A computational intelligent approach to multi-factor analysis of violent crime information system

被引:2
|
作者
Liu, Hongbo [1 ,2 ,3 ]
Yang, Chao [1 ,2 ]
Zhang, Meng [1 ]
McLoone, Sean [4 ]
Sun, Yeqing [1 ]
机构
[1] Dalian Maritime Univ, Inst Environm Syst Biol, Dalian, Peoples R China
[2] Dalian Maritime Univ, Sch Sci & Technol, Dalian, Peoples R China
[3] Univ Calif San Diego, Inst Neural Computat, La Jolla, CA 92093 USA
[4] Queens Univ Belfast, Sch Elect Elect Engn & Comp Sci, Belfast, Antrim, North Ireland
基金
中国国家自然科学基金;
关键词
computational intelligence; rough set; fuzzy system; swarm optimisation; genetic algorithm; dynamic reducts; multi-factor analysis; violent crime; information system; PARTICLE SWARM; MAOA-GENOTYPE; ROUGH; REDUCTION; POLYMORPHISM; ALGORITHM; FRAMEWORK; EDUCATION; PREDICTS; BEHAVIOR;
D O I
10.1080/17517575.2014.986216
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Various scientific studies have explored the causes of violent behaviour from different perspectives, with psychological tests, in particular, applied to the analysis of crime factors. The relationship between bi-factors has also been extensively studied including the link between age and crime. In reality, many factors interact to contribute to criminal behaviour and as such there is a need to have a greater level of insight into its complex nature. In this article we analyse violent crime information systems containing data on psychological, environmental and genetic factors. Our approach combines elements of rough set theory with fuzzy logic and particle swarm optimisation to yield an algorithm and methodology that can effectively extract multi-knowledge from information systems. The experimental results show that our approach outperforms alternative genetic algorithm and dynamic reduct-based techniques for reduct identification and has the added advantage of identifying multiple reducts and hence multi-knowledge (rules). Identified rules are consistent with classical statistical analysis of violent crime data and also reveal new insights into the interaction between several factors. As such, the results are helpful in improving our understanding of the factors contributing to violent crime and in highlighting the existence of hidden and intangible relationships between crime factors.
引用
收藏
页码:161 / 184
页数:24
相关论文
共 50 条
  • [1] Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security
    Saqib, Rashad Mahmood
    Khan, Adnan Shahid
    Javed, Yasir
    Ahmad, Shakil
    Nisar, Kashif
    Abbasi, Irshad A.
    Haque, Muhammad Reazul
    Julaihi, Azlina Ahmadi
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 32 (03): : 1633 - 1647
  • [2] A Scalable Multi-factor Fault Analysis Framework for Information Systems
    Phan-Vu, H-H
    Jaumard, B.
    Glatard, T.
    Whatley, J.
    Nadeau, S.
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 2621 - 2630
  • [3] Multi-factor indicator of THIC intelligent lighting system with BP neural network
    Longqing Zhang
    Liping Bai
    Xinwei Zhang
    Lei Yang
    Liwei Tian
    Yanghong Zhang
    The Journal of Supercomputing, 2022, 78 : 10757 - 10771
  • [4] Multi-factor indicator of THIC intelligent lighting system with BP neural network
    Zhang, Longqing
    Bai, Liping
    Zhang, Xinwei
    Yang, Lei
    Tian, Liwei
    Zhang, Yanghong
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (08): : 10757 - 10771
  • [5] An Intelligent Mechanism to Detect Multi-Factor Skin Cancer
    Abdullah
    Siddique, Ansar
    Shaukat, Kamran
    Jan, Tony
    DIAGNOSTICS, 2024, 14 (13)
  • [6] Intelligence Evaluating Computational Power: A Multi-Factor Method
    Huang, Yuhuan
    Li, Hang
    Lu, Dongdong
    Zhang, Zhe
    Tie, Wenjie
    IEEE ACCESS, 2025, 13 : 27398 - 27415
  • [7] Advances in violent crime analysis and law enforcement: The Canadian violent crime linkage analysis system
    Collins, PI
    Johnson, GF
    Choy, A
    Davidson, KT
    MacKay, RE
    JOURNAL OF GOVERNMENT INFORMATION, 1998, 25 (03): : 277 - 284
  • [8] A Lightweight PUF based Multi-factor Authentication Technique for Intelligent Smart Healthcare System
    Chaudhary, Ravi Raushan Kumar
    Chatterjee, Kakali
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (04) : 1975 - 1992
  • [9] COMPUTATIONAL RESULTS IN SELECTING MULTI-FACTOR EXPERIMENTAL ARRANGEMENTS
    NEUHARDT, JB
    BRADLEY, HE
    HENNING, RW
    JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 1973, 68 (343) : 608 - 611
  • [10] MULTI-FACTOR ADMISSIONS PREDICTIVE SYSTEM
    WEISS, KP
    COLLEGE AND UNIVERSITY, 1970, 45 (02): : 203 - 210