Self-organization and associative memory: 3rd edition
Self-organization and associative memory: 3rd edition
Predictive data mining: a practical guide
Predictive data mining: a practical guide
Artificial Intelligence and Law
An Early Warning System for the Prediction of Criminal Careers
MICAI '08 Proceedings of the 7th Mexican International Conference on Artificial Intelligence: Advances in Artificial Intelligence
Proceedings of the 11th International Conference on Electronic Commerce
Prediction of past unsolved terrorist attacks
ISI'09 Proceedings of the 2009 IEEE international conference on Intelligence and security informatics
Exploring extremism and terrorism on the web: the dark web project
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
COPLINK agent: an architecture for information monitoring and sharing in law enforcement
ISI'03 Proceedings of the 1st NSF/NIJ conference on Intelligence and security informatics
Electronic Commerce Research and Applications
Combined detection model for criminal network detection
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
A distance measure for determining similarity between criminal investigations
ICDM'06 Proceedings of the 6th Industrial Conference on Data Mining conference on Advances in Data Mining: applications in Medicine, Web Mining, Marketing, Image and Signal Mining
Hi-index | 0.00 |
This paper looks at the use of a Self Organizing Map (SOM), to link of records of crimes of serious sexual attacks. Once linked a profile can be derived of the offender(s) responsible.The data was drawn from the major crimes database at the National Crime Faculty of the National Police Staff College Bramshill UK. The data was encoded from text by a small team of specialists working to a well-defined protocol. The encoded data was analyzed using SOMs. Two exercises were conducted. These resulted in the linking of several offences in to clusters each of which were sufficiently similar to have possibly been committed by the same offender(s). A number of clusters were used to form profiles of offenders. Some of these profiles were confirmed by independent analysts as either belonging to known offenders or appeared sufficiently interesting to warrant further investigation.The prototype was developed over 10 weeks. This contrasts with an in-house study using a conventional approach, which took 2 years to reach similar results. As a consequence of this study the NCF intends to pursue an in-depth follow up study.