Criminal prediction using Naive Bayes theory
暂无分享,去创建一个
[1] Chen Xiang-tao. An Improved ID3 Algorithm of Decision Trees , 2009 .
[2] Kent A. Harries,et al. Mapping Crime: Principle And Practice , 1999 .
[3] D.E. Brown,et al. Improving crime data sharing and analysis tools for a Web-based Crime Analysis Toolkit: WebCAT 2.2 , 2008, 2008 IEEE Systems and Information Engineering Design Symposium.
[4] Reda Alhajj,et al. EFFECTIVENESS OF SUPPORT VECTOR MACHINE FOR CRIME HOT-SPOTS PREDICTION , 2008, Appl. Artif. Intell..
[5] Mathew David Mackenzie,et al. CDUL: Class directed unsupervised learning , 1995, Neural Computing & Applications.
[6] Donald E. Brown,et al. Detecting local regions of change in high-dimensional criminal or terrorist point processes , 2007, Comput. Stat. Data Anal..
[7] Beatrice Lazzerini,et al. Combining supervised and unsupervised learning for data clustering , 2006, Neural Computing & Applications.
[8] Anthony G. Pipe,et al. Naive Bayes novelty detection for a moving robot with whiskers , 2010, 2010 IEEE International Conference on Robotics and Biomimetics.
[9] Chee Peng Lim,et al. A review of online learning in supervised neural networks , 2014, Neural Computing and Applications.
[10] D. Kim Rossmo,et al. Geographic Profiling for Serial Crime Investigation , 2005 .
[11] Anders Holst,et al. A Bayesian Parametric Statistical Anomaly Detection Method for Finding Trends and Patterns in Criminal Behavior , 2013, 2013 European Intelligence and Security Informatics Conference.
[12] Donald E. Brown,et al. Criminal incident prediction using a point-pattern-based density model , 2003 .
[13] Shubha Jain,et al. Hybrid Approach for Network Intrusion Detection ntrusion Detection ntrusion Detection ntrusion Detection System U sing K K K K- -Medoid Clustering Clustering and and Naïve Bayes Classification , 2013 .
[14] Joshua B. Plotkin,et al. Quantifying Behavioral Data Sets of Criminal Activity , 2010, AAAI Spring Symposium: Artificial Intelligence for Development.
[15] Manuel Ferreira,et al. Bayesian networks in forensic identification problems , 2009 .
[16] K. Rameshkumar,et al. A Complete Survey on application of Frequent Pattern Mining and Association Rule Mining on Crime Pattern Mining , 2014 .
[17] Yang Xiang,et al. Visualizing criminal relationships: comparison of a hyperbolic tree and a hierarchical list , 2005, Decis. Support Syst..
[18] G. Palermo,et al. Constructing Bayesian networks for criminal profiling from limited data , 2008, Knowl. Based Syst..
[19] Gary Higgs,et al. Visualising space and time in crime patterns: A comparison of methods , 2007, Comput. Environ. Urban Syst..
[20] Dario Gregori,et al. Naïve Bayes classifiers with feature selection to predict hospitalization and complications due to objects swallowing and ingestion among European children , 2013 .
[21] Lu Xiao,et al. Does social network always promote entrepreneurial intentions? An empirical study in China , 2013, Neural Computing and Applications.
[22] Yves Zenou,et al. Working Paper No . 601 , 2003 Social Networks and Crime Decisions : The Role of Social Structure in Facilitating Delinquent Behavior , 2003 .
[23] David V. Canter. Developments in geographical offender profiling: commentary on Bayesian journey to crime. , 2009 .
[24] Wu Wei. ID3 Algorithm and C4.5 Algorithm Based on Decision Tree , 2011 .
[25] Stefan Wermter,et al. Knowledge Extraction from Local Function Networks , 2001, IJCAI.
[26] Mugdha Sharma. Z - CRIME: A data mining tool for the detection of suspicious criminal activities based on decision tree , 2014, 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC).
[27] Yeshwantrao Chavan,et al. Combining Naive Bayesian and Support Vector Machine for Intrusion Detection System , 2014 .
[28] Saeed Ayat,et al. A comparison of artificial neural networks learning algorithms in predicting tendency for suicide , 2012, Neural Computing and Applications.
[29] Aziz Nasridinov,et al. A Decision Tree-Based Classification Model for Crime Prediction , 2013, ITCS.
[30] Kathleen M. Carley,et al. NETEST: Estimating a Terrorist Network's Structure—Graduate Student Best Paper Award, CASOS 2002 Conference , 2002, Comput. Math. Organ. Theory.
[31] Leslie W. Kennedy,et al. Using Dasymetric Mapping for Spatially Aggregated Crime Data , 2004 .
[32] N. Tollenaar,et al. Which method predicts recidivism best?: a comparison of statistical, machine learning and data mining predictive models , 2013 .
[33] Kathleen M. Carley,et al. NETEST: Estimating a Terrorist Network's Structure , 2002 .
[34] Yutaka Harada,et al. Examining the impact of the precision of address geocoding on estimated density of crime locations , 2006, Comput. Geosci..
[35] C. Yeh,et al. The efficacy and safety of once-daily quetiapine extended release in patients with schizophrenia switched from other antipsychotics: an open-label study in Chinese population , 2015, BMC Psychiatry.
[36] Kadhim B. S. Aljanabi. A Proposed Framework for Analyzing Crime Data Set Using Decision Tree and Simple K-Means Mining Algorithms , 2011 .
[37] Musa Mammadov,et al. Attribute weighted Naive Bayes classifier using a local optimization , 2014, Neural Computing and Applications.
[38] M. Saravanan,et al. Enabling Real Time Crime Intelligence Using Mobile GIS and Prediction Methods , 2013, 2013 European Intelligence and Security Informatics Conference.
[39] Jessica Woodhams,et al. Linking Crimes Using Behavioural Clues: Current Levels of Linking Accuracy and Strategies for Moving Forward , 2014 .
[40] I. D. Wilson,et al. Predicting the geo-temporal variations of crime and disorder , 2003 .
[41] Dirk Enzmann,et al. Official Crime Statistics and Survey Data: Comparing Trends of Youth Violence between 2000 and 2006 in Cities of the Czech Republic, Germany, Poland, Russia, and Slovenia , 2010 .
[42] Leslie W. Kennedy,et al. Using Dasymetric Mapping for Spatially Aggregated , 2004 .
[43] Zeki Yetgin,et al. Generating incident-level artificial data using GIS based crime simulation , 2013, 2013 International Conference on Electronics, Computer and Computation (ICECCO).
[44] M. Graf,et al. Predicting general criminal recidivism in mentally disordered offenders using a random forest approach , 2015, BMC Psychiatry.
[45] Dr. M. Punithavalli,et al. A Study on the Existing Computer Aided Crime Analysis Tools to Handle Indian State of Affairs , 2001 .
[46] Giles Oatley,et al. Applying the Concept of Revictimization: Using Burglars' Behaviour to Predict Houses at Risk of Future Victimization , 2003 .
[47] Xu Li,et al. Detecting Crime Types Using Classification Algorithms , 2014, J. Digit. Inf. Manag..
[48] Supriya Awasare,et al. An Efficient Approach to Detecting Phishing A Web Using K-Means and Naïve-Bayes Algorithms , 2014 .
[49] R. Sandberg,et al. Capturing whole-genome characteristics in short sequences using a naïve Bayesian classifier. , 2001, Genome research.
[50] V. B. Bhagat,et al. Effective Data Mining Approach For Crime-Terrorpattern Detection Using Clustering Algorithm Technique , 2013 .
[51] Ying Wang,et al. Computer Crime Forensics Based on Improved Decision Tree Algorithm , 2014, J. Networks.
[52] Priyanka Pitale,et al. Prediction tool for Crime Analysis , 2012 .
[53] Martin A. Andresen. Estimating the probability of local crime clusters: The impact of immediate spatial neighbors , 2011 .