犯罪行为分析用于嫌疑车辆侦查

Ubon Thongsatapornwatana, W. Lilakiatsakun, Akkarach Kawbunjun, Tossapon Boongoen
{"title":"犯罪行为分析用于嫌疑车辆侦查","authors":"Ubon Thongsatapornwatana, W. Lilakiatsakun, Akkarach Kawbunjun, Tossapon Boongoen","doi":"10.1109/ICDIM.2017.8244645","DOIUrl":null,"url":null,"abstract":"The crime problems become critical issues for national security especially the security of border and intelligent transportation systems (ITSs). These affect the economy, investment, tourism, and society. As a result, the automatic suspect vehicle detection emerges as one of effective tools to tackle the problems. However, the traditional process normally uses criminal vehicle data in blacklist comparing with vehicle data gathering from various sensors. This comparison is not effective and accurate that might be from not up-to-date data in the blacklist. Sometimes the blacklist is not available. This paper proposes the criminal behavior analysis method to detect suspect vehicles that are potentially involved in criminal activity. It must not rely on the blacklist. The analysis is conditional on journey path and the involvement of criminal activities. In additional, public officials believe that the suspect vehicle will choose the journey path without a checkpoint. Therefore, we used the journey path analysis techniques together with the association rule mining to analyze such criminal behavior. From extensive experiments, the results show that the proposed method can increase the suspect detection accuracy rate 17.24% beyond the traditional counterpart.","PeriodicalId":144953,"journal":{"name":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Analysis of criminal behaviors for suspect vehicle detection\",\"authors\":\"Ubon Thongsatapornwatana, W. Lilakiatsakun, Akkarach Kawbunjun, Tossapon Boongoen\",\"doi\":\"10.1109/ICDIM.2017.8244645\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The crime problems become critical issues for national security especially the security of border and intelligent transportation systems (ITSs). These affect the economy, investment, tourism, and society. As a result, the automatic suspect vehicle detection emerges as one of effective tools to tackle the problems. However, the traditional process normally uses criminal vehicle data in blacklist comparing with vehicle data gathering from various sensors. This comparison is not effective and accurate that might be from not up-to-date data in the blacklist. Sometimes the blacklist is not available. This paper proposes the criminal behavior analysis method to detect suspect vehicles that are potentially involved in criminal activity. It must not rely on the blacklist. The analysis is conditional on journey path and the involvement of criminal activities. In additional, public officials believe that the suspect vehicle will choose the journey path without a checkpoint. Therefore, we used the journey path analysis techniques together with the association rule mining to analyze such criminal behavior. From extensive experiments, the results show that the proposed method can increase the suspect detection accuracy rate 17.24% beyond the traditional counterpart.\",\"PeriodicalId\":144953,\"journal\":{\"name\":\"2017 Twelfth International Conference on Digital Information Management (ICDIM)\",\"volume\":\"56 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Twelfth International Conference on Digital Information Management (ICDIM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICDIM.2017.8244645\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Twelfth International Conference on Digital Information Management (ICDIM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICDIM.2017.8244645","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

犯罪问题已成为国家安全特别是边境安全、智能交通系统安全的重要问题。这些影响着经济、投资、旅游和社会。因此,可疑车辆自动检测成为解决这一问题的有效工具之一。然而,与各种传感器采集的车辆数据相比,传统的方法通常使用黑名单中的犯罪车辆数据。这种比较不是有效和准确的,可能来自黑名单中不是最新的数据。有时黑名单是不可用的。本文提出了一种犯罪行为分析方法,用于检测可能参与犯罪活动的可疑车辆。它不能依赖于黑名单。分析的条件是旅程路径和犯罪活动的参与。另外,警方认为,嫌疑车辆会选择没有检查站的行驶路线。因此,我们将旅程路径分析技术与关联规则挖掘相结合,对此类犯罪行为进行分析。大量的实验结果表明,该方法比传统方法的嫌疑犯检测准确率提高了17.24%。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Analysis of criminal behaviors for suspect vehicle detection
The crime problems become critical issues for national security especially the security of border and intelligent transportation systems (ITSs). These affect the economy, investment, tourism, and society. As a result, the automatic suspect vehicle detection emerges as one of effective tools to tackle the problems. However, the traditional process normally uses criminal vehicle data in blacklist comparing with vehicle data gathering from various sensors. This comparison is not effective and accurate that might be from not up-to-date data in the blacklist. Sometimes the blacklist is not available. This paper proposes the criminal behavior analysis method to detect suspect vehicles that are potentially involved in criminal activity. It must not rely on the blacklist. The analysis is conditional on journey path and the involvement of criminal activities. In additional, public officials believe that the suspect vehicle will choose the journey path without a checkpoint. Therefore, we used the journey path analysis techniques together with the association rule mining to analyze such criminal behavior. From extensive experiments, the results show that the proposed method can increase the suspect detection accuracy rate 17.24% beyond the traditional counterpart.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信