A research framework for constructing the knowledge database of public security information

被引:0
作者
Zhong H. [1 ]
Zhang S. [2 ,3 ]
Liu J. [2 ,3 ]
机构
[1] College of Information Technology and Network Security, People’s Public Security University of China, Xicheng, Beijing
[2] Faculty of Information Technology, Beijing University of Technology, Beijing
[3] Beijing Key Laboratory of Trusted Computing, Beijing
基金
中国国家自然科学基金;
关键词
Feature extraction; Knowledge architecture; Public security information;
D O I
10.1504/ijwmc.2021.10045088
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
At present, the public security organs in China have accumulated a great deal of public security data. These data have broad sources, complex structures, large and increasing scales. How to effectively integrate, manage and mine these data has become a new problem faced by all public security organs. This paper proposes a research framework for constructing the knowledge database of public security information. Based on this multi-dimension framework, data features can be effectively extracted and modelled for improving the management and utilisation of public safety data. Copyright © 2021 Inderscience Enterprises Ltd.
引用
收藏
页码:191 / 197
页数:6
相关论文
共 20 条
  • [1] Bo L., Sminchisescu C., Efficient match kernel between sets of features for visual recognition, Advances in Neural Information Processing Systems, pp. 135-143, (2009)
  • [2] Cao N., Wang C., Li M., Ren K., Lou W., Privacy-preserving multi-keyword ranked search over encrypted cloud data, IEEE Transactions on Parallel and Distributed Systems, 25, 1, pp. 222-233, (2013)
  • [3] Chang W., Zhu B., Cluster automorphism groups of cluster algebras of finite type, Journal of Algebra, 447, pp. 490-515, (2016)
  • [4] Cui Z., Xue F., Cai X., Cao Y., Wang G-G., Chen J., Detection of malicious code variants based on deep learning, IEEE Transactions on Industrial Informatics, 14, 7, pp. 3187-3196, (2018)
  • [5] Di Martino B., Aversa R., Cretella G., Esposito A., Ko l odziej J., Big data (lost) in the cloud, International Journal of Big Data Intelligence, 1, pp. 3-17, (2014)
  • [6] Eleyan A., Kose K., Cetin A.E., Image feature extraction using compressive sensing, Image Processing and Communications Challenges, 5, pp. 177-184, (2014)
  • [7] Han J., Pei J., Kamber M., Data Mining: Concepts and Techniques, (2011)
  • [8] Howison J., Conklin M., Crowston K., Flossmole: a collaborative repository for floss research data and analyses, International Journal of Information Technology and Web Engineering (IJITWE), 1, 3, pp. 17-26, (2006)
  • [9] Iacobelli F., Nichols N., Birnbaum L., Hammond K., Information finding with robust entity detection: the case of an online news reader, Human-Computer Interaction: The Agency Perspective, pp. 375-387, (2012)
  • [10] Leibe B., Leonardis A., Schiele B., Robust object detection with interleaved categorization and segmentation, International Journal of Computer Vision, 77, 1, pp. 259-289, (2008)