skip to main content
10.1145/2912160.2912205acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesdg-oConference Proceedingsconference-collections
research-article

Big Data-based Smart City Platform: Real-Time Crime Analysis

Authors Info & Claims
Published:08 June 2016Publication History

ABSTRACT

One of the challenges governments and communities face to achieve smart city goals is dealing with enormous amount of data available - sensors, devices, social media, Web activities and commerce, tracking devices, all generate enormous amount of data, so called Big Data. Our goal is to empower the city government and its citizens to create a safer city by enabling crime and risk analysis of unstructured crime reports, criminal history of suspects, auto-license data, location-specific data, etc. for crime fighting efforts. We present intelligent solutions for Data-based Smart City Platform in Newark, NJ. We used a Machine Learning approach to automate and help crime analysts identify the connected entities and events by collecting, integrating and analyzing diverse data sources to generate alerts and predictions for new knowledge and insights that lead to better decision making and optimized actions.

References

  1. Aquin, Mathieu, John Davies, and Enrico Motta. "Smart Cities' Data: Challenges and Opportunities for Semantic Technologies." IEEE Internet Computing 6 (2015): 66--70.Google ScholarGoogle Scholar
  2. Bowen, J. E. (1994). "An expert system for police investigators of economic crimes." Expert Systems with Applications 7(2): 235--248.Google ScholarGoogle ScholarCross RefCross Ref
  3. Brahan, J. W., Lam, K. P., Chan, H., and Leung, W. (1998). "AICAMS: Artificial intelligence crime analysis and management system." Knowledge-Based Systems 11: 355--361.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cardie, C. et al. 2008. A Study in Rule-specific Issue Categorization for e-Rulemaking. Proceedings of the 2008 International Conference on Digital Government Research (Montreal, Canada, 2008), 244--253. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Chen, Hsinchun, Wingyan Chung, Jennifer Jie Xu, Gang Wang, Yi Qin, and Michael Chau. "Crime data mining: a general framework and some examples." Computer 37, no. 4 (2004): 50--56. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Gravano L., Ipeirotis P.G., Koudas N., and Srivastava D. "Text joins in an RDBMS for web data integration." In Proceedings of the 12th international conference on World Wide Web 2003 May 20 (pp. 90--101). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hagen, L., Harrison, T. M., Uzuner, Ö., Fake, T., LaManna, D., & Kotfila, C. (2015). Introducing Textual Analysis Tools for Policy Informatics: A Case Study of E-petitions. Presented at the Proceedings of the 16th Annual International Conference on Digital Government Research. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Hauk, Roslin V., and Hsinchun Chen. "COPLINK: A case of intelligent analysis and knowledge management." In Proceedings of the 20th international conference on Information Systems, pp. 15--28. Association for Information Systems, 1999. Tavel, P. 2007. Modeling and Simulation Design. AK Peters Ltd., Natick, MA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Hu, Paul Jen-Hwa, Hsinchun Chen, Han-fen Hu, Cathy Larson, and Cynthia Butierez. "Law enforcement officers' acceptance of advanced e-government technology: A survey study of COPLINK Mobile." Electronic Commerce Research and Applications 10, no. 1 (2011): 6--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. IBM Entity Analytics Solutions. http://www-01.ibm.com/software/data/identity-insight-solutions/law-enforcement.html.Google ScholarGoogle Scholar
  11. Ku, C.H. et al. 2008. Natural Language Processing and e-Government: Crime Information Extraction from Heterogeneous Data Sources. Proceedings of the 2008 International Conference on Digital Government Research (Montreal, Canada, 2008), 162--170. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Ku, C.-H. and Leroy, G. 2014. A decision support system: Automated crime report analysis and classification for e-government. Government Information Quarterly. 31, 4 (Oct. 2014), 534--544.Google ScholarGoogle ScholarCross RefCross Ref
  13. M. Chau, J.J. Xu, and H. Chen, "Extracting Meaningful Entities from Police Narrative Reports, Proc. Nat'l Conf. Digital Government Research, Digital Government Research Center,2002, pp. 271--275. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Pliant, L. (1996). "High-technology solutions." The Police Chief 5(38): 38--51.Google ScholarGoogle Scholar
  15. Reaves, Brian A. Local police departments (2007). DIANE Publishing, 2011.Google ScholarGoogle Scholar
  16. Yuan, Shengcheng, Soon Ae Chun, Yi Liu, Hui Zhang, & Nabil R. Adam (2015) Agent Driving Behavior Modeling for Traffic Simulation and Emergency Decision Support, 2015 Winter Simulation Conference, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Wan, Yuan, Hengqing Tong, and Yanfang Deng. "Local Latent Semantic Analysis Based on Support Vector Machine for Imbalanced Text Categorization." In Applied Informatics and Communication, pp. 321--329. Springer Berlin Heidelberg, 2011.Google ScholarGoogle Scholar
  18. http://www.nij.gov/journals/274/Pages/challenge-generate-innovation.aspxGoogle ScholarGoogle Scholar
  19. https://www.whitehouse.gov/the-press-office/2015/09/14/fact-sheet-administration-announces-new-smart-cities-inititive-helpGoogle ScholarGoogle Scholar
  1. Big Data-based Smart City Platform: Real-Time Crime Analysis

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      dg.o '16: Proceedings of the 17th International Digital Government Research Conference on Digital Government Research
      June 2016
      532 pages
      ISBN:9781450343398
      DOI:10.1145/2912160

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 June 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate150of271submissions,55%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader