Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/saro0307/exploratory-data-analysis-terrorism
Phase 1 of Data Science project (program) to perform Exploratory Data Analysis on Terrorism using Python On Google Colab for Coderscave Internship sept 2023
https://github.com/saro0307/exploratory-data-analysis-terrorism
colaboratory data-science machine-learning python
Last synced: about 2 months ago
JSON representation
Phase 1 of Data Science project (program) to perform Exploratory Data Analysis on Terrorism using Python On Google Colab for Coderscave Internship sept 2023
- Host: GitHub
- URL: https://github.com/saro0307/exploratory-data-analysis-terrorism
- Owner: saro0307
- License: mit
- Created: 2023-09-15T11:47:41.000Z (over 1 year ago)
- Default Branch: main
- Last Pushed: 2023-09-18T06:19:33.000Z (over 1 year ago)
- Last Synced: 2023-09-18T07:32:45.768Z (over 1 year ago)
- Topics: colaboratory, data-science, machine-learning, python
- Language: Jupyter Notebook
- Homepage:
- Size: 180 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Terrorism Data EDA
Welcome to the Exploratory Data Analysis (EDA) program focused on terrorism data.
## Introduction
This repository is a resource for data enthusiasts interested in exploring and analyzing terrorism-related datasets.
## Dataset
We primarily use the Global Terrorism Database (GTD), an open-source database containing information on worldwide terrorist attacks. Download it from [Global Terrorism Database](https://www.start.umd.edu/gtd/).
## Getting Started
1. Clone this repo.
2. Install required Python libraries (`pip install -r requirements.txt`).
3. make sure to import dataset to your local IDE
4. Open a Jupyter Notebook or your preferred IDE to start exploring the data.## EDA
Explore and analyze the terrorism dataset with provided Jupyter Notebooks and Python scripts. Covering data loading, visualization, temporal trends, geographical patterns, actors, and attack methods.
## Contributing
Fork, make changes, and create pull requests to enhance this resource. Collaborate and improve the analysis.
## License
This program is provided under the MIT License. Feel free to use, modify, and share, with proper attribution and adherence to the license terms.
Happy analyzing!