首页 > 最新文献

International Journal of Digital Crime and Forensics最新文献

英文 中文
Fragile Watermarking Framework for Tamper Detection of Color Biometric Images 彩色生物特征图像篡改检测的脆弱水印框架
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-03-01 DOI: 10.4018/IJDCF.2021030103
Rohit M. Thanki, Surekha Borra, A. Kothari
Application of fragile watermarking on biometric images stored at a server or cloud ensures proper authentication and tamper detection when access to the servers was shared. In this paper, a hybrid domain fragile watermarking technique for authenticity of color biometric images, using hybridization of various transforms such as discrete cosine transform (DCT), fast discrete curvelet transform (FDCuT), and singular value decomposition (SVD) is proposed. The hybrid transform coefficients are modified according to the scrambled color watermark to obtain watermarked color biometric image. The security of this technique is strengthened with the usage of Arnold scrambling, and by using multiple secret keys. The proposed technique is analyzed on FEI Brazilian face database. The experimental results show that this technique performs better than the existing fragile watermarking techniques.
在存储在服务器或云上的生物特征图像上应用脆弱的水印,确保在共享对服务器的访问时进行适当的身份验证和篡改检测。提出了一种基于离散余弦变换(DCT)、快速离散曲线变换(FDCuT)和奇异值分解(SVD)的混合域脆弱彩色生物特征图像真实性水印技术。根据打乱后的彩色水印对混合变换系数进行修改,得到带水印的彩色生物特征图像。该技术的安全性通过使用Arnold置乱和使用多个密钥得到加强。在FEI巴西人脸数据库上对该方法进行了分析。实验结果表明,该方法比现有的脆弱水印技术具有更好的性能。
{"title":"Fragile Watermarking Framework for Tamper Detection of Color Biometric Images","authors":"Rohit M. Thanki, Surekha Borra, A. Kothari","doi":"10.4018/IJDCF.2021030103","DOIUrl":"https://doi.org/10.4018/IJDCF.2021030103","url":null,"abstract":"Application of fragile watermarking on biometric images stored at a server or cloud ensures proper authentication and tamper detection when access to the servers was shared. In this paper, a hybrid domain fragile watermarking technique for authenticity of color biometric images, using hybridization of various transforms such as discrete cosine transform (DCT), fast discrete curvelet transform (FDCuT), and singular value decomposition (SVD) is proposed. The hybrid transform coefficients are modified according to the scrambled color watermark to obtain watermarked color biometric image. The security of this technique is strengthened with the usage of Arnold scrambling, and by using multiple secret keys. The proposed technique is analyzed on FEI Brazilian face database. The experimental results show that this technique performs better than the existing fragile watermarking techniques.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"122 1","pages":"35-56"},"PeriodicalIF":0.7,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79463067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Palmprint Recognition Using Hessian Matrix and Two-Component Partition Method 基于Hessian矩阵和双分量分割方法的掌纹识别
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-01-01 DOI: 10.4018/ijdcf.2021010102
Jyotismita Chaki, N. Dey
Palmprint recognition has been comprehensively examined in the past couple of years and various undertakings are done to use it as a biometric methodology for various applications. The point of this study is to construct an effective palmprint recognition technique with low computational multifaceted nature and along these lines to expand the acknowledgment and precision. Since edges are free from distortion, they are very reliable and subsequently used for palm print recognition. The originality of the proposed technique depends on new area of interest (ROI) extraction took after by new principal line extraction and texture matching strategy. The new principal line extraction technique is created by using the Hessian matrix and Eigen value. The texture matching of the ROI is done using new 2-component partition method by segmenting the image into comparative and non-comparative edges. Examinations are finished on a database and exploratory results exhibit that the accuracy of the proposed method is comparable to past methods used for palmprint recognition.
在过去的几年里,人们对掌纹识别进行了全面的研究,并开展了各种工作,将其作为一种生物识别方法用于各种应用。本研究的重点是在此基础上构建一种低计算面性的有效掌纹识别技术,以提高识别的识别率和精度。由于边缘没有失真,因此非常可靠,随后可用于掌纹识别。该方法的独创性在于采用新的主线提取和纹理匹配策略提取新的感兴趣区域(ROI)。利用黑森矩阵和本征值,提出了一种新的主线提取方法。利用新的2分量分割方法,将图像分割成比较边缘和非比较边缘,实现感兴趣区域的纹理匹配。在数据库上完成了测试,探索性结果表明,所提出的方法的准确性与过去用于掌纹识别的方法相当。
{"title":"Palmprint Recognition Using Hessian Matrix and Two-Component Partition Method","authors":"Jyotismita Chaki, N. Dey","doi":"10.4018/ijdcf.2021010102","DOIUrl":"https://doi.org/10.4018/ijdcf.2021010102","url":null,"abstract":"Palmprint recognition has been comprehensively examined in the past couple of years and various undertakings are done to use it as a biometric methodology for various applications. The point of this study is to construct an effective palmprint recognition technique with low computational multifaceted nature and along these lines to expand the acknowledgment and precision. Since edges are free from distortion, they are very reliable and subsequently used for palm print recognition. The originality of the proposed technique depends on new area of interest (ROI) extraction took after by new principal line extraction and texture matching strategy. The new principal line extraction technique is created by using the Hessian matrix and Eigen value. The texture matching of the ROI is done using new 2-component partition method by segmenting the image into comparative and non-comparative edges. Examinations are finished on a database and exploratory results exhibit that the accuracy of the proposed method is comparable to past methods used for palmprint recognition.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"14 1","pages":"26-47"},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87349765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Suspicious or Un-Trusted Users in Crypto-Currency Financial Trading Applications 在加密货币金融交易应用程序中检测可疑或不可信的用户
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-01-01 DOI: 10.4018/ijdcf.2021010105
R. Mittal, M. P. S. Bhatia
In this age, where cryptocurrencies are slowly creeping into the banking services and making a name for them, it is becoming crucially essential to figure out the security concerns when users make transactions. This paper investigates the untrusted users of cryptocurrency transaction services, which are connected using smartphones and computers. However, as technology is increasing, transaction frauds are growing, and there is a need to detect vulnerabilities in systems. A methodology is proposed to identify suspicious users based on their reputation score by collaborating centrality measures and machine learning techniques. The results are validated on two cryptocurrencies network datasets, Bitcoin-OTC, and Bitcoin-Alpha, which contain information of the system formed by the users and the user's trust score. Results found that the proposed approach provides improved and accurate results. Hence, the fusion of machine learning with centrality measures provides a highly robust system and can be adapted to prevent smart devices' financial services.
在这个时代,加密货币正慢慢渗透到银行服务中,并为它们创造了一个名字,在用户进行交易时,弄清楚安全问题变得至关重要。本文调查了使用智能手机和计算机连接的加密货币交易服务的不可信用户。然而,随着技术的发展,交易欺诈也越来越多,因此需要检测系统中的漏洞。通过协作中心性度量和机器学习技术,提出了一种基于信誉评分识别可疑用户的方法。结果在两个加密货币网络数据集(Bitcoin-OTC和Bitcoin-Alpha)上进行了验证,这两个数据集包含了用户形成的系统信息和用户的信任分数。结果表明,所提出的方法可以提供更好的、准确的结果。因此,机器学习与中心性度量的融合提供了一个高度健壮的系统,可以用来防止智能设备的金融服务。
{"title":"Detection of Suspicious or Un-Trusted Users in Crypto-Currency Financial Trading Applications","authors":"R. Mittal, M. P. S. Bhatia","doi":"10.4018/ijdcf.2021010105","DOIUrl":"https://doi.org/10.4018/ijdcf.2021010105","url":null,"abstract":"In this age, where cryptocurrencies are slowly creeping into the banking services and making a name for them, it is becoming crucially essential to figure out the security concerns when users make transactions. This paper investigates the untrusted users of cryptocurrency transaction services, which are connected using smartphones and computers. However, as technology is increasing, transaction frauds are growing, and there is a need to detect vulnerabilities in systems. A methodology is proposed to identify suspicious users based on their reputation score by collaborating centrality measures and machine learning techniques. The results are validated on two cryptocurrencies network datasets, Bitcoin-OTC, and Bitcoin-Alpha, which contain information of the system formed by the users and the user's trust score. Results found that the proposed approach provides improved and accurate results. Hence, the fusion of machine learning with centrality measures provides a highly robust system and can be adapted to prevent smart devices' financial services.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"1 1","pages":"79-93"},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81902837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card 一种限制智能卡非法获取信息的新型验证协议
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-01-01 DOI: 10.4018/ijdcf.2021010104
A. Sahu, Ashish Kumar
The services of the internet play an essential part in the daily life of the users. So, safety and confidentiality of the information are to be maintained to preserve user conviction in various services offered by network. The two-factor-based password verification techniques are used between remote server and legitimate users for verification over insecure channel. Several protocols have been suggested previously claiming their simplicity, privacy, safety, and robustness. The authors proved that their enhanced protocols are vulnerable to different attacks on the network and permit only authenticated users to update their password preserving traceability and identity. Analysis shows that no scheme has fulfilled all the security requirements and achieved entire goals. Therefore, in this article, a scheme has been presented to overcome these issues in the previous schemes to resist illegal access leading to misuse and achieve all the security requirements and goals. The safety analysis of the presented scheme has confirmed its performance in terms of reliability and safety.
互联网服务在用户的日常生活中起着至关重要的作用。因此,在网络提供的各种服务中,需要维护信息的安全和机密性,以保持用户的信心。在远程服务器和合法用户之间使用基于双因素的密码验证技术,通过不安全的通道进行验证。之前已经提出了一些协议,声称它们简单、隐私、安全和健壮。作者证明,他们的增强协议很容易受到网络上不同的攻击,并且只允许经过认证的用户更新他们的密码,保持可追溯性和身份。分析表明,没有一种方案能够满足所有的安全需求,达到全部的目标。因此,本文提出了一种方案来克服以往方案中存在的这些问题,以抵御非法访问导致的误用,实现所有的安全需求和目标。对该方案进行了安全性分析,验证了其可靠性和安全性。
{"title":"A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card","authors":"A. Sahu, Ashish Kumar","doi":"10.4018/ijdcf.2021010104","DOIUrl":"https://doi.org/10.4018/ijdcf.2021010104","url":null,"abstract":"The services of the internet play an essential part in the daily life of the users. So, safety and confidentiality of the information are to be maintained to preserve user conviction in various services offered by network. The two-factor-based password verification techniques are used between remote server and legitimate users for verification over insecure channel. Several protocols have been suggested previously claiming their simplicity, privacy, safety, and robustness. The authors proved that their enhanced protocols are vulnerable to different attacks on the network and permit only authenticated users to update their password preserving traceability and identity. Analysis shows that no scheme has fulfilled all the security requirements and achieved entire goals. Therefore, in this article, a scheme has been presented to overcome these issues in the previous schemes to resist illegal access leading to misuse and achieve all the security requirements and goals. The safety analysis of the presented scheme has confirmed its performance in terms of reliability and safety.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"287 1","pages":"65-78"},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77893946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SafeWomen SafeWomen
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-01-01 DOI: 10.4018/ijdcf.2021010103
S. Yadav, Kavita Sharma, Ananya Gupta
The security of women is of prime concern around the world. Women feel insecure while traveling out of the home due to the fear of violence. The fear of violence restricts women's participating in different social activities. So instead of becoming a victim of a violent crime such as domestic violence, robbery, or rape, women should call on resources to help her out of that situation. In this paper, the authors develop a women safety device, namely SafeWomen, which helps in reducing the crimes held against women. This is a new approach for providing security to women in any unsafe situation by sending an alert having geographical location along with emergency message to the registered contact numbers so that the incident could be prevented. Also, it can track the current location of the victim just by knowing the IP address of the device she is using. One can also use this system for the safety and security of kids and elderly people just by making some changes in the functionality of the system.
妇女的安全是全世界最关心的问题。由于害怕暴力,女性在外出旅行时感到不安全。对暴力的恐惧限制了妇女参与各种社会活动。因此,女性不应该成为家庭暴力、抢劫或强奸等暴力犯罪的受害者,而应该求助于资源来帮助自己摆脱这种状况。在本文中,作者开发了一种妇女安全装置,即SafeWomen,这有助于减少针对妇女的犯罪。这是为处于任何不安全情况下的妇女提供安全的一种新办法,通过向登记的联系电话发送具有地理位置的警报和紧急信息,以防止事件发生。此外,它可以通过知道受害者正在使用的设备的IP地址来跟踪受害者的当前位置。人们也可以通过对系统的功能进行一些更改来使用该系统来保护儿童和老年人的安全。
{"title":"SafeWomen","authors":"S. Yadav, Kavita Sharma, Ananya Gupta","doi":"10.4018/ijdcf.2021010103","DOIUrl":"https://doi.org/10.4018/ijdcf.2021010103","url":null,"abstract":"The security of women is of prime concern around the world. Women feel insecure while traveling out of the home due to the fear of violence. The fear of violence restricts women's participating in different social activities. So instead of becoming a victim of a violent crime such as domestic violence, robbery, or rape, women should call on resources to help her out of that situation. In this paper, the authors develop a women safety device, namely SafeWomen, which helps in reducing the crimes held against women. This is a new approach for providing security to women in any unsafe situation by sending an alert having geographical location along with emergency message to the registered contact numbers so that the incident could be prevented. Also, it can track the current location of the victim just by knowing the IP address of the device she is using. One can also use this system for the safety and security of kids and elderly people just by making some changes in the functionality of the system.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70454306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models 无人机取证:基于常见无人机模型的数字取证调查案例研究
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2021-01-01 DOI: 10.4018/ijdcf.2021010101
Khalifa Al-Room, Farkhund Iqbal, T. Baker, B. Shah, Benjamin Yankson, Áine MacDermott, Patrick C. K. Hung
Drones (a.k.a. unmanned aerial vehicles – UAV) have become a societal norm in our daily lives. The ability of drones capture high-quality photos from an aerial view and store and transmit such data presents a multi-facet problem. These actions possess privacy challenges to innocent users who can be spied on or drone owner's data which may be intercepted by a hacker. With all technological paradigms, utilities can be misused, and this is an increasing occurrence with drones. As a result, it is imperative to develop a novel methodological approach for the digital forensic analysis of a seized drone. This paper investigates six brands of drones commonly used in criminal activities and extracts forensically relevant data such as location information, captured images and videos, drones' flight paths, and data related to the ownership of the confiscated drone. The experimental results indicate that drone forensics would facilitate law enforcement in collecting significant information necessary for criminal investigations.
无人机(又名无人驾驶飞行器- UAV)已经成为我们日常生活中的一种社会规范。无人机从空中拍摄高质量照片并存储和传输这些数据的能力提出了一个多方面的问题。这些行为对无辜用户的隐私构成了挑战,他们可能被监视,或者无人机所有者的数据可能被黑客截获。在所有的技术范例中,公用事业都可能被滥用,而无人机的这种情况越来越多。因此,必须开发一种新的方法来对被扣押的无人机进行数字法医分析。本文调查了犯罪活动中常用的六个品牌的无人机,并提取了与取证相关的数据,如位置信息、捕获的图像和视频、无人机的飞行路径以及与被没收无人机所有权相关的数据。实验结果表明,无人机取证将有助于执法部门收集刑事调查所需的重要信息。
{"title":"Drone Forensics: A Case Study of Digital Forensic Investigations Conducted on Common Drone Models","authors":"Khalifa Al-Room, Farkhund Iqbal, T. Baker, B. Shah, Benjamin Yankson, Áine MacDermott, Patrick C. K. Hung","doi":"10.4018/ijdcf.2021010101","DOIUrl":"https://doi.org/10.4018/ijdcf.2021010101","url":null,"abstract":"Drones (a.k.a. unmanned aerial vehicles – UAV) have become a societal norm in our daily lives. The ability of drones capture high-quality photos from an aerial view and store and transmit such data presents a multi-facet problem. These actions possess privacy challenges to innocent users who can be spied on or drone owner's data which may be intercepted by a hacker. With all technological paradigms, utilities can be misused, and this is an increasing occurrence with drones. As a result, it is imperative to develop a novel methodological approach for the digital forensic analysis of a seized drone. This paper investigates six brands of drones commonly used in criminal activities and extracts forensically relevant data such as location information, captured images and videos, drones' flight paths, and data related to the ownership of the confiscated drone. The experimental results indicate that drone forensics would facilitate law enforcement in collecting significant information necessary for criminal investigations.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"1 1","pages":"1-25"},"PeriodicalIF":0.7,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88717900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Research on the Construction of a Student Model of an Adaptive Learning System Based on Cognitive Diagnosis Theory 基于认知诊断理论的适应性学习系统学生模型构建研究
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-10-01 DOI: 10.4018/IJDCF.2020100102
Yang Zhao, Yaqin Fan, Mingrui Yin, Cheng Fang
With the promotion of online education, the adaptive learning system has attracted attention due to its good curriculum recommendation function. The student model is an important interface between the adaptive learning system and the user, reflecting the individual characteristics, knowledge status, and cognitive ability of the student. The accuracy of the information in the student model directly affects the quality of the system recommendation service. The traditional student model only judges students based on the basic information and simple test scores. This paper introduces the self-adaptive item bank and adaptive item selection strategy based on the cognitive diagnosis theory that dynamically detects the students' knowledge and analyzes the state according to the answering habits and knowledge mastering status of different students. This paper analyzes and contrasts a variety of traditional cognitive diagnosis theories and proposes a mixed cognitive diagnosis question bank and a selection strategy model to provide strong support for the construction of student models.
随着在线教育的推广,自适应学习系统因其良好的课程推荐功能而备受关注。学生模型是自适应学习系统与用户之间的重要接口,反映了学生的个体特征、知识状况和认知能力。学生模型中信息的准确性直接影响系统推荐服务的质量。传统的学生模式只根据基本信息和简单的考试成绩来判断学生。本文介绍了基于认知诊断理论的自适应题库和自适应题库选择策略,根据不同学生的答题习惯和知识掌握状况动态检测学生的知识,并对其状态进行分析。本文通过对各种传统认知诊断理论的分析和对比,提出了一种混合认知诊断题库和选择策略模型,为学生模型的构建提供有力支持。
{"title":"Research on the Construction of a Student Model of an Adaptive Learning System Based on Cognitive Diagnosis Theory","authors":"Yang Zhao, Yaqin Fan, Mingrui Yin, Cheng Fang","doi":"10.4018/IJDCF.2020100102","DOIUrl":"https://doi.org/10.4018/IJDCF.2020100102","url":null,"abstract":"With the promotion of online education, the adaptive learning system has attracted attention due to its good curriculum recommendation function. The student model is an important interface between the adaptive learning system and the user, reflecting the individual characteristics, knowledge status, and cognitive ability of the student. The accuracy of the information in the student model directly affects the quality of the system recommendation service. The traditional student model only judges students based on the basic information and simple test scores. This paper introduces the self-adaptive item bank and adaptive item selection strategy based on the cognitive diagnosis theory that dynamically detects the students' knowledge and analyzes the state according to the answering habits and knowledge mastering status of different students. This paper analyzes and contrasts a variety of traditional cognitive diagnosis theories and proposes a mixed cognitive diagnosis question bank and a selection strategy model to provide strong support for the construction of student models.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"10 1","pages":"20-31"},"PeriodicalIF":0.7,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79211295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spatio-Temporal Crime Analysis Using KDE and ARIMA Models in the Indian Context 印度背景下使用KDE和ARIMA模型的时空犯罪分析
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-10-01 DOI: 10.4018/IJDCF.2020100101
Prathap Rudra Boppuru, Ramesha Kenchappa
In developing countries like India, crime plays a detrimental role in economic growth and prosperity. With the increase in delinquencies, law enforcement needs to deploy limited resources optimally to protect citizens. Data mining and predictive analytics provide the best options for the same. This paper examines the news feed data collected from various sources regarding crime in India and Bangalore city. The crimes are then classified on the geographic density and the crime patterns such as time of day to identify and visualize the distribution of national and regional crime such as theft, murder, alcoholism, assault, etc. In total, 68 types of crime-related dictionary keywords are classified into six classes based on the news feed data collected for one year. Kernel density estimation method is used to identify the hotspots of crime. With the help of the ARIMA model, time series prediction is performed on the data. The diversity of crime patterns is visualized in a customizable way with the help of a data mining platform.
在像印度这样的发展中国家,犯罪对经济增长和繁荣起着有害的作用。随着犯罪行为的增加,执法部门需要优化有限的资源来保护公民。数据挖掘和预测分析提供了最好的选择。本文研究了从各种来源收集的关于印度和班加罗尔城市犯罪的新闻数据。然后根据地理密度和犯罪模式(如一天中的时间)对犯罪进行分类,以确定和可视化国家和区域犯罪的分布,如盗窃、谋杀、酗酒、殴打等。根据一年来收集的新闻源数据,总共将68种与犯罪相关的词典关键词分为6类。采用核密度估计方法识别犯罪热点。利用ARIMA模型对数据进行时间序列预测。在数据挖掘平台的帮助下,以一种可定制的方式将犯罪模式的多样性可视化。
{"title":"Spatio-Temporal Crime Analysis Using KDE and ARIMA Models in the Indian Context","authors":"Prathap Rudra Boppuru, Ramesha Kenchappa","doi":"10.4018/IJDCF.2020100101","DOIUrl":"https://doi.org/10.4018/IJDCF.2020100101","url":null,"abstract":"In developing countries like India, crime plays a detrimental role in economic growth and prosperity. With the increase in delinquencies, law enforcement needs to deploy limited resources optimally to protect citizens. Data mining and predictive analytics provide the best options for the same. This paper examines the news feed data collected from various sources regarding crime in India and Bangalore city. The crimes are then classified on the geographic density and the crime patterns such as time of day to identify and visualize the distribution of national and regional crime such as theft, murder, alcoholism, assault, etc. In total, 68 types of crime-related dictionary keywords are classified into six classes based on the news feed data collected for one year. Kernel density estimation method is used to identify the hotspots of crime. With the help of the ARIMA model, time series prediction is performed on the data. The diversity of crime patterns is visualized in a customizable way with the help of a data mining platform.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"25 1","pages":"1-19"},"PeriodicalIF":0.7,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83859766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Light Recommendation Algorithm of We-Media Articles Based on Content 基于内容的自媒体文章轻推荐算法
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-10-01 DOI: 10.4018/IJDCF.2020100106
Xin Zheng, Jun Li, Qi Wu
Since the explosive growth of we-medias today, personalized recommendation is playing an increasingly important role to help users to find their target articles in vast amounts of data. Deep learning, on the other hand, has shown good results in image processing, computer vision, natural language processing, and other fields. But it's a relative blank in the application of we-media articles recommendation. Combining the new features of we-media articles, this paper puts forward a recommendation algorithm of we-media articles based on topic model, Latent Dirichlet Allocation (LDA), and deep learning algorithm, Recurrent Neural Networks (RNNs). Experiments on the real datasets show that the combined method outperforms the traditional collaborative filtering recommendation and non-personalized recommendation method.
在自媒体爆炸式增长的今天,个性化推荐在帮助用户在海量数据中找到自己的目标文章方面发挥着越来越重要的作用。另一方面,深度学习在图像处理、计算机视觉、自然语言处理等领域显示出良好的效果。但在自媒体文章推荐的应用方面,还是一个相对空白的领域。结合自媒体文章的新特点,提出了一种基于话题模型、潜狄利克雷分配(Latent Dirichlet Allocation, LDA)和深度学习算法递归神经网络(Recurrent Neural Networks, RNNs)的自媒体文章推荐算法。在真实数据集上的实验表明,该方法优于传统的协同过滤推荐和非个性化推荐方法。
{"title":"A Light Recommendation Algorithm of We-Media Articles Based on Content","authors":"Xin Zheng, Jun Li, Qi Wu","doi":"10.4018/IJDCF.2020100106","DOIUrl":"https://doi.org/10.4018/IJDCF.2020100106","url":null,"abstract":"Since the explosive growth of we-medias today, personalized recommendation is playing an increasingly important role to help users to find their target articles in vast amounts of data. Deep learning, on the other hand, has shown good results in image processing, computer vision, natural language processing, and other fields. But it's a relative blank in the application of we-media articles recommendation. Combining the new features of we-media articles, this paper puts forward a recommendation algorithm of we-media articles based on topic model, Latent Dirichlet Allocation (LDA), and deep learning algorithm, Recurrent Neural Networks (RNNs). Experiments on the real datasets show that the combined method outperforms the traditional collaborative filtering recommendation and non-personalized recommendation method.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"326 1","pages":"68-81"},"PeriodicalIF":0.7,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73122619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Joint Model-Based Attention for Spoken Language Understanding Task 基于联合模型的口语理解任务注意
IF 0.7 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2020-10-01 DOI: 10.4018/IJDCF.2020100103
Xin Liu, RuiHua Qi, Lin Shao
Intent determination (ID) and slot filling (SF) are two critical steps in the spoken language understanding (SLU) task. Conventionally, most previous work has been done for each subtask respectively. To exploit the dependencies between intent label and slot sequence, as well as deal with both tasks simultaneously, this paper proposes a joint model (ABLCJ), which is trained by a united loss function. In order to utilize both past and future input features efficiently, a joint model based Bi-LSTM with contextual information is employed to learn the representation of each step, which are shared by two tasks and the model. This paper also uses sentence-level tag information learned from a CRF layer to predict the tag of each slot. Meanwhile, a submodule-based attention is employed to capture global features of a sentence for intent classification. The experimental results demonstrate that ABLCJ achieves competitive performance in the Shared Task 4 of NLPCC 2018.
意图确定(ID)和插槽填充(SF)是口语理解(SLU)任务中的两个关键步骤。按照惯例,之前的大部分工作都是针对每个子任务分别完成的。为了利用意图标签和槽序列之间的依赖关系,并同时处理这两个任务,本文提出了一种联合模型(ABLCJ),该模型由统一损失函数训练。为了有效地利用过去和未来的输入特征,采用基于上下文信息的联合模型Bi-LSTM来学习每个步骤的表示,这些步骤由两个任务和模型共享。本文还使用从CRF层学习到的句子级标签信息来预测每个槽的标签。同时,采用基于子模块的注意捕获句子的全局特征,进行意图分类。实验结果表明,ABLCJ在NLPCC 2018的共享任务4中取得了具有竞争力的表现。
{"title":"Joint Model-Based Attention for Spoken Language Understanding Task","authors":"Xin Liu, RuiHua Qi, Lin Shao","doi":"10.4018/IJDCF.2020100103","DOIUrl":"https://doi.org/10.4018/IJDCF.2020100103","url":null,"abstract":"Intent determination (ID) and slot filling (SF) are two critical steps in the spoken language understanding (SLU) task. Conventionally, most previous work has been done for each subtask respectively. To exploit the dependencies between intent label and slot sequence, as well as deal with both tasks simultaneously, this paper proposes a joint model (ABLCJ), which is trained by a united loss function. In order to utilize both past and future input features efficiently, a joint model based Bi-LSTM with contextual information is employed to learn the representation of each step, which are shared by two tasks and the model. This paper also uses sentence-level tag information learned from a CRF layer to predict the tag of each slot. Meanwhile, a submodule-based attention is employed to capture global features of a sentence for intent classification. The experimental results demonstrate that ABLCJ achieves competitive performance in the Shared Task 4 of NLPCC 2018.","PeriodicalId":44650,"journal":{"name":"International Journal of Digital Crime and Forensics","volume":"23 1","pages":"32-43"},"PeriodicalIF":0.7,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73014436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Digital Crime and Forensics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1