Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record
碩士 === 南台科技大學 === 資訊管理系 === 93 === Communication technology brings the convenience not only in daily life but also in the work. But the situation that it is abused is worse and worse. The most influence is that gangsters use it as communication tool to do something criminal. In the meanwhile, it als...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2005
|
Online Access: | http://ndltd.ncl.edu.tw/handle/09103995553183379178 |
id |
ndltd-TW-093STUT0396032 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-TW-093STUT03960322016-11-22T04:12:13Z http://ndltd.ncl.edu.tw/handle/09103995553183379178 Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record 應用探勘技術發掘通聯紀錄中具有潛在犯罪傾向之嫌疑犯 Lan cheng syuan 藍承炫 碩士 南台科技大學 資訊管理系 93 Communication technology brings the convenience not only in daily life but also in the work. But the situation that it is abused is worse and worse. The most influence is that gangsters use it as communication tool to do something criminal. In the meanwhile, it also becomes one of the targets that the law officers detect. The telecommunication company records users’ call detail record to count every user’s bill. Through analyzing and studying the users’ call detail record, we can learn the suspects’ relation to friends, living habits, the area of the movement and the probability of crime, even the potential criminals. In the study, we take the information about users call detail record to study the suspects who trend to commit a crime. We provide two methods to find out the potential suspects. One is to look for the suspects. In every user’s call detail record, we count the proportion of frequency that suspects call the suspects who have committed a crime before. When the number adapts the “minimum support of suspects” ,we call them potential suspects who trend to commit a crime. Otherwise, we adopt Association Rules Y→Z. Y is the number of name. Z is the frequency that suspects call the suspects who have committed a crime before. It can show the feature of the trend through Association Rules. We can find out the potential suspects. Tow is to lock certain user. We postulate that the call detail record is D. First, we count the proportion of frequency that the user calls the suspects who trend to commit a crime. When the number adapts the “minimum support of suspects” ,we call him potential suspects who trend to commit a crime. Otherwise, we adopt Association Rules the user→ Z. We can find whether the user is the potential suspects who trend to commit a crime or not through Association Rules. Otherwise, we take the same method to find out the Association Rules Bi→ Z. B is the number of single name. BiD-the suspects who trend to crime. We can find whether the user is the potential suspects who trend to commit a crime or not through Association Rules. The result will provide very useful information so that the law officers can research the suspects who trend to commit a crime and prevent the crime. 陳垂呈 2005 學位論文 ; thesis 77 zh-TW |
collection |
NDLTD |
language |
zh-TW |
format |
Others
|
sources |
NDLTD |
description |
碩士 === 南台科技大學 === 資訊管理系 === 93 === Communication technology brings the convenience not only in daily life but also in the work. But the situation that it is abused is worse and worse. The most influence is that gangsters use it as communication tool to do something criminal. In the meanwhile, it also becomes one of the targets that the law officers detect. The telecommunication company records users’ call detail record to count every user’s bill. Through analyzing and studying the users’ call detail record, we can learn the suspects’ relation to friends, living habits, the area of the movement and the probability of crime, even the potential criminals.
In the study, we take the information about users call detail record to study the suspects who trend to commit a crime. We provide two methods to find out the potential suspects. One is to look for the suspects. In every user’s call detail record, we count the proportion of frequency that suspects call the suspects who have committed a crime before. When the number adapts the “minimum support of suspects” ,we call them potential suspects who trend to commit a crime. Otherwise, we adopt Association Rules Y→Z. Y is the number of name. Z is the frequency that suspects call the suspects who have committed a crime before. It can show the feature of the trend through Association Rules. We can find out the potential suspects. Tow is to lock certain user. We postulate that the call detail record is D. First, we count the proportion of frequency that the user calls the suspects who trend to commit a crime. When the number adapts the “minimum support of suspects” ,we call him potential suspects who trend to commit a crime. Otherwise, we adopt Association Rules the user→ Z. We can find whether the user is the potential suspects who trend to commit a crime or not through Association Rules. Otherwise, we take the same method to find out the Association Rules Bi→ Z. B is the number of single name. BiD-the suspects who trend to crime. We can find whether the user is the potential suspects who trend to commit a crime or not through Association Rules. The result will provide very useful information so that the law officers can research the suspects who trend to commit a crime and prevent the crime.
|
author2 |
陳垂呈 |
author_facet |
陳垂呈 Lan cheng syuan 藍承炫 |
author |
Lan cheng syuan 藍承炫 |
spellingShingle |
Lan cheng syuan 藍承炫 Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record |
author_sort |
Lan cheng syuan |
title |
Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record |
title_short |
Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record |
title_full |
Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record |
title_fullStr |
Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record |
title_full_unstemmed |
Using Data Mining Techniques to Discover the Potential Suspect on alled Detail Record |
title_sort |
using data mining techniques to discover the potential suspect on alled detail record |
publishDate |
2005 |
url |
http://ndltd.ncl.edu.tw/handle/09103995553183379178 |
work_keys_str_mv |
AT lanchengsyuan usingdataminingtechniquestodiscoverthepotentialsuspectonalleddetailrecord AT lánchéngxuàn usingdataminingtechniquestodiscoverthepotentialsuspectonalleddetailrecord AT lanchengsyuan yīngyòngtànkānjìshùfājuétōngliánjìlùzhōngjùyǒuqiánzàifànzuìqīngxiàngzhīxiányífàn AT lánchéngxuàn yīngyòngtànkānjìshùfājuétōngliánjìlùzhōngjùyǒuqiánzàifànzuìqīngxiàngzhīxiányífàn |
_version_ |
1718396253508730880 |