2021
DOI: 10.1155/2021/4734187
|View full text |Cite
|
Sign up to set email alerts
|

Applications of Machine Learning in Public Security Information and Resource Management

Abstract: The data mining and big data technologies could be of utmost importance to investigate outbound and case datasets in the police records. New findings and useful information may potentially be obtained through data preprocessing and multidimensional modeling. Public security data is a kind of “big data,” having characteristics like large volume, rapid growth, various structures, large-scale storage, low density, and time sensitiveness. In this paper, a police data warehouse is constructed and a public security … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 22 publications
0
1
0
Order By: Relevance
“…LL Xing reviewed analyzing China's network security governance policies through the lens of big data, and put forward optimization suggestions [5] to provide references for policy improvement. Z Wang used data mining and big data technology to build a public security information analysis system to quickly analyze police data, provide a basis for public security decision-making [6]. X Li proposed a network security framework, developing an efficient security model leveraging artificial intelligence technology,and verified its feasibility and effectiveness through typical cases [7].…”
Section: Related Researchmentioning
confidence: 99%
“…LL Xing reviewed analyzing China's network security governance policies through the lens of big data, and put forward optimization suggestions [5] to provide references for policy improvement. Z Wang used data mining and big data technology to build a public security information analysis system to quickly analyze police data, provide a basis for public security decision-making [6]. X Li proposed a network security framework, developing an efficient security model leveraging artificial intelligence technology,and verified its feasibility and effectiveness through typical cases [7].…”
Section: Related Researchmentioning
confidence: 99%
“…Proper data collection techniques are essential to design high-performing models. The data should be without errors and include pertinent information for the assignment (Albahli et al, 2020;Zhihui Wang & Wang, 2021).…”
Section: 1data Collection and Study Areamentioning
confidence: 99%