Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record

碩士 === 南台科技大學 === 資訊管理系 === 93 === Communication technology brings the convenience not only in daily life but also in the work. But the situation that it is abused is worse and worse. The most influence is that gangsters use it as communication tool to do something criminal. In the meanwhile, it als...

Full description

Bibliographic Details
Main Authors: Lan cheng syuan, 藍承炫
Other Authors: 陳垂呈
Format: Others
Language:zh-TW
Published: 2005
Online Access:http://ndltd.ncl.edu.tw/handle/09103995553183379178
id ndltd-TW-093STUT0396032
record_format oai_dc
spelling ndltd-TW-093STUT03960322016-11-22T04:12:13Z http://ndltd.ncl.edu.tw/handle/09103995553183379178 Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record 應用探勘技術發掘通聯紀錄中具有潛在犯罪傾向之嫌疑犯 Lan cheng syuan 藍承炫 碩士 南台科技大學 資訊管理系 93 Communication technology brings the convenience not only in daily life but also in the work. But the situation that it is abused is worse and worse. The most influence is that gangsters use it as communication tool to do something criminal. In the meanwhile, it also becomes one of the targets that the law officers detect. The telecommunication company records users’ call detail record to count every user’s bill. Through analyzing and studying the users’ call detail record, we can learn the suspects’ relation to friends, living habits, the area of the movement and the probability of crime, even the potential criminals. In the study, we take the information about users call detail record to study the suspects who trend to commit a crime. We provide two methods to find out the potential suspects. One is to look for the suspects. In every user’s call detail record, we count the proportion of frequency that suspects call the suspects who have committed a crime before. When the number adapts the “minimum support of suspects” ,we call them potential suspects who trend to commit a crime. Otherwise, we adopt Association Rules Y→Z. Y is the number of name. Z is the frequency that suspects call the suspects who have committed a crime before. It can show the feature of the trend through Association Rules. We can find out the potential suspects. Tow is to lock certain user. We postulate that the call detail record is D. First, we count the proportion of frequency that the user calls the suspects who trend to commit a crime. When the number adapts the “minimum support of suspects” ,we call him potential suspects who trend to commit a crime. Otherwise, we adopt Association Rules the user→ Z. We can find whether the user is the potential suspects who trend to commit a crime or not through Association Rules. Otherwise, we take the same method to find out the Association Rules Bi→ Z. B is the number of single name. BiD-the suspects who trend to crime. We can find whether the user is the potential suspects who trend to commit a crime or not through Association Rules. The result will provide very useful information so that the law officers can research the suspects who trend to commit a crime and prevent the crime. 陳垂呈 2005 學位論文 ; thesis 77 zh-TW
collection NDLTD
language zh-TW
format Others
sources NDLTD
description 碩士 === 南台科技大學 === 資訊管理系 === 93 === Communication technology brings the convenience not only in daily life but also in the work. But the situation that it is abused is worse and worse. The most influence is that gangsters use it as communication tool to do something criminal. In the meanwhile, it also becomes one of the targets that the law officers detect. The telecommunication company records users’ call detail record to count every user’s bill. Through analyzing and studying the users’ call detail record, we can learn the suspects’ relation to friends, living habits, the area of the movement and the probability of crime, even the potential criminals. In the study, we take the information about users call detail record to study the suspects who trend to commit a crime. We provide two methods to find out the potential suspects. One is to look for the suspects. In every user’s call detail record, we count the proportion of frequency that suspects call the suspects who have committed a crime before. When the number adapts the “minimum support of suspects” ,we call them potential suspects who trend to commit a crime. Otherwise, we adopt Association Rules Y→Z. Y is the number of name. Z is the frequency that suspects call the suspects who have committed a crime before. It can show the feature of the trend through Association Rules. We can find out the potential suspects. Tow is to lock certain user. We postulate that the call detail record is D. First, we count the proportion of frequency that the user calls the suspects who trend to commit a crime. When the number adapts the “minimum support of suspects” ,we call him potential suspects who trend to commit a crime. Otherwise, we adopt Association Rules the user→ Z. We can find whether the user is the potential suspects who trend to commit a crime or not through Association Rules. Otherwise, we take the same method to find out the Association Rules Bi→ Z. B is the number of single name. BiD-the suspects who trend to crime. We can find whether the user is the potential suspects who trend to commit a crime or not through Association Rules. The result will provide very useful information so that the law officers can research the suspects who trend to commit a crime and prevent the crime.
author2 陳垂呈
author_facet 陳垂呈
Lan cheng syuan
藍承炫
author Lan cheng syuan
藍承炫
spellingShingle Lan cheng syuan
藍承炫
Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record
author_sort Lan cheng syuan
title Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record
title_short Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record
title_full Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record
title_fullStr Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record
title_full_unstemmed Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record
title_sort using data mining techniques to discover the potential suspect on alled detail record
publishDate 2005
url http://ndltd.ncl.edu.tw/handle/09103995553183379178
work_keys_str_mv AT lanchengsyuan usingdataminingtechniquestodiscoverthepotentialsuspectonalleddetailrecord
AT lánchéngxuàn usingdataminingtechniquestodiscoverthepotentialsuspectonalleddetailrecord
AT lanchengsyuan yīngyòngtànkānjìshùfājuétōngliánjìlùzhōngjùyǒuqiánzàifànzuìqīngxiàngzhīxiányífàn
AT lánchéngxuàn yīngyòngtànkānjìshùfājuétōngliánjìlùzhōngjùyǒuqiánzàifànzuìqīngxiàngzhīxiányífàn
_version_ 1718396253508730880