Abstract

The data mining and big data technologies could be of utmost importance to investigate outbound and case datasets in the police records. New findings and useful information may potentially be obtained through data preprocessing and multidimensional modeling. Public security data is a kind of “big data,” having characteristics like large volume, rapid growth, various structures, large-scale storage, low density, and time sensitiveness. In this paper, a police data warehouse is constructed and a public security information analysis system is proposed. The proposed system comprises two modules: (i) case management and (ii) public security information mining. The former is responsible for the collection and processing of case information. The latter preprocesses the data of major cases that have occurred in the past ten years to create a data warehouse. Then, we use the model to create a data warehouse based on needs. By dividing the measurement values and dimensions, the analysis and prediction of criminals’ characteristics and the case environment realize relationships between them. In the process of mining and processing crime data, data mining algorithms can quickly find out the relevant information in the data. Furthermore, the system can find out relevant trends and laws to detect criminal cases faster than other methods. This can reduce the emergence of new crimes and provide a basis for decision-making in the public security department that has practical significance.

Highlights

  • With the accelerated development of modern technologies like communication, computers, and big data, other data mining and security technologies are increasingly used in our daily life, driving us into an information society [1]

  • Research Directions e public security information analysis and mining system is an auxiliary analysis system, which can meet the relevant needs of public security and police affairs, and is a related expansion based on the data mining of case information

  • Is paper starts from the application of data mining technology in police work, combining public security business and rich experience in case handling, to research and design a more common data mining system. e successful establishment of this system means that the investigative thinking of case-handling personnel is broader, and the case can be handled with higher efficiency than the manual system. e practice has proved that, through the technology of data mining, the relevant crime data in the public security information database can be processed and mined, and some related information contained in the data can be quickly found, trends and laws can be found, and cases can be solved as soon as possible

Read more

Summary

Introduction

With the accelerated development of modern technologies like communication, computers, and big data (known as high-tech), other data mining and security technologies are increasingly used in our daily life, driving us into an information society [1]. Is paper studies how to use the data mining technology to analyse the information of criminals and find laws and trends of criminal behavior, which is very important for improving (i) the ability of antiterrorism decision-making, (ii) commanding, and (iii) levels of comprehensive application of online information and (iv) strengthening the construction of a modern public security prevention and control system. Based on the specific characteristics of crime and related security tools, data mining technologies mainly include the following: information sharing and collaboration, intelligent text mining, security association mining, classification and clustering, spatial and temporal crime pattern mining, and we analyzed criminal/terrorist networks in six areas [12]. The research on the use of data mining technology in police work has been for a long time, there are not many related documents, and there are not many related research results. ere are even a lot of relevant data mainly for studying small areas, there is no cooperative relationship between various studies, and the application is mainly realized through some experiments [4]

Analysis of Relevant Technologies for the Public Security Information System
Results
Conclusions and Future Research
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call