Abstract
Community Policing operates in an interconnected world and as such could benefit from the latest technological advances such as computational or artificial intelligence. In this chapter, we describe a new method for applying computational intelligence to Community Policing and forensic investigation based on heterogeneous data. To illustrate the proposed method, we apply it to the well-known VAST Challenge 2014. Experimental results show how the proposed method can reduce the process of investigation in finding anomalies in heterogeneous data. The integration of data with the proposed method can simplify the tedious and time consuming job of processing huge amount of data and assist the human expert in making decision and analysis.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Ali AM, Angelov P, Gu X (2016) Detecting anomalous behaviour using heterogeneous data. In: Advances in computational intelligence systems: contributions presented at the 16th UK workshop on computational intelligence, Lancaster, UK, 7–9 September 2016
Angelov P (2013a) Autonomous learning systems. Wiley, London
Angelov P (2013b) Outside the box: an alternative data analytics frame-work. J Autom Mob Robot Intell Syst 8:35–42
Angelov P (2014) Anomaly detection based on eccentricity analysis. In: 2014 IEEE symposium on evolving and autonomous learning systems, IEEE Press, Orlando, p 1–8
Angelov P (2015) Typicality distribution function—a new density—based data analytics tool. In: IJCNN 2015 international joint conference on neural networks, p 1–8
Angelov P, Xiaowei G, Kangin D, Principe J (2016) Empirical data analysis: a new tool for data analytics. In IEEE international conference on systems, man, and cybernetics, p 52–59
Bera A, Bhattacharjee D, Nasipuri M (2014) Hand biometrics in digital forensics. Comput Intell Digit Forensics Forensic Invest Appl 1:145–163
Bhowmik S, Ghosh AK, Debsinha J, and Kajal R (2016) A literature survey on human identification by gait. Imp J Interdisc Res 2(7):1340–1343
Bouchrika I, Goffredo M, Carter J, and Nixon MS (2011) On using gait in forensic biometrics. J Forensic Sci 56(4):882–889
Canty AJ, Davison AC, Hinkley DV, Ventura V (2006) Bootstrap diagnostics and remedies. J Stat 34(1):5–27, 2
Costa BSJ, Angelov PP, Guedes LA (2014) Real-time fault detection using recursive density estimation. J Control Autom Electr Syst 25(4):428–437
Dantcheva A, Velardo C, Dugelay ADAJ (2011) Bag of soft biometrics for person identification, Multimedia Tools Appl pp. 739–777
Eidinger E, Enbar R, Hassner T (2014) Age and gender estimation of unfiltered faces. IEEE Trans Inf Forensics Secur 9(12):2170–2179
Guarino A (2013) Digital forensics as a big data challenge. In: ISSE 2013 securing electronic business processes, Springer, Germany, p 197–203
Jagadish HV, Gehrke J, Labrinidis A, Papakonstantinou Y, Patel JM, Ramakrishnan R, Shahabi C (2014) Big data and its technical challenges. Commun ACM 57(7):86–94
Kim Y, Kogan A (2014) Development of an anomaly detection model for a bank’s transitory account system. J Inf Syst 28(1):145–165
Kim AC, Park WH, Lee DH (2013) A study on the live forensic techniques for anomaly detection in user terminals. Int J Secur Appl 7(1):181–188
Mitchell FR (2014) An overview of artificial intelligence based pattern matching in a security and digital forensic context. In: Cyberpatterns, Springer, Switzerland, p 215–222
Mone F, Walsh C, Mulcahy C, Mcmahon CJ, Farrell S, Mactiernan A, Segurado R, Mahony R, Higgins S, Carroll S, Mcparland P, Mcauliffe FM (2015) Prenatal detection of structural cardiac defects and presence of associated anomalies : a retrospective observational study of 1262 fetal echocardiograms. no. 1
Nater F, Leuven KU (2012) Abnormal behavior detection in surveillance videos. no. 20377
Pratama SF, Pratiwi L, Abraham A, Muda AK (2014) Computational intelligence in digital forensics. Comput Intell Digit Forensics Forensic Invest Appl 1:1–16
Qi M, Liu Y, Lu L, Liu J, Li M (2014) Big data management in digital forensics. In: 2014 IEEE 17th international conference of computational science and engineering, p 238–243
Tistarelli M, Grosso E, Meuwly D (2014) Biometric in forensic science: challenges, lessons and new technologies. In: Cantoni V, Dimov D, Tistarelli M (eds) Biometric authentication, vol 8897. Springer International Publishing, Switzerland, pp 153–164
Zuech R, Khoshgoftaar TM, Wald R (2015) Intrusion detection and big heterogeneous data: a survey. J Big Data 2(1):1–41
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Ali, A.M., Angelov, P. (2017). Applying Computational Intelligence to Community Policing and Forensic Investigations. In: Bayerl, P., Karlović, R., Akhgar, B., Markarian, G. (eds) Community Policing - A European Perspective. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-53396-4_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-53396-4_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-53395-7
Online ISBN: 978-3-319-53396-4
eBook Packages: Law and CriminologyLaw and Criminology (R0)