Skip to main content
Fig. 1 | Applied Network Science

Fig. 1

From: Uncovering the internal structure of Boko Haram through its mobility patterns

Fig. 1

Schematic representation of the methodology. Events are analysed in sequential order and a unique Boko Haram cell is assigned to each one. For each event, the algorithm decides if an existing cell is involved in the attack or if a new (or not previously identified cell) is responsible. In the figure, an event took place during the first day, which means that a cell is created. The location of that event is its last known location and the date of the event is its last known date. The potential location of that cell increases each day according to its daily speed, . After a few days (four in the example) a cell has reached the maximum distance between consecutive events and so it is assumed that it remains within that region (in the example, μ = 4 ν). Then, during days 2 and 4, there is no cell nearby who could have been involved in the new events and so new cells are identified. During day 4, there is an event for which an existing cell is potentially responsible, so its last known location and date are updated

Back to article page