A computational intelligent approach to multi-factor analysis of violent crime information system

被引:2
|
作者
Liu, Hongbo [1 ,2 ,3 ]
Yang, Chao [1 ,2 ]
Zhang, Meng [1 ]
McLoone, Sean [4 ]
Sun, Yeqing [1 ]
机构
[1] Dalian Maritime Univ, Inst Environm Syst Biol, Dalian, Peoples R China
[2] Dalian Maritime Univ, Sch Sci & Technol, Dalian, Peoples R China
[3] Univ Calif San Diego, Inst Neural Computat, La Jolla, CA 92093 USA
[4] Queens Univ Belfast, Sch Elect Elect Engn & Comp Sci, Belfast, Antrim, North Ireland
基金
中国国家自然科学基金;
关键词
computational intelligence; rough set; fuzzy system; swarm optimisation; genetic algorithm; dynamic reducts; multi-factor analysis; violent crime; information system; PARTICLE SWARM; MAOA-GENOTYPE; ROUGH; REDUCTION; POLYMORPHISM; ALGORITHM; FRAMEWORK; EDUCATION; PREDICTS; BEHAVIOR;
D O I
10.1080/17517575.2014.986216
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Various scientific studies have explored the causes of violent behaviour from different perspectives, with psychological tests, in particular, applied to the analysis of crime factors. The relationship between bi-factors has also been extensively studied including the link between age and crime. In reality, many factors interact to contribute to criminal behaviour and as such there is a need to have a greater level of insight into its complex nature. In this article we analyse violent crime information systems containing data on psychological, environmental and genetic factors. Our approach combines elements of rough set theory with fuzzy logic and particle swarm optimisation to yield an algorithm and methodology that can effectively extract multi-knowledge from information systems. The experimental results show that our approach outperforms alternative genetic algorithm and dynamic reduct-based techniques for reduct identification and has the added advantage of identifying multiple reducts and hence multi-knowledge (rules). Identified rules are consistent with classical statistical analysis of violent crime data and also reveal new insights into the interaction between several factors. As such, the results are helpful in improving our understanding of the factors contributing to violent crime and in highlighting the existence of hidden and intangible relationships between crime factors.
引用
收藏
页码:161 / 184
页数:24
相关论文
共 50 条
  • [31] Multi-factor menu analysis using data envelopment analysis
    Taylor, Jim
    Reynolds, Dennis
    Brown, Denise M.
    INTERNATIONAL JOURNAL OF CONTEMPORARY HOSPITALITY MANAGEMENT, 2009, 21 (02) : 213 - 225
  • [32] Multi-Factor Challenge/Response Approach for Remote Biometric Authentication
    Al-Assam, Hisham
    Jassim, Sabah
    MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2011, 2011, 8063
  • [33] Nonlinear Vibration Analysis of Helical Face-Gear Transmission System with Multi-Factor
    Liu Bo
    Zhao Jiangang
    Qian Jianhua
    Wang Xiaoyu
    2016 3RD INTERNATIONAL CONFERENCE ON MECHANICS AND MECHATRONICS RESEARCH (ICMMR 2016), 2016, 77
  • [34] Multi-factor approach to investment attractiveness assessment of urban spaces
    Khrulkov, Aleksandr
    Mityagin, Sergey A.
    Repkin, Aleksandr, I
    9TH INTERNATIONAL YOUNG SCIENTISTS CONFERENCE IN COMPUTATIONAL SCIENCE, YSC2020, 2020, 178 : 94 - 102
  • [35] A Multi-Factor Approach for Selection of Developers to Fix Bugs in a Program
    Guo, Shikai
    Chen, Shifei
    Wang, Siwen
    Zhang, Decheng
    Liu, Yaqing
    Guo, Chen
    Li, Hui
    Li, Tingting
    APPLIED SCIENCES-BASEL, 2019, 9 (16):
  • [36] Multi-factor coupling analysis and identification of tanks BLEVE
    Luo, Weiye
    Bi, Mingshu
    Zhang, Yue
    Yu, Di
    Deng, Zilong
    Ren, Jingjie
    PROCESS SAFETY AND ENVIRONMENTAL PROTECTION, 2023, 177 : 880 - 890
  • [37] Multi-factor Analysis of Reflection from Granite Surfaces
    ZHAO Nai-zhuo1
    Journal of China University of Mining & Technology, 2007, (02) : 255 - 257
  • [38] Enhancing System Safety and Reliability through Integrated FMEA and Game Theory: A Multi-Factor Approach
    Yazdi, Mohammad
    SAFETY, 2024, 10 (01)
  • [39] Multi-factor Analysis of Reflection from Granite Surfaces
    ZHAO, Nai-zhuo
    YAN, Lei
    ZHAO, Yun-sheng
    LV, Yun-feng
    WU, Tai-xia
    Journal of China University of Mining and Technology, 2007, 17 (02): : 255 - 257
  • [40] An Extensive Formal Analysis of Multi-factor Authentication Protocols
    Jacomme, Charlie
    Kremer, Steve
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2021, 24 (02)