首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Leveraging supervised learning methods is vital for predictive analysis of crime data, however, because of the complex dependencies of crime behavioral variables, classifying behavioral crime profiles is considered to be a demanding task. This paper presents two classifiers for matching single-offender crimes of the type: Burglary from Dwelling Houses (BDH). The first classifier, Multiclass MLP Crime Classifier (M2C2), leverages a multiclass topology to become capable of matching nonprolific offenders in addition to prolific offenders. This method will be useful for matching crimes to several local offenders in a particular district, and it is not suitable for classifying a large number of offenders. Contrarily, the second method, Ensemble Neural Network Crime Classifier (EN2C2), focuses on automating decision-making processes for crime matching through exploiting expert classifiers’ outputs in a bagging ensemble approach. As demonstrated by evaluative experiments, M2C2 is an efficient approach for classifying small numbers of nonprolific and prolific offenders. The proposed method's performance was proved when compared with other common machine learning techniques.  相似文献   

2.

Crime forecasting has been one of the most complex challenges in law enforcement today, especially when an analysis tends to evaluate inferable and expanded crime rates, although a few methodologies for subsequent equivalents have been embraced before. In this work, we use a strategy for a time series model and machine testing systems for crime estimation. The paper centers on determining the quantity of crimes. Considering various experimental analyses, this investigation additionally features results obtained from a neural system that could be a significant alternative to machine learning and ordinary stochastic techniques. In this paper, we applied various techniques to forecast the number of possible crimes in the next 5 years. First, we used the existing machine learning techniques to predict the number of crimes. Second, we proposed two approaches, a modified autoregressive integrated moving average model and a modified artificial neural network model. The prime objective of this work is to compare the applicability of a univariate time series model against that of a variate time series model for crime forecasting. More than two million datasets are trained and tested. After rigorous experimental results and analysis are generated, the paper concludes that using a variate time series model yields better forecasting results than the predicted values from existing techniques. These results show that the proposed method outperforms existing methods.

  相似文献   

3.
With the availability of a wide range of Evolutionary Algorithms such as Genetic Algorithms, Evolutionary Programming, Evolutionary Strategies and Differential Evolution, every conceivable aspect of the design of a fuzzy logic controller has been optimized and automated. Although there is no doubt that these automated techniques can produce an optimal fuzzy logic controller, the structure of such a controller is often obscure and in many cases these optimizations are simply not needed. We believe that the automatic design of a fuzzy logic controller can be simplified by using a generic rule base such as the MacVicar-Whelan rule base and using an evolutionary algorithm to optimize only the membership functions of the fuzzy sets. Furthermore, by restricting the overlapping of fuzzy sets, using triangular membership functions and singletons, and reducing the number of parameters to represent the membership functions, the design can be further simplified. This paper describes this method of simplifying the design and some experiments performed to ascertain its validity.  相似文献   

4.
The effectiveness of CCTV and improved street lighting has been studied extensively in terms of their potential for reducing the number of crimes in a certain area. However, this does not take into account the cost of the interventions or the savings due to crime reduction. This paper presents a model, which takes the form of a cellular automaton to simulate the implementation of improved street lighting and CCTV cameras using a range of strategies. This permits an exploration of simulated options to find which is most cost effective and what the best strategy for implementation is. The results indicate that there are few situations where CCTV is more cost effective than improved street lighting as a way of reducing street crime. In addition, it is shown that the strategy of targeting locations with the highest crime rates, “hot spots”, has the greatest potential for maximising the cost effectiveness of interventions.  相似文献   

5.
The Internet of Things is arriving to our homes or cities through fields already known like Smart Homes, Smart Cities, or Smart Towns. The monitoring of environmental conditions of cities can help to adapt the indoor locations of the cities in order to be more comfortable for people who stay there. A way to improve the indoor conditions is an efficient temperature control, however, it depends on many factors like the different combinations of outdoor temperature and humidity. Therefore, adjusting the indoor temperature is not setting a value according to other value. There are many more factors to take into consideration, hence the traditional logic based in binary states cannot be used. Many problems cannot be solved with a set of binary solutions and we need a new way of development. Fuzzy logic is able to interpret many states, more than two states, giving to computers the capacity to react in a similar way to people. In this paper we will propose a new approach to control the temperature using the Internet of Things together its platforms and fuzzy logic regarding not only the indoor temperature but also the outdoor temperature and humidity in order to save energy and to set a more comfortable environment for their users. Finally, we will conclude that the fuzzy approach allows us to achieve an energy saving around 40% and thus, save money.  相似文献   

6.
This paper considers the lag synchronization (LS) issue of unknown coupled chaotic delayed Yang–Yang-type fuzzy neural networks (YYFCNN) with noise perturbation. Separate research work has been published on the stability of fuzzy neural network and LS issue of unknown coupled chaotic neural networks, as well as its application in secure communication. However, there have not been any studies that integrate the two. Motivated by the achievements from both fields, we explored the benefits of integrating fuzzy logic theories into the study of LS problems and applied the findings to secure communication. Based on adaptive feedback control techniques and suitable parameter identification, several sufficient conditions are developed to guarantee the LS of coupled chaotic delayed YYFCNN with or without noise perturbation. The problem studied in this paper is more general in many aspects. Various problems studied extensively in the literature can be treated as special cases of the findings of this paper, such as complete synchronization (CS), effect of fuzzy logic, and noise perturbation. This paper presents an illustrative example and uses simulated results of this example to show the feasibility and effectiveness of the proposed adaptive scheme. This research also demonstrates the effectiveness of application of the proposed adaptive feedback scheme in secure communication by comparing chaotic masking with fuzziness with some previous studies. Chaotic signal with fuzziness is more complex, which makes unmasking more difficult due to the added fuzzy logic.   相似文献   

7.
Despite many years of research, correct and reliable segmentation of touching characters is still a hard task to solve. In the recent years, many methods and algorithms have been proposed; nevertheless the problem is still open. In this paper, we propose a novel method based on fuzzy logic that combines three different techniques to segment touching characters. These techniques have already been used in other studies but they have never been used all together. We propose a 3–input/1–output fuzzy inference system with fuzzy rules that are specifically optimized to segment touching Latin characters. The method is applicable to both printed and handwritten characters. We discuss the performances of our method by comparing it with state of the art. Results show that our method provide a better accuracy to segment characters even with noisy touching characters.  相似文献   

8.
Crime risk prediction is helpful for urban safety and citizens’life quality.However,existing crime studies focused on coarse-grained prediction,and usually failed to capture the dynamics of urban crimes.The key challenge is data sparsity,since that 1)not all crimes have been recorded,and 2)crimes usually occur with low frequency.In this paper,we propose an effective framework to predict fine-grained and dynamic crime risks in each road using heterogeneous urban data.First,to address the issue of unreported crimes,we propose a cross-aggregation soft-impute(CASI)method to deal with possible unreported crimes.Then,we use a novel crime risk measurement to capture the crime dynamics from the perspective of influence propagation,taking into consideration of both time-varying and location-varying risk propagation.Based on the dynamically calculated crime risks,we design contextual features(i.e.,POI distributions,taxi mobility,demographic features)from various urban data sources,and propose a zero-inflated negative binomial regression(ZINBR)model to predict future crime risks in roads.The experiments using the real-world data from New York City show that our framework can accurately predict road crime risks,and outperform other baseline methods.  相似文献   

9.
The data mining field in computer science specializes in extracting implicit information that is distributed across the stored data records and/or exists as associations among groups of records. Criminal databases contain information on the crimes themselves, the offenders, the victims as well as the vehicles that were involved in the crime. Among these records lie groups of crimes that can be attributed to serial criminals who are responsible for multiple criminal offenses and usually exhibit patterns in their operations, by specializing in a particular crime category (i.e., rape, murder, robbery, etc.), and applying a specific method for implementing their crimes. Discovering serial criminal patterns in crime databases is, in general, a clustering activity in the area of data mining that is concerned with detecting trends in the data by classifying and grouping similar records. In this paper, we report on the different statistical and neural network approaches to the clustering problem in data mining in general, and as it applies to our crime domain in particular. We discuss our approach of using a cascaded network of Kohonen neural networks followed by heuristic processing of the networks outputs that best simulated the experts in the field. We address the issues in this project and the reasoning behind this approach, including: the choice of neural networks, in general, over statistical algorithms as the main tool, and the use of Kohonen networks in particular, the choice for the cascaded approach instead of the direct approach, and the choice of a heuristics subsystem as a back-end subsystem to the neural networks. We also report on the advantages of this approach over both the traditional approach of using a single neural network to accommodate all the attributes, and that of applying a single clustering algorithm on all the data attributes.  相似文献   

10.
According to the Swedish National Council for Crime Prevention, law enforcement agencies solved approximately three to five percent of the reported residential burglaries in 2012. Internationally, studies suggest that a large proportion of crimes are committed by a minority of offenders. Law enforcement agencies, consequently, are required to detect series of crimes, or linked crimes. Comparison of crime reports today is difficult as no systematic or structured way of reporting crimes exists, and no ability to search multiple crime reports exist.This study presents a systematic data collection method for residential burglaries. A decision support system for comparing and analysing residential burglaries is also presented. The decision support system consists of an advanced search tool and a plugin-based analytical framework. In order to find similar crimes, law enforcement officers have to review a large amount of crimes. The potential use of the cut-clustering algorithm to group crimes to reduce the amount of crimes to review for residential burglary analysis based on characteristics is investigated. The characteristics used are modus operandi, residential characteristics, stolen goods, spatial similarity, or temporal similarity.Clustering quality is measured using the modularity index and accuracy is measured using the rand index. The clustering solution with the best quality performance score were residential characteristics, spatial proximity, and modus operandi, suggesting that the choice of which characteristic to use when grouping crimes can positively affect the end result. The results suggest that a high quality clustering solution performs significantly better than a random guesser. In terms of practical significance, the presented clustering approach is capable of reduce the amounts of cases to review while keeping most connected cases. While the approach might miss some connections, it is also capable of suggesting new connections. The results also suggest that while crime series clustering is feasible, further investigation is needed.  相似文献   

11.
The topology design of switched enterprise networks (SENs) is a hard constrained combinatorial optimization problem. The problem consists of deciding the number, types, and locations of the network active elements (hubs, switches, and routers), as well as the links and their capacities. Several conflicting objectives such as monetary cost, network delay, and maximum number of hops have to be optimized to achieve a desirable solution. Further, many of the desirable features of a network topology can best be expressed in linguistic terms, which is the basis of fuzzy logic. In this paper, we present an approach based on Simulated Evolution algorithm for the design of SEN topology. The overall cost function has been developed using fuzzy logic. Several variants of the algorithm are proposed and compared together via simulation and experimental results are provided.  相似文献   

12.
In this paper, navigation techniques for several mobile robots as many as one thousand robots using fuzzy logic are investigated in a totally unknown environment. Fuzzy logic controllers (FLC) using different membership functions are developed and used to navigate mobile robots. First a fuzzy controller has been used with four types of input members, two types of output members and three parameters each. Next two types of fuzzy controllers have been developed having same input members and output members with five parameters each. Each robot has an array of ultrasonic sensors for measuring the distances of obstacles around it and an infrared sensor for detecting the bearing of the target. These techniques have been demonstrated in various exercises, which depicts that the robots are able to avoid obstacles as well as negotiate the dead ends and reach the targets efficiently. Amongst the techniques developed, FLC having Gaussian membership function is found to be most efficient for mobile robots navigation.  相似文献   

13.
Knowledge representation in fuzzy logic   总被引:3,自引:0,他引:3  
The author presents a summary of the basic concepts and techniques underlying the application of fuzzy logic to knowledge representation. He then describes a number of examples relating to its use as a computational system for dealing with uncertainty and imprecision in the context of knowledge, meaning, and inference. It is noted that one of the basic aims of fuzzy logic is to provide a computational framework for knowledge representation and inference in an environment of uncertainty and imprecision. In such environments, fuzzy logic is effective when the solutions need not be precise and/or it is acceptable for a conclusion to have a dispositional rather than categorical validity. The importance of fuzzy logic derives from the fact that there are many real-world applications which fit these conditions, especially in the realm of knowledge-based systems for decision-making and control  相似文献   

14.
Metaheuristic optimization algorithms have become a popular choice for solving complex problems which are otherwise difficult to solve by traditional methods. However, these methods have the problem of the parameter adaptation and many researchers have proposed modifications using fuzzy logic to solve this problem and obtain better results than the original methods. In this study a comprehensive review is made of the optimization techniques in which fuzzy logic is used to dynamically adapt some important parameters in these methods. In this paper, the survey mainly covers the optimization methods of Particle Swarm Optimization (PSO), Gravitational Search Algorithm (GSA), and Ant Colony Optimization (ACO), which in the last years have been used with fuzzy logic to improve the performance of the optimization methods.  相似文献   

15.
Self-reference and chaos in fuzzy logic   总被引:2,自引:0,他引:2  
Investigates a range of phenomena from dynamical systems or chaos theory which appear in a simple fuzzy logic with the introduction of self-reference. Within that logic, self-referential sentences exhibit properties of fixed point attractors, fixed point repellers, and full chaos on the [0,1] interval. Strange attractors and fractals appear in two dimensions in the graphing of pairs of mutually referential sentences and in three dimensions in the graphing of mutually referential triples  相似文献   

16.
Crime is a complex social issue impacting a considerable number of individuals within a society. Preventing and reducing crime is a top priority in many countries. Given limited policing and crime reduction resources, it is often crucial to identify effective strategies to deploy the available resources. Towards this goal, crime hotspot prediction has previously been suggested. Crime hotspot prediction leverages past data in order to identify geographical areas susceptible of hosting crimes in the future. However, most of the existing techniques in crime hotspot prediction solely use historical crime records to identify crime hotspots, while ignoring the predictive power of other data such as urban or social media data. In this paper, we propose CrimeTelescope, a platform that predicts and visualizes crime hotspots based on a fusion of different data types. Our platform continuously collects crime data as well as urban and social media data on the Web. It then extracts key features from the collected data based on both statistical and linguistic analysis. Finally, it identifies crime hotspots by leveraging the extracted features, and offers visualizations of the hotspots on an interactive map. Based on real-world data collected from New York City, we show that combining different types of data can effectively improve the crime hotspot prediction accuracy (by up to 5.2%), compared to classical approaches based on historical crime records only. In addition, we demonstrate the usability of our platform through a System Usability Scale (SUS) survey on a full prototype of CrimeTelescope.  相似文献   

17.
Offshore software development has been identified as one of the most striking manifestations of contemporary globalisation and as evidence of placelessness, the idea that information and communication technologies have rendered location irrelevant. Research in the International Business and Information Systems fields, in contrast, has suggested that all locations are not equal and has identified a number of characteristics that may influence the attractiveness of a location for multinational investment and offshoring, respectively. These literatures, however, focus almost exclusively on quantitative, economic characteristics that are seen as fixed and applying uniformly throughout a whole country. They therefore offer little guidance on the suitability of particular locations as offshoring destinations, especially in countries without a track record in offshore software development. Drawing on two cases of nearshore software development centres set up by offshore service providers in the Caribbean, this paper illustrates that, while the initial decision to establish the ventures reflected a logic of placelessness, characteristics of these particular locations affected their subsequent success. Through the findings, we therefore develop a typology of espoused, unanticipated and remediable locational characteristics, which illustrates that locational attractiveness may vary significantly within countries and that offshore service providers and government agencies can modify locational characteristics to their advantage.  相似文献   

18.
Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information, as highlighted in this paper. We describe how the Routine Activity Theory can be applied to mitigate these risks by reducing the opportunities for cyber crime to occur, making cyber crime more difficult to commit and by increasing the risks of detection and punishment associated with committing cyber crime. Potential research questions are also identified.  相似文献   

19.
It is known that aesthetically pleasing works of art, music, etc. contain a ratio known as the golden proportion. There have been many attempts to understand why this ratio is pleasing; however, there is no convincing and universally accepted explanation. In this article, we provide an explanation based on fuzzy logic. © 1997 John Wiley & Sons, Inc.  相似文献   

20.
数字取证技术已经成为信息安全领域研究热点之一。本文首先分析了数字取证的定义以及数字证据的特性。然后从取证过程模型、取证分析技术以及取证产品、标准和法规方面重点阐述了数字取证技术的研究现状,讨论了数字取证分析技术的分类方法以及文件雕刻取证分析技术。分析了数字取证领域中存在的难点问题,探讨了数字取证技术研究的发展趋势。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号