Algorithm for community security risk assessment and influencing factors analysis by back propagation neural network

被引:0
作者
Zhou, Shuang [1 ]
Du, Meiling [1 ]
Liu, Xiaoyu [2 ]
Shen, Hongyan [1 ]
机构
[1] Tianjin Univ Commerce, Sch Publ Adm, Tianjin 300134, Peoples R China
[2] Univ Int Business & Econ, Sch Int Business, Beijing 100029, Peoples R China
关键词
Back propagation neural network; Community security risk; Nodes in the hidden layer; Model fitting degree; Risk assessment; CLASSIFICATION; SAFETY;
D O I
10.1016/j.heliyon.2024.e30185
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This paper aims to accurately assess and effectively manage various security risks in the community and overcome the challenges faced by traditional models in handling large amounts of features and high -dimensional data. Hence, this paper utilizes the back propagation neural network (BPNN) to optimize the security risk assessment model. A key challenge of researching community security risk assessment lies in accurately identifying and predicting a range of potential security threats. These threats may encompass natural disasters, public health crises, accidents, and social security issues. The intricate interplay of these risk factors, combined with the dynamic nature of community environments, presents difficulties for traditional risk assessment methodologies to address effectively. Initially, this paper delves into the factors influencing safety incidents within communities and establishes a comprehensive system of safety risk assessment indicators. Leveraging the adaptable and generalizable nature of the BPNN model, the paper proceeds to optimize the BPNN model, enhancing the security risk assessment model through this optimization. Subsequent comparison experiments with traditional models validate the rationality and effectiveness of the proposed model, with hidden layer nodes set at various levels like 10, 15, 20, 25, 30, and 35. These traditional models include Convolutional Neural Network (CNN), Long Short -Term Memory Network (LSTM), Bidirectional Encoder Representations from Transformers (BERT), Generative Pre -trained Transformer (GPT), and eXtreme Gradient Boosting (XGBOOST). Experimental findings demonstrate that with 20 hidden layer nodes, the optimized model achieves a remarkable final recognition accuracy of 99.1 %. Moreover, the optimized model exhibits significantly lower final function loss compared to models with different node numbers. Increasing the number of hidden layer nodes may diminish the optimized model 's fit and accuracy. Comparison with traditional models reveals that the average accuracy of the optimized model in community risk identification reaches 98.5 %, with a maximum accuracy of 99.6 %. This marks an improvement of 9% -11 % in recognition accuracy across various risk factors compared to traditional models. Regarding system response time and resource utilization, the optimized model exhibits a response time ranging from 100 ms to 120 ms and consistently lower resource utilization rates across all scenarios, underscoring its efficiency in community security risk assessment. In conclusion, this experiment sheds light on the underlying mechanisms and patterns of community safety risk formation, offering novel perspectives and methodologies for researching community safety risk assessment. The paper concludes by presenting recommendations and strategies for addressing community safety risks based on experimental analysis.
引用
收藏
页数:14
相关论文
共 39 条
  • [1] Safety Impact of Connected Vehicles on Driver Behavior in Rural Work Zones under Foggy Weather Conditions
    Adomah, Eric
    Bakhshi, Arash Khoda
    Ahmed, Mohamed M.
    [J]. TRANSPORTATION RESEARCH RECORD, 2022, 2676 (03) : 88 - 107
  • [2] Gazelle optimization algorithm: a novel nature-inspired metaheuristic optimizer
    Agushaka, Jeffrey O.
    Ezugwu, Absalom E.
    Abualigah, Laith
    [J]. NEURAL COMPUTING & APPLICATIONS, 2023, 35 (05) : 4099 - 4131
  • [3] Dwarf Mongoose Optimization Algorithm
    Agushaka, Jeffrey O.
    Ezugwu, Absalom E.
    Abualigah, Laith
    [J]. COMPUTER METHODS IN APPLIED MECHANICS AND ENGINEERING, 2022, 391
  • [4] Bartkowiak-Thron I., 2022, Law enforcement and public health: Partners for community safety and wellbeing, P53
  • [5] Research on the Influence Maximization Problem in Social Networks Based on the Multi-Functional Complex Networks Model
    Bin, Sheng
    Sun, Gengxin
    [J]. JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2022, 34 (03)
  • [6] PolicyCLOUD: A prototype of a cloud serverless ecosystem for policy analytics
    Biran, Ofer
    Feder, Oshrit
    Moatti, Yosef
    Kiourtis, Athanasios
    Kyriazis, Dimosthenis
    Manias, George
    Mavrogiorgou, Argyro
    Sgouros, Nikitas M.
    Barata, Martim T.
    Oldani, Isabella
    Sanguino, Maria A.
    Kranas, Pavlos
    Baroni, Samuele
    [J]. DATA & POLICY, 2022, 4
  • [7] Canada M., 2022, Journal of Community Safety and WellBeing, V7, P59, DOI [10.35502/jcswb.233, DOI 10.35502/JCSWB.233]
  • [8] Identifying machine learning techniques for classification of target advertising
    Choi, Jin-A
    Lim, Kiho
    [J]. ICT EXPRESS, 2020, 6 (03): : 175 - 180
  • [9] Essentials of data management: an overview
    Dhudasia, Miren B.
    Grundmeier, Robert W.
    Mukhopadhyay, Sagori
    [J]. PEDIATRIC RESEARCH, 2023, 93 (01) : 2 - 3
  • [10] Prairie Dog Optimization Algorithm
    Ezugwu, Absalom E.
    Agushaka, Jeffrey O.
    Abualigah, Laith
    Mirjalili, Seyedali
    Gandomi, Amir H.
    [J]. NEURAL COMPUTING & APPLICATIONS, 2022, 34 (22) : 20017 - 20065