This paper presents a detailed statistical exploration of crime trends in Chicago from 2001 to 2023, employing data from the Chicago Police Department’s publicly available crime database. The study aims to elucidate ...This paper presents a detailed statistical exploration of crime trends in Chicago from 2001 to 2023, employing data from the Chicago Police Department’s publicly available crime database. The study aims to elucidate the patterns, distribution, and variations in crime across different types and locations, providing a comprehensive picture of the city’s crime landscape through advanced data analytics and visualization techniques. Using exploratory data analysis (EDA), we identified significant insights into crime trends, including the prevalence of theft and battery, the impact of seasonal changes on crime rates, and spatial concentrations of criminal activities. The research leveraged a Power BI dashboard to visually represent crime data, facilitating an intuitive understanding of complex patterns and enabling dynamic interaction with the dataset. Key findings highlight notable disparities in crime occurrences by type, location, and time, offering a granular view of crime hotspots and temporal trends. Additionally, the study examines clearance rates, revealing variations in the resolution of cases across different crime categories. This analysis not only sheds light on the current state of urban safety but also serves as a critical tool for policymakers and law enforcement agencies to develop targeted interventions. The paper concludes with recommendations for enhancing public safety strategies and suggests directions for future research, emphasizing the need for continuous data-driven approaches to effectively address and mitigate urban crime. This study contributes to the broader discourse on urban safety, crime prevention, and the role of data analytics in public policy and community well-being.展开更多
Every day,the media reports tons of crimes that are considered by a large number of users and accumulate on a regular basis.Crime news exists on the Internet in unstructured formats such as books,websites,documents,an...Every day,the media reports tons of crimes that are considered by a large number of users and accumulate on a regular basis.Crime news exists on the Internet in unstructured formats such as books,websites,documents,and journals.From such homogeneous data,it is very challenging to extract relevant information which is a time-consuming and critical task for the public and law enforcement agencies.Keyword-based Information Retrieval(IR)systems rely on statistics to retrieve results,making it difficult to obtain relevant results.They are unable to understandthe user’s query and thus facewordmismatchesdue to context changes andthe inevitable semanticsof a given word.Therefore,such datasets need to be organized in a structured configuration,with the goal of efficiently manipulating the data while respecting the semantics of the data.An ontological semantic IR systemis needed that can find the right investigative information and find important clues to solve criminal cases.The semantic system retrieves information in view of the similarity of the semantics among indexed data and user queries.In this paper,we develop anontology-based semantic IRsystemthat leverages the latest semantic technologies including resource description framework(RDF),semantic protocol and RDF query language(SPARQL),semantic web rule language(SWRL),and web ontology language(OWL).We have conducted two experiments.In the first experiment,we implemented a keyword-based textual IR systemusing Apache Lucene.In the second experiment,we implemented a semantic systemthat uses ontology to store the data and retrieve precise results with high accuracy using SPARQL queries.The keyword-based system has filtered results with 51%accuracy,while the semantic system has filtered results with 95%accuracy,leading to significant improvements in the field and opening up new horizons for researchers.展开更多
The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual user...The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.展开更多
Crime scene investigation(CSI)image is key evidence carrier during criminal investiga-tion,in which CSI image retrieval can assist the public police to obtain criminal clues.Moreover,with the rapid development of deep...Crime scene investigation(CSI)image is key evidence carrier during criminal investiga-tion,in which CSI image retrieval can assist the public police to obtain criminal clues.Moreover,with the rapid development of deep learning,data-driven paradigm has become the mainstreammethod of CSI image feature extraction and representation,and in this process,datasets provideeffective support for CSI retrieval performance.However,there is a lack of systematic research onCSI image retrieval methods and datasets.Therefore,we present an overview of the existing worksabout one-class and multi-class CSI image retrieval based on deep learning.According to theresearch,based on their technical functionalities and implementation methods,CSI image retrievalis roughly classified into five categories:feature representation,metric learning,generative adversar-ial networks,autoencoder networks and attention networks.Furthermore,We analyzed the remain-ing challenges and discussed future work directions in this field.展开更多
The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually ente...The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard.展开更多
Researchers have extensively explored the impact of wages on individuals’ decisions to engage in property crimes. While most of these studies in the past have relied on macro-level data to investigate the relationshi...Researchers have extensively explored the impact of wages on individuals’ decisions to engage in property crimes. While most of these studies in the past have relied on macro-level data to investigate the relationship between crime rates and hourly wages, this paper takes a novel approach by utilizing micro-level data to examine the influence of hourly wages on the likelihood of stealing an item valued at least $50. The results obtained from the estimations reveal that an increase in hourly wage leads to a decrease in the probability of theft, all other factors being held constant. Further estimation by gender revealed that hourly wages given to both male and female have no bearing on the decision to steal. Additionally, the analysis of the differences in theft probabilities across gender and race demonstrates that males consistently exhibit a higher likelihood of engaging in theft when compared to females across various racial groups.展开更多
The objective of crime prediction,one of the most important technologies in social computing,is to extract useful information from many existing criminal records to predict the next process-related crime.It can aid th...The objective of crime prediction,one of the most important technologies in social computing,is to extract useful information from many existing criminal records to predict the next process-related crime.It can aid the police in obtaining criminal information and warn the public to be vigilant in certain areas.With the rapid growth of big data,the Internet of Things,and other technologies,as well as the increasing use of artificial intelligence in forecasting models,crime prediction models based on deep learning techniques are accelerating.Therefore,it is necessary to classify the existing crime prediction algorithms and compare in depth the attributes and conditions that play an essential role in the analysis of crime prediction algorithms.Existing crime prediction methods can be roughly divided into two categories:those based on conventional machine learning and those based on contemporary deep learning.This survey analyses the fundamental theories and procedures.The most frequently used data sets are then enumerated,and the fundamental procedures of various algorithms are also analyzed in this paper.In light of the insufficient scale of existing data in this field,the ambiguity of data types used to predict crimes,and the absence of public data sets that have a significant impact on the research of algorithm models,this survey proposes the construction of a machine learning-based big data research model to address these issues.Future researchers who will enter this field are provided with a guide to the direction of future research development.展开更多
In recent years, increased attention from the media, the international community and policy makers has highlighted the destabilizing effects criminal networks have on the legitimacy of democratic politics, as well as ...In recent years, increased attention from the media, the international community and policy makers has highlighted the destabilizing effects criminal networks have on the legitimacy of democratic politics, as well as the capacity of democratic systems to deliver basic services. Indeed, the Organization for Economic Co-operation and Development highlighted in 2014 how illicit financial flows drain the state from resources needed to provide basic services (OECD, 2014). While this problem affects not only developing and fragile states, these countries are particularly affected as this phenomenon tends to exacerbate inequality (Briscoe, Perdomo & Uribe Burcher, 2014). Mapping the factors that make politics vulnerable to the influence of organized crime is a key element in the effort to implement adequate strategies to prevent and mitigate this phenomenon. This paper explores 21 threat factors identified, understood as some of the conditions that may contribute to the likelihood that political corruption linked to organized crime takes place. These threat factors underline institutional weaknesses--including those related to illicit political fmance---and organized crime activities, which create opportunities for illicit networks to penetrate democratic political systems. The paper also discusses how these institutional weaknesses interrelate to specific criminal markets and networks. The paper draws from extensive desk research in 2015, which complements previous desk and field research on the same topic carded out in 2011-2014 in the Baltic States, Latin America and West Africa.展开更多
The network is a major platform for implementing new cyber-telecom crimes.Therefore,it is important to carry out monitoring and early warning research on new cyber-telecom crime platforms,which will lay the foundation...The network is a major platform for implementing new cyber-telecom crimes.Therefore,it is important to carry out monitoring and early warning research on new cyber-telecom crime platforms,which will lay the foundation for the establishment of prevention and control systems to protect citizens’property.However,the deep-learning methods applied in the monitoring and early warning of new cyber-telecom crime platforms have some apparent drawbacks.For instance,the methods suffer from data-distribution differences and tremendous manual efforts spent on data labeling.Therefore,a monitoring and early warning method for new cyber-telecom crime platforms based on the BERT migration learning model is proposed.This method first identifies the text data and their tags,and then performs migration training based on a pre-training model.Finally,the method uses the fine-tuned model to predict and classify new cyber-telecom crimes.Experimental analysis on the crime data collected by public security organizations shows that higher classification accuracy can be achieved using the proposed method,compared with the deep-learning method.展开更多
Crimes are expected to rise with an increase in population and the rising gap between society’s income levels.Crimes contribute to a significant portion of the socioeconomic loss to any society,not only through its i...Crimes are expected to rise with an increase in population and the rising gap between society’s income levels.Crimes contribute to a significant portion of the socioeconomic loss to any society,not only through its indirect damage to the social fabric and peace but also the more direct negative impacts on the economy,social parameters,and reputation of a nation.Policing and other preventive resources are limited and have to be utilized.The conventional methods are being superseded by more modern approaches of machine learning algorithms capable of making predictions where the relationships between the features and the outcomes are complex.Making it possible for such algorithms to provide indicators of specific areas that may become criminal hot-spots.These predictions can be used by policymakers and police personals alike to make effective and informed strategies that can curtail criminal activities and contribute to the nation’s development.This paper aims to predict factors that most affected crimes in Saudi Arabia by developing a machine learning model to predict an acceptable output value.Our results show that FAMD as features selection methods showed more accuracy on machine learning classifiers than the PCA method.The naïve Bayes classifier performs better than other classifiers on both features selections methods with an accuracy of 97.53%for FAMD,and PCA equals to 97.10%.展开更多
The increasing rate of insecurity in Nigeria, especially the southwest requires a paradigm shift from popular approach to crime hotspots detection. This study employed geospatial technologies to integrate spatio-tempo...The increasing rate of insecurity in Nigeria, especially the southwest requires a paradigm shift from popular approach to crime hotspots detection. This study employed geospatial technologies to integrate spatio-temporal crime, social media and field observation data from the communities in all the six states in the southwest to develop crime hotspots that can serve as preliminary information to assist in allocating resources for crime control and prevention. Historical crime data from January 1972 to April, 2021 were compiled and updated with rigorous field survey in September, 2021. The field data were encoded, input to the SPSS 17 and analyzed using descriptive statistics and multivariate analysis. A total 936 crime locations data were geolocated and exported to ArcGIS 10.5 for spatial mapping using point map operation and further imported to e-Spatial web-based and QGIS for the generation of hotspot map using heatmap tool. The results revealed that armed robbery, assassination and cultism were more pronounced in Lagos and Ogun States. Similarly, high incidences of farmers/herdsmen conflicts are observed in Oyo and Osun States. Increasing incidences of kidnapping are common in all the south-western states but very prominent in Ondo, Lagos and Oyo States. Most of the violent crime incidents took place along the highways, with forests being their hideouts. Violent crimes are dominantly caused by high rate of unemployment while farmer/herdsmen conflicts were majorly triggered by the scarcity of grazing fields and destruction of arable crops. The conflicts have resulted in the increasing cases of rape and disruption of social group, intake of hard drugs, cult-related activities, low income and revenue generation, and displacement of farmers and infrastructural damages. The study advocates regular retraining and equipping of security agents, establishment of cattle ranch, and installation of sophisticated IP Camera at the crime hotspots to assist in real-time crime monitoring and management.展开更多
With the method of dynamic programming, two spatial variables,the expected utility and the probability of success of each crime, are used to model the criminal's location choices in urban areas in this paper.The m...With the method of dynamic programming, two spatial variables,the expected utility and the probability of success of each crime, are used to model the criminal's location choices in urban areas in this paper.The modeling results show that a criminal optimizes his crime locations according to the expected utility and the success probability during his planned period A criminal usually commits his first offense in the district that has the highest probability of success but a lower expected utility, and commits his last crime in the district where the expected utility is the highest and success probability is lower.If a location has both an expected utility and a higher probability of success, the criminal might commit all his offenses in thes place. The model also suggests that crime prevention measures should be adopted in accordance with local conditions. 'Covering' measures, such as patrolling, should be taken in the poor residential districts or juvenile delinquency districts, while more sophisticated and advanced measures should be introduced in the richer districts or the districts where professional criminals haunt.展开更多
The feature analysis of fraudulent websites is of great significance to the combat,prevention and control of telecom fraud crimes.Aiming to address the shortcomings of existing analytical approaches,i.e.single dimensi...The feature analysis of fraudulent websites is of great significance to the combat,prevention and control of telecom fraud crimes.Aiming to address the shortcomings of existing analytical approaches,i.e.single dimension and venerability to anti-reconnaissance,this paper adopts the Stacking,the ensemble learning algorithm,combines multiple modalities such as text,image and URL,and proposes a multimodal fraudulent website identification method by ensembling heterogeneous models.Crossvalidation is first used in the training of multiple largely different base classifiers that are strong in learning,such as BERT model,residual neural network(ResNet)and logistic regression model.Classification of the text,image and URL features are then performed respectively.The results of the base classifiers are taken as the input of the meta-classifier,and the output of which is eventually used as the final identification.The study indicates that the fusion method is more effective in identifying fraudulent websites than the single-modal method,and the recall is increased by at least 1%.In addition,the deployment of the algorithm to the real Internet environment shows the improvement of the identification accuracy by at least 1.9%compared with other fusion methods.展开更多
Poverty and crime are two maladies that plague metropolitan areas. The economic theory of crime[1]demonstrates a direct correlation between poverty and crime. The model considered in this study seeks to examine the dy...Poverty and crime are two maladies that plague metropolitan areas. The economic theory of crime[1]demonstrates a direct correlation between poverty and crime. The model considered in this study seeks to examine the dynamics of the poverty-crime system through stability analysis of a system of ordinary differential equations in order to identify cost-effective strategies to combat crime in metropolises.展开更多
Background: Association between violence and mental disorders has contributed immensely to the stigma associated with mental illness in the society;because people erroneously see mentally ill individuals as dangerous,...Background: Association between violence and mental disorders has contributed immensely to the stigma associated with mental illness in the society;because people erroneously see mentally ill individuals as dangerous, they will not want to associate with them. Aims: To assess the prevalence and pattern of psychiatric disorders among a sample of the violent offenders and to examine any relationship between psychiatric disorders and crimes. Method: This was a two-phase cross-sectional study in three police stations in Ile-Ife/Modakeke area of Nigeria. In the first phase, we screened 400 consecutive adults arrested for violent crimes using the General Health Questionnaire—30. In the second phase, all 36 persons with probable psychopathology were then interviewed with the Present State Examination to make a definitive diagnosis. Results: The mean age of all the subjects was 29.9 years (SD ± 7.3). The male to female ratio was 11:1. Respondents were mostly single (54%);most had secondary education or less (82%) and about 60% were currently using psychoactive substances (drugs). About 8.5% of all the subjects had a diagnosable psychiatric disorder;paranoid schizophrenia was the commonest psychiatric disorder (41.2%). Mentally ill subjects were three times more likely to commit homicidal offence than non-mentally ill subjects. Conclusion: There exists a significant but weak relationship between mental illness and violent crimes.展开更多
The study examines the Spatial Pattern and Distribution of Crime in Suleja LGA, Niger State, Nigeria. The study used GIS and statistical methods to analyse the pattern and distribution of crime incidence in the study ...The study examines the Spatial Pattern and Distribution of Crime in Suleja LGA, Niger State, Nigeria. The study used GIS and statistical methods to analyse the pattern and distribution of crime incidence in the study area. The records of each crime incidence were geocoded. Microsoft Excel was used to collate and organise the crime entries before they were imported into the ArcGIS Pro 2.0 environment. A geodatabase was created where the spatial and aspatial data were encoded and geospatial analysis was performed. The study reveals that the crime distribution pattern is generally clustered with a Global Moran’s I index of 0.097, a Z-score of 1.87, and a P-value < 0.06. Furthermore, the study reveals that armed robbery (61), kidnapping (40), car theft (33), culpable homicide (31), rape (29), and robbery (13) cases rank the highest in crime rate. Equally, findings of the study show that Chaza, Kwamba, Madalla, Suleja central, and Gaboda are the major crime hotspot zones at 90% confidence, as analysed using the Getis-Ord Gi* (Hot spot analysis) spatial statistics tool in ArcGIS Pro 2.0. The research therefore recommends that more effort be put into fighting crime, especially in areas where there are low-security formations, as they mostly have the highest record of crimes committed. Also, the patrol units should be equipped with GPS for better surveillance and real-time tracking of criminal activities.展开更多
There has been evidence of crime in the US since colonization. In this article, we analyze the crime statistics of San Francisco and its resolution of crime recorded from January to September of the year 2018. We defi...There has been evidence of crime in the US since colonization. In this article, we analyze the crime statistics of San Francisco and its resolution of crime recorded from January to September of the year 2018. We define resolution of crime as a target variable and study its relationship with other variables. We make several classification models to predict resolution of crime using several data mining techniques and suggest the best model for predicting resolution.展开更多
文摘This paper presents a detailed statistical exploration of crime trends in Chicago from 2001 to 2023, employing data from the Chicago Police Department’s publicly available crime database. The study aims to elucidate the patterns, distribution, and variations in crime across different types and locations, providing a comprehensive picture of the city’s crime landscape through advanced data analytics and visualization techniques. Using exploratory data analysis (EDA), we identified significant insights into crime trends, including the prevalence of theft and battery, the impact of seasonal changes on crime rates, and spatial concentrations of criminal activities. The research leveraged a Power BI dashboard to visually represent crime data, facilitating an intuitive understanding of complex patterns and enabling dynamic interaction with the dataset. Key findings highlight notable disparities in crime occurrences by type, location, and time, offering a granular view of crime hotspots and temporal trends. Additionally, the study examines clearance rates, revealing variations in the resolution of cases across different crime categories. This analysis not only sheds light on the current state of urban safety but also serves as a critical tool for policymakers and law enforcement agencies to develop targeted interventions. The paper concludes with recommendations for enhancing public safety strategies and suggests directions for future research, emphasizing the need for continuous data-driven approaches to effectively address and mitigate urban crime. This study contributes to the broader discourse on urban safety, crime prevention, and the role of data analytics in public policy and community well-being.
文摘Every day,the media reports tons of crimes that are considered by a large number of users and accumulate on a regular basis.Crime news exists on the Internet in unstructured formats such as books,websites,documents,and journals.From such homogeneous data,it is very challenging to extract relevant information which is a time-consuming and critical task for the public and law enforcement agencies.Keyword-based Information Retrieval(IR)systems rely on statistics to retrieve results,making it difficult to obtain relevant results.They are unable to understandthe user’s query and thus facewordmismatchesdue to context changes andthe inevitable semanticsof a given word.Therefore,such datasets need to be organized in a structured configuration,with the goal of efficiently manipulating the data while respecting the semantics of the data.An ontological semantic IR systemis needed that can find the right investigative information and find important clues to solve criminal cases.The semantic system retrieves information in view of the similarity of the semantics among indexed data and user queries.In this paper,we develop anontology-based semantic IRsystemthat leverages the latest semantic technologies including resource description framework(RDF),semantic protocol and RDF query language(SPARQL),semantic web rule language(SWRL),and web ontology language(OWL).We have conducted two experiments.In the first experiment,we implemented a keyword-based textual IR systemusing Apache Lucene.In the second experiment,we implemented a semantic systemthat uses ontology to store the data and retrieve precise results with high accuracy using SPARQL queries.The keyword-based system has filtered results with 51%accuracy,while the semantic system has filtered results with 95%accuracy,leading to significant improvements in the field and opening up new horizons for researchers.
文摘The Kingdom of Saudi Arabia(KSA)has achieved significant milestones in cybersecurity.KSA has maintained solid regulatorymechanisms to prevent,trace,and punish offenders to protect the interests of both individual users and organizations from the online threats of data poaching and pilferage.The widespread usage of Information Technology(IT)and IT Enable Services(ITES)reinforces securitymeasures.The constantly evolving cyber threats are a topic that is generating a lot of discussion.In this league,the present article enlists a broad perspective on how cybercrime is developing in KSA at present and also takes a look at some of the most significant attacks that have taken place in the region.The existing legislative framework and measures in the KSA are geared toward deterring criminal activity online.Different competency models have been devised to address the necessary cybercrime competencies in this context.The research specialists in this domain can benefit more by developing a master competency level for achieving optimum security.To address this research query,the present assessment uses the Fuzzy Decision-Making Trial and Evaluation Laboratory(Fuzzy-DMTAEL),Fuzzy Analytic Hierarchy Process(F.AHP),and Fuzzy TOPSIS methodology to achieve segment-wise competency development in cyber security policy.The similarities and differences between the three methods are also discussed.This cybersecurity analysis determined that the National Cyber Security Centre got the highest priority.The study concludes by perusing the challenges that still need to be examined and resolved in effectuating more credible and efficacious online security mechanisms to offer amoreempowered ITES-driven economy for SaudiArabia.Moreover,cybersecurity specialists and policymakers need to collate their efforts to protect the country’s digital assets in the era of overt and covert cyber warfare.
文摘Crime scene investigation(CSI)image is key evidence carrier during criminal investiga-tion,in which CSI image retrieval can assist the public police to obtain criminal clues.Moreover,with the rapid development of deep learning,data-driven paradigm has become the mainstreammethod of CSI image feature extraction and representation,and in this process,datasets provideeffective support for CSI retrieval performance.However,there is a lack of systematic research onCSI image retrieval methods and datasets.Therefore,we present an overview of the existing worksabout one-class and multi-class CSI image retrieval based on deep learning.According to theresearch,based on their technical functionalities and implementation methods,CSI image retrievalis roughly classified into five categories:feature representation,metric learning,generative adversar-ial networks,autoencoder networks and attention networks.Furthermore,We analyzed the remain-ing challenges and discussed future work directions in this field.
基金supported by the Major Com-missioned Project of Social Science Planning Fund of Liaoning Prov-ince,China:“Research on Legal Issues of Cross-border Nuclear Dam-age Compensation in the Context of Japan’s Discharge of Nuclear Sewage”[Grant No.L23ZD072].
文摘The discharge of nuclear-contaminated water containing radionuclides into the ocean by Japan will lead to its integration into the entire ecosystem through processes of circulation and biomagnification,eventually entering the human body via the food chain.This poses a substantial risk of irreversible damage to both the ecosystem and human health,a situation that will worsen with the ongoing discharge of such water.The respect and protection of human rights represent an international consensus,and safeguarding fundamental human rights is a substantial obligation that states must undertake in accordance with both international and domestic law.Since the Fukushima nuclear disaster,Japan has continuously violated its international legal obligations to protect human rights in several areas,including the resettlement of disaster victims,the reduction of nuclear radiation levels,and the handling of contaminated water.Such actions have compromised and will continue to compromise the basic human rights of not only its citizens but also those of people worldwide,including environmental rights,the right to life,development rights,and food rights.In the aftermath of the Fukushima meltdown,the public and workers involved in handling nuclear contaminants have been continually exposed to high radiation levels,endangering their rights to life,development,and health.Japan’s inadequate efforts in victim resettlement and environmental restoration have jeopardized the environmental and food rights of its citizens to live healthily and access food in an environment unaffected by nuclear radiation.The release of nuclear-contaminated water poses a risk of Japan’s nuclear pollution to the people of neighboring countries and the global population at large.The principle of human rights underpins the theory of a community with a shared future for humanity,and human rights are a crucial area of China’s active participation in United Nations affairs and global governance.By voicing concerns over Japan’s potential human rights violations globally,China demonstrates its role as a responsible major country.In response to Japan’s breach of legal obligations and human rights violations,China can adopt a reasoned and beneficial approach,including calling on the international community to hold Japan criminally accountable for crimes against humanity under the Rome Statute and advancing scholarly discussions on ecocide and crimes against the marine environment.Furthermore,China should persist in seeking advisory opinions from the International Court of Justice and strive for substantive accountability,utilizing the mechanisms of international human rights organizations to make its voice heard.
文摘Researchers have extensively explored the impact of wages on individuals’ decisions to engage in property crimes. While most of these studies in the past have relied on macro-level data to investigate the relationship between crime rates and hourly wages, this paper takes a novel approach by utilizing micro-level data to examine the influence of hourly wages on the likelihood of stealing an item valued at least $50. The results obtained from the estimations reveal that an increase in hourly wage leads to a decrease in the probability of theft, all other factors being held constant. Further estimation by gender revealed that hourly wages given to both male and female have no bearing on the decision to steal. Additionally, the analysis of the differences in theft probabilities across gender and race demonstrates that males consistently exhibit a higher likelihood of engaging in theft when compared to females across various racial groups.
文摘The objective of crime prediction,one of the most important technologies in social computing,is to extract useful information from many existing criminal records to predict the next process-related crime.It can aid the police in obtaining criminal information and warn the public to be vigilant in certain areas.With the rapid growth of big data,the Internet of Things,and other technologies,as well as the increasing use of artificial intelligence in forecasting models,crime prediction models based on deep learning techniques are accelerating.Therefore,it is necessary to classify the existing crime prediction algorithms and compare in depth the attributes and conditions that play an essential role in the analysis of crime prediction algorithms.Existing crime prediction methods can be roughly divided into two categories:those based on conventional machine learning and those based on contemporary deep learning.This survey analyses the fundamental theories and procedures.The most frequently used data sets are then enumerated,and the fundamental procedures of various algorithms are also analyzed in this paper.In light of the insufficient scale of existing data in this field,the ambiguity of data types used to predict crimes,and the absence of public data sets that have a significant impact on the research of algorithm models,this survey proposes the construction of a machine learning-based big data research model to address these issues.Future researchers who will enter this field are provided with a guide to the direction of future research development.
文摘In recent years, increased attention from the media, the international community and policy makers has highlighted the destabilizing effects criminal networks have on the legitimacy of democratic politics, as well as the capacity of democratic systems to deliver basic services. Indeed, the Organization for Economic Co-operation and Development highlighted in 2014 how illicit financial flows drain the state from resources needed to provide basic services (OECD, 2014). While this problem affects not only developing and fragile states, these countries are particularly affected as this phenomenon tends to exacerbate inequality (Briscoe, Perdomo & Uribe Burcher, 2014). Mapping the factors that make politics vulnerable to the influence of organized crime is a key element in the effort to implement adequate strategies to prevent and mitigate this phenomenon. This paper explores 21 threat factors identified, understood as some of the conditions that may contribute to the likelihood that political corruption linked to organized crime takes place. These threat factors underline institutional weaknesses--including those related to illicit political fmance---and organized crime activities, which create opportunities for illicit networks to penetrate democratic political systems. The paper also discusses how these institutional weaknesses interrelate to specific criminal markets and networks. The paper draws from extensive desk research in 2015, which complements previous desk and field research on the same topic carded out in 2011-2014 in the Baltic States, Latin America and West Africa.
基金supported in part by the Basic Public Welfare Research Program of Zhejiang Province under Grant LGF20G030001.
文摘The network is a major platform for implementing new cyber-telecom crimes.Therefore,it is important to carry out monitoring and early warning research on new cyber-telecom crime platforms,which will lay the foundation for the establishment of prevention and control systems to protect citizens’property.However,the deep-learning methods applied in the monitoring and early warning of new cyber-telecom crime platforms have some apparent drawbacks.For instance,the methods suffer from data-distribution differences and tremendous manual efforts spent on data labeling.Therefore,a monitoring and early warning method for new cyber-telecom crime platforms based on the BERT migration learning model is proposed.This method first identifies the text data and their tags,and then performs migration training based on a pre-training model.Finally,the method uses the fine-tuned model to predict and classify new cyber-telecom crimes.Experimental analysis on the crime data collected by public security organizations shows that higher classification accuracy can be achieved using the proposed method,compared with the deep-learning method.
文摘Crimes are expected to rise with an increase in population and the rising gap between society’s income levels.Crimes contribute to a significant portion of the socioeconomic loss to any society,not only through its indirect damage to the social fabric and peace but also the more direct negative impacts on the economy,social parameters,and reputation of a nation.Policing and other preventive resources are limited and have to be utilized.The conventional methods are being superseded by more modern approaches of machine learning algorithms capable of making predictions where the relationships between the features and the outcomes are complex.Making it possible for such algorithms to provide indicators of specific areas that may become criminal hot-spots.These predictions can be used by policymakers and police personals alike to make effective and informed strategies that can curtail criminal activities and contribute to the nation’s development.This paper aims to predict factors that most affected crimes in Saudi Arabia by developing a machine learning model to predict an acceptable output value.Our results show that FAMD as features selection methods showed more accuracy on machine learning classifiers than the PCA method.The naïve Bayes classifier performs better than other classifiers on both features selections methods with an accuracy of 97.53%for FAMD,and PCA equals to 97.10%.
文摘The increasing rate of insecurity in Nigeria, especially the southwest requires a paradigm shift from popular approach to crime hotspots detection. This study employed geospatial technologies to integrate spatio-temporal crime, social media and field observation data from the communities in all the six states in the southwest to develop crime hotspots that can serve as preliminary information to assist in allocating resources for crime control and prevention. Historical crime data from January 1972 to April, 2021 were compiled and updated with rigorous field survey in September, 2021. The field data were encoded, input to the SPSS 17 and analyzed using descriptive statistics and multivariate analysis. A total 936 crime locations data were geolocated and exported to ArcGIS 10.5 for spatial mapping using point map operation and further imported to e-Spatial web-based and QGIS for the generation of hotspot map using heatmap tool. The results revealed that armed robbery, assassination and cultism were more pronounced in Lagos and Ogun States. Similarly, high incidences of farmers/herdsmen conflicts are observed in Oyo and Osun States. Increasing incidences of kidnapping are common in all the south-western states but very prominent in Ondo, Lagos and Oyo States. Most of the violent crime incidents took place along the highways, with forests being their hideouts. Violent crimes are dominantly caused by high rate of unemployment while farmer/herdsmen conflicts were majorly triggered by the scarcity of grazing fields and destruction of arable crops. The conflicts have resulted in the increasing cases of rape and disruption of social group, intake of hard drugs, cult-related activities, low income and revenue generation, and displacement of farmers and infrastructural damages. The study advocates regular retraining and equipping of security agents, establishment of cattle ranch, and installation of sophisticated IP Camera at the crime hotspots to assist in real-time crime monitoring and management.
文摘With the method of dynamic programming, two spatial variables,the expected utility and the probability of success of each crime, are used to model the criminal's location choices in urban areas in this paper.The modeling results show that a criminal optimizes his crime locations according to the expected utility and the success probability during his planned period A criminal usually commits his first offense in the district that has the highest probability of success but a lower expected utility, and commits his last crime in the district where the expected utility is the highest and success probability is lower.If a location has both an expected utility and a higher probability of success, the criminal might commit all his offenses in thes place. The model also suggests that crime prevention measures should be adopted in accordance with local conditions. 'Covering' measures, such as patrolling, should be taken in the poor residential districts or juvenile delinquency districts, while more sophisticated and advanced measures should be introduced in the richer districts or the districts where professional criminals haunt.
基金supported by Zhejiang Provincial Natural Science Foundation of China(Grant No.LGF20G030001)Ministry of Public Security Science and Technology Plan Project(2022LL16)Key scientific research projects of agricultural and social development in Hangzhou in 2020(202004A06).
文摘The feature analysis of fraudulent websites is of great significance to the combat,prevention and control of telecom fraud crimes.Aiming to address the shortcomings of existing analytical approaches,i.e.single dimension and venerability to anti-reconnaissance,this paper adopts the Stacking,the ensemble learning algorithm,combines multiple modalities such as text,image and URL,and proposes a multimodal fraudulent website identification method by ensembling heterogeneous models.Crossvalidation is first used in the training of multiple largely different base classifiers that are strong in learning,such as BERT model,residual neural network(ResNet)and logistic regression model.Classification of the text,image and URL features are then performed respectively.The results of the base classifiers are taken as the input of the meta-classifier,and the output of which is eventually used as the final identification.The study indicates that the fusion method is more effective in identifying fraudulent websites than the single-modal method,and the recall is increased by at least 1%.In addition,the deployment of the algorithm to the real Internet environment shows the improvement of the identification accuracy by at least 1.9%compared with other fusion methods.
文摘Poverty and crime are two maladies that plague metropolitan areas. The economic theory of crime[1]demonstrates a direct correlation between poverty and crime. The model considered in this study seeks to examine the dynamics of the poverty-crime system through stability analysis of a system of ordinary differential equations in order to identify cost-effective strategies to combat crime in metropolises.
文摘Background: Association between violence and mental disorders has contributed immensely to the stigma associated with mental illness in the society;because people erroneously see mentally ill individuals as dangerous, they will not want to associate with them. Aims: To assess the prevalence and pattern of psychiatric disorders among a sample of the violent offenders and to examine any relationship between psychiatric disorders and crimes. Method: This was a two-phase cross-sectional study in three police stations in Ile-Ife/Modakeke area of Nigeria. In the first phase, we screened 400 consecutive adults arrested for violent crimes using the General Health Questionnaire—30. In the second phase, all 36 persons with probable psychopathology were then interviewed with the Present State Examination to make a definitive diagnosis. Results: The mean age of all the subjects was 29.9 years (SD ± 7.3). The male to female ratio was 11:1. Respondents were mostly single (54%);most had secondary education or less (82%) and about 60% were currently using psychoactive substances (drugs). About 8.5% of all the subjects had a diagnosable psychiatric disorder;paranoid schizophrenia was the commonest psychiatric disorder (41.2%). Mentally ill subjects were three times more likely to commit homicidal offence than non-mentally ill subjects. Conclusion: There exists a significant but weak relationship between mental illness and violent crimes.
文摘The study examines the Spatial Pattern and Distribution of Crime in Suleja LGA, Niger State, Nigeria. The study used GIS and statistical methods to analyse the pattern and distribution of crime incidence in the study area. The records of each crime incidence were geocoded. Microsoft Excel was used to collate and organise the crime entries before they were imported into the ArcGIS Pro 2.0 environment. A geodatabase was created where the spatial and aspatial data were encoded and geospatial analysis was performed. The study reveals that the crime distribution pattern is generally clustered with a Global Moran’s I index of 0.097, a Z-score of 1.87, and a P-value < 0.06. Furthermore, the study reveals that armed robbery (61), kidnapping (40), car theft (33), culpable homicide (31), rape (29), and robbery (13) cases rank the highest in crime rate. Equally, findings of the study show that Chaza, Kwamba, Madalla, Suleja central, and Gaboda are the major crime hotspot zones at 90% confidence, as analysed using the Getis-Ord Gi* (Hot spot analysis) spatial statistics tool in ArcGIS Pro 2.0. The research therefore recommends that more effort be put into fighting crime, especially in areas where there are low-security formations, as they mostly have the highest record of crimes committed. Also, the patrol units should be equipped with GPS for better surveillance and real-time tracking of criminal activities.
文摘There has been evidence of crime in the US since colonization. In this article, we analyze the crime statistics of San Francisco and its resolution of crime recorded from January to September of the year 2018. We define resolution of crime as a target variable and study its relationship with other variables. We make several classification models to predict resolution of crime using several data mining techniques and suggest the best model for predicting resolution.