Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Using data-mining and multi-agent si...
~
Gunderson, Louise F.
Linked to FindBook
Google Book
Amazon
博客來
Using data-mining and multi-agent simulation to predict criminal behavior.
Record Type:
Electronic resources : Monograph/item
Title/Author:
Using data-mining and multi-agent simulation to predict criminal behavior./
Author:
Gunderson, Louise F.
Description:
280 p.
Notes:
Source: Dissertation Abstracts International, Volume: 64-03, Section: B, page: 1468.
Contained By:
Dissertation Abstracts International64-03B.
Subject:
Engineering, System Science. -
Online resource:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3083072
ISBN:
0496308820
Using data-mining and multi-agent simulation to predict criminal behavior.
Gunderson, Louise F.
Using data-mining and multi-agent simulation to predict criminal behavior.
- 280 p.
Source: Dissertation Abstracts International, Volume: 64-03, Section: B, page: 1468.
Thesis (Ph.D.)--University of Virginia, 2003.
In this work, the events caused by criminals with similar preferences are modeled as the events caused by agents. The behavior of these agents is used to create the predictive model. However, some method must be used to partition the events caused by the agents. In order to create this partitioning method, an estimation of the types of distributions of the events caused by criminals must be made. Judgment analysis, a descriptive decision theory, is used to make this estimation. If all of the agents are using the same set of features to select specific targets, then a density based clustering method will partition the events caused by the agents. A set of independent agents was discovered from the data on the objects stolen in Richmond. Association rules and linear regression were used to suggest that thieves in Richmond are not using the same sets of features to select specific targets. This means that some other method to partition them must be devised.
ISBN: 0496308820Subjects--Topical Terms:
1018128
Engineering, System Science.
Using data-mining and multi-agent simulation to predict criminal behavior.
LDR
:03858nmm 2200325 4500
001
1836927
005
20050315121444.5
008
130614s2003 eng d
020
$a
0496308820
035
$a
(UnM)AAI3083072
035
$a
AAI3083072
040
$a
UnM
$c
UnM
100
1
$a
Gunderson, Louise F.
$3
1925392
245
1 0
$a
Using data-mining and multi-agent simulation to predict criminal behavior.
300
$a
280 p.
500
$a
Source: Dissertation Abstracts International, Volume: 64-03, Section: B, page: 1468.
500
$a
Adviser: Donald E. Brown.
502
$a
Thesis (Ph.D.)--University of Virginia, 2003.
520
$a
In this work, the events caused by criminals with similar preferences are modeled as the events caused by agents. The behavior of these agents is used to create the predictive model. However, some method must be used to partition the events caused by the agents. In order to create this partitioning method, an estimation of the types of distributions of the events caused by criminals must be made. Judgment analysis, a descriptive decision theory, is used to make this estimation. If all of the agents are using the same set of features to select specific targets, then a density based clustering method will partition the events caused by the agents. A set of independent agents was discovered from the data on the objects stolen in Richmond. Association rules and linear regression were used to suggest that thieves in Richmond are not using the same sets of features to select specific targets. This means that some other method to partition them must be devised.
520
$a
The cluster specific salience discovery (CSSD) methodology was created to partition the agents, where the agents are using different sets of features to select targets. This methodology is used with existing clustering methods. In this methodology: (1) A variance threshold is discovered for each feature; (2) A minimum number of points for a cluster is selected; (3) The events are clustered in the space formed by all the feature; (4) Clusters that have a variance of less than the variance threshold are removed; (5) The remaining events are clustered in the space formed by a subset of the features; (6) This continues until either the number of points falls below the minimum number of points or all of the feature subspaces have been explored.
520
$a
This methodology was tested on synthetic data with two clustering methods. The use of the CSSD methodology with two clustering methods provided a statistically significant improvement over the same clustering methods used without the methodology.
520
$a
In the Richmond data set, only one variable, the average temperature of the previous day (Lagged Temperature), changes over the period of study. In order to create a predictive model, a generalized linear model with a Poisson distribution, was created for each of the discovered agents. For some of the agents, a predictive model could be created using the Lagged Temperature variable, and the number of crimes committed on the two previous days. The predictive model for those agents provides a statistically significant improvement over other methods.
520
$a
The following contributions are made by this work: (1) A model of criminal behavior based on judgment analysis. This model allowed for the construction of a model of criminal behavior that includes the possibility of agents using different sets of features. (2) A demonstration of the use of different features sets by criminals in the target selection process. (Abstract shortened by UMI.)
590
$a
School code: 0246.
650
4
$a
Engineering, System Science.
$3
1018128
650
4
$a
Sociology, Criminology and Penology.
$3
1017569
690
$a
0790
690
$a
0627
710
2 0
$a
University of Virginia.
$3
645578
773
0
$t
Dissertation Abstracts International
$g
64-03B.
790
1 0
$a
Brown, Donald E.,
$e
advisor
790
$a
0246
791
$a
Ph.D.
792
$a
2003
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=3083072
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9186441
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login