/www.start.umd.edu\/gtd\">http:\/\/www.start.umd.edu\/gtd<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>National Consortium for the Study of Terrorism and Responses to Terrorism (START). <em>Global Terrorism <\/em><\/p>\n<p><em>\u00a0 \u00a0 \u00a0 Database 2011-2014 Dataset<\/em> (June 2015). Retrieved from <a href=\"http:\/\/www.start.umd.edu\/gtd\">http:\/\/www.start.umd.edu\/gtd<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><em>PhilGIS<\/em><\/p>\n<p>Tongco, A. F. \u00a0Philippine GIS Data Clearinghouse (PhilGIS).\u00a0<em>Country Boundary (2013).<\/em><\/p>\n<p>Retreived\u00a0from: \u00a0<em>http:\/\/www.philgis.org\/freegisdata.htm.\u00a0<\/em><\/p>\n<p>&#8212;<\/p>\n<p>[1] Kahler, Miles. Collective Action and Clandestine Networks: The Case of Al-Qaeda to <i>Networked Politics: Agency, Power, and Governance<\/i>, 103-24. Cornell<br \/>\nStudies in Political Economy. Ithaca, NY: Cornell University Press, 2009.<\/p>\n<p>[2] I.T. Hapilon and R. Sahiron.<\/p>\n<p>[3] There will be plenty of limitations based on the data that I use. As of September 17, 2015, I am only using one data source until I can find more and\/or credible databases eligible for use, or gather enough information to add to the map.<\/p>\n<p>[4] The Global Terrorism Database (GTD) remains the only credible source of information that I&#8217;m using to map the locations of these attacks.<\/p>\n<p>[5] The cons of the shapefiles and DEM data that I am using is that they are outdated by a few years. I am on the quest for updated and free data files that I can use for my project, however, it is not exactly my top priority until I analyze the importance of the terrorist campaigns.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Joyce Rasing<\/p>\n","protected":false},"author":7796,"featured_media":1067,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,406],"tags":[92,85,90,93],"class_list":["post-1064","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-grad-students","category-maps-gis","tag-mapping","tag-qgis","tag-terrain-modeling","tag-terrorism-research"],"_links":{"self":[{"href":"https:\/\/sites.temple.edu\/tudsc\/wp-json\/wp\/v2\/posts\/1064","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sites.temple.edu\/tudsc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.temple.edu\/tudsc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/tudsc\/wp-json\/wp\/v2\/users\/7796"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/tudsc\/wp-json\/wp\/v2\/comments?post=1064"}],"version-history":[{"count":0,"href":"https:\/\/sites.temple.edu\/tudsc\/wp-json\/wp\/v2\/posts\/1064\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.temple.edu\/tudsc\/wp-json\/wp\/v2\/media\/1067"}],"wp:attachment":[{"href":"https:\/\/sites.temple.edu\/tudsc\/wp-json\/wp\/v2\/media?parent=1064"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.temple.edu\/tudsc\/wp-json\/wp\/v2\/categories?post=1064"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.temple.edu\/tudsc\/wp-json\/wp\/v2\/tags?post=1064"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}