Font Size: a A A

The Research And Realization Of Data-mining Technique In Criminal Intelligence Information

Posted on:2008-01-06Degree:MasterType:Thesis
Country:ChinaCandidate:G LvFull Text:PDF
GTID:2178360218962146Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the quick development of the politics, economy and the science in the modern society, the criminal actions are also characterized as organic, intelligent and high-tech. Therefore, our policemen are facing a big challenge now, that is, how could we improve our working efficiency and quick response ability so as to prevent the crimes and beat the criminals? The answer is that we have to introduce the high-tech, especially the modem computer technology, into our daily work. Under this circumstance, Tanjing developed the criminal information integration management system (CIIMS), which could find out the certain rules of the crimes by applying the most-advanced data mining technology. This article talks about the detailed application of the data mining technology on the basis of CIIMS.Taking the existing association data mining method as a reference, this article not only explains how the CIIMS is designed and founded, but also introduces the detailed data mining process about criminal information (including ETL, Association Rule finding) as well as the solutions to certain problems occurred when the system was been founding.Based on the association rule technology, this author compared two association rule methods (i.e. Apriori and FP-Growth) and chooses FP-Growth to mine the criminal information data in view of that it is more efficient and practicable.The CIIMS analyses a great amount of criminal records and finds out the relationships between the different crimes in various aspects, such as education, economic status, age andfamily etc. The analysis results show that it is quite practicable and meaningful for us to mine the criminal information data via FP-Growth.
Keywords/Search Tags:Data Mining, Association Rule, ETL, OnLine Analytical Processing, Criminal Intelligence
PDF Full Text Request
Related items