This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
1. Introduction
Information construction has been initially applied to police work. However, because it is in its infancy, information business processing can only play its most basic functions, such as simple search, add files, delete files, storage, and statistic, but lack real substantive analysis and prediction functions. With the continuous development of work, the information system has realized the transformation of the database from small to large. Therefore, fully integrating the functions of analysis, judgment, and decision-making into data construction can make a reasonable transformation of data between micro and macro data as required.
At present, the informatization of police work in our country has not been popularized. Even if information technology is used in the work, the technical level is generally low. Therefore, scientific and technological means cannot be effectively used to collect and manage information resources. In order to severely crack down on crimes such as high-tech and high-IQ crimes, it is also necessary to combine police work with information construction [1]. By using advanced technology and the high efficiency of information resources, the level of scientific and technological knowledge of police officers can be improved. The full application of modern information technology to police work can improve the detection capabilities of police officers and effectively combat various forms of crime. Moreover, it is also the best way to improve the efficiency of detection and can fundamentally control the crime rate and achieve social stability and harmony [2]. At the same time, information technology is used to fully reflect the substantive potential problems behind things and find out the rules, so as to meet the detection and investigation needs of police officers. The current development of our country is facing diversification, globalization, popularization of information, and deepening of technology. However, with the rapid development of society, the unstable factors in the social environment are increasingly exposed [3]. How to better maintain social stability and harmony has become the biggest challenge facing police officers in public security organs. Police officers must adhere to the strategic strategy of driving science and technology and fully integrate information technology into practical work to improve the scientific and technological content of our country’s police work. Building the modernization of police work in an all-round way and making police work more efficient and dynamic are the focus of the current work of our police officers [4].
This paper conducts in-depth research on the investigation analysis and decision-making of public security cases and proposes a case-based reasoning model based on two case databases. Moreover, this paper discusses in detail the use of data mining technology to automatically establish a case database, which is a useful exploration and practice for the public security department to establish a new and efficient case investigation auxiliary decision-making system.
2. Related Work
As an important content in database information technology, Knowledge Discovery in Database (KDD) was first used when database technology was in the development stage [5]. Later, it was used as an academic research topic, and the academic community would regularly hold seminars on KDD technology. At the meeting, someone vividly combined data with mineral deposits, and the term “data mining” came from this. After that, the United States continued to hold seminars on data mining content, and the research content became more and more professional, and the number of people and experts participating in data mining research increased, even reaching several thousand. Moreover, academic papers on KDD are increasing, and data mining has become a new topic in the field of information technology [6]. With the deepening of research, data research has developed from the initial basic research to comprehensive research and development. It not only incorporates a variety of research strategies but also applies scientific knowledge in various fields. Data mining has become a hot topic in various seminars, and it has been continuously discussed and studied in depth by scholars from various countries [7]. This paper takes the Chicago Police Department (Chicago Police Department, hereinafter referred to as CPD) 2013 prevention work large-scale data as an example. CPD is working to create a social graph similar to Facebook. In order to combat gang violent crimes, it uses network analysis to track active gang members and issue warnings to them to prevent possible violent crimes [8]. In 2012, there were more than 500 murders in Chicago. So far this year, the city’s murder rate has dropped by 22%, many of which are related to violent criminal gang activities [9]. Data mining is a network tool that can analyze the conversations, hobbies, and social activities of its members and provide accurate search results. On this basis, CPD constructed a model. The model includes data variables such as the number of times each gang member has been shot and the number of criminal records, so as to identify the “most active” residents of Chicago, that is, those who are most likely to be involved in violent activities [10]. At the beginning of 2013, CPD announced the list of the top 20 “most active” members of the 22 police districts under the jurisdiction of the city of Chicago. After the list was confirmed, the Chicago Police Department and the “Violent Crime Reduction Strategy” organization cooperated to continuously send warning messages to those included in the gang. Some members of these gangs were surprised to receive such news [11]. A piece of Rigel software written in [12] is a criminal tracking software based on “geographic analysis technology.” Through the analysis of the distribution of crime scenes, it unearthed the distribution of criminals’ (especially criminals in serial cases) residences and other criminal hiding places. The practice of police application has proved that data mining technology can help police analyze past cases, discover crime patterns and characteristics, and find commonalities and similarities. Moreover, data mining can assist leaders in decision-making and serve the various fields of public security work such as combating, preventing, managing, and controlling. In the past, the analysis of police situation and series and parallel cases required manual force to complete, which wasted huge manpower and material resources, and the analysis results were incomplete and unreliable. At present, by using the latest data mining technology, the above problems can be completed in a few hours, which greatly improves the work efficiency of the public security organs [13]. In the long run, big data and data mining technology can optimize the allocation of police resources and enhance the ability of public security organs to fight crime, thereby enhancing the level of social and economic development and the people’s sense of security and satisfaction [14].
3. Search Criminal Cases
This article combines machine learning data processing methods to process case investigation data and then calculates and exercises the algorithm.
The purpose of case retrieval is to retrieve one or more cases that are most similar to the target case from the case database, so case retrieval can be attributed to the comparison of similarities between the two cases. In case reasoning systems, there are three commonly used retrieval methods: nearest neighbor method, inductive index method, and knowledge guidance method. We can use only one, or we can use multiple methods to share.
When searching for similar cases, this paper adopts the nearest neighbor method. The meaning of nearest neighbor is as follows: if case
Among them,
In the case described in a DBML document,
We set the source case (cases in the typical case database) as
In the formula,
For criminal cases, after data preprocessing operations, the types of attributes can be summarized into four types: numeric types, binary variables, enumeration types, and string types. Different attribute types have different similarity calculation methods, here are divided into four cases:
(1) Numerical type
It uses the minimum method to calculate the similarity [16]:
In the formula, when
For example, the age of a person can be calculated as a continuous numeric type.
(2) Binary variables
It determines similarity based on whether it is equal or not [17]:
For example, smoking can take two values, 1 means smoking, and 0 means not smoking. If both smoke or neither smoke, it is represented as
(3) Enumeration type
This type is divided into two situations, when the enumeration value is a numeric type [6]:
In the formula,
When the enumeration value is a string type,
For example, the case type is an enumerated string.
(4) String type
It determines similarity based on whether it is equal or not [17]:
It can use the “keyword fuzzy matching” method to calculate the similarity value of two strings, instead of simply using 0 and 1 to indicate similarity. This calculation method is more suitable for calculating the similarity of large sections of text.
Tree construction steps. This phase breaks the two phases of the traditional FP-growth (Frequent Pattern Tree) algorithm, that is, the insertion phase and the remanagement phase. In the insertion phase, the item sets of a transaction are inserted into the tree in descending order of frequency. Moreover, the biggest feature of this method is that if
In the frequent item mining stage, the tree mining stage follows the FP-growth mining technology. The FP-growth algorithm is used to mine frequent items, and the frequency must be within the threshold specified by the user to mine the constructed ISPO-tree (reedispO tree). The mining technology of the FP-growth algorithm is also used in CP-tree (compressible-prefix tree) and Cantree methods.
The source of this unstable dataset is that these data may be slightly modified, as shown in Figure 1. First, we introduce an example of the ISPO-tree method without a small amount of data change, that is,
[figure omitted; refer to PDF]
It can be expressed by a formula [18].
Then, after the algorithm adjusts the tree, the distance
[figure omitted; refer to PDF]
This is mainly to be closely related to the characteristics of electronic evidence analysis. For electronic evidence, it is not only necessary to ensure its durability, but also to maintain its validity. Then, some evidences must be copied from the source data before and cannot be modified. However, in the electronic evidence analysis system, in order to analyze the validity of the evidence, it can correct the existing copied data according to the correct modification. For example, when a suspect forges identity, time, location, etc., we need to modify the data to better find evidence in the future. However, this kind of modification is definitely a small amount. If all the analysis is rerun, a lot of time and resources will be wasted. Therefore, in this case, a small amount of modified algorithm is proposed to improve efficiency [19].
In Figure 3, the ISPO-tree generated after modifying
[figure omitted; refer to PDF]
Since the item header table in FP-tree will be linked to the item’s position in the tree, the algorithm finds the position of the element from the first changed transaction to modify the frequency and recalculate the threshold. After that, according to the threshold, the algorithm decides whether to reconstruct the tree. Therefore, the branch tree constructed by the ISPO-tree algorithm is less than the branch tree constructed by the previous two algorithms, and it supports the modification of a small number of elements.
4. DC-STree Improved Algorithm
The algorithm defines
In the formula,
We need to pay attention to the use of similar functions. Equation (10) uses a comparison function like Equation (12), and Equation (12) creates an equivalent function. However, the use of similar functions in formula (10) or formula (11) combines the comparison function formula (12) and also the comparison function formula (13),
We define in
If
[figure omitted; refer to PDF]
For any
5. Model Building
The data in this article comes from the Internet. The data in this article is processed by machine learning methods and combined with mathematical statistics tools to process statistical charts.
The model system in this paper uses the association rule algorithm in data mining technology to mine the database source data in the existing electronic evidence management system, find frequent item sets, generate association rules, and present results. Moreover, it is used to analyze the relationship between cases and the relationship between criminal suspects and predict possible cases and the motives of criminal suspects. This prototype system is mainly an electronic evidence analysis system. The data source of this analysis system can come from the existing computer forensic system and electronic evidence management analysis system and can be obtained from the hard disk, such as text files, video and audio files, email clients, browser records, QQ client and Fetion client chat records. Mobile devices include mobile hard disks, mobile phones, and U disks, as well as mobile phone address books, short messages, and chat records of smart phone clients. The data obtained by these forensic tools will be stored in the database or data warehouse in the electronic evidence analysis system. The focus of this paper is to use association rule algorithms to mine tacit knowledge from these databases or data warehouses that store electronic evidence and finally present it and store it in the knowledge base. The entire system architecture diagram is shown in Figure 5.
[figure omitted; refer to PDF]
After analysis and certification, the system first preprocesses the evidence data in the original database, extracts useful evidence data from the database, and removes some irrelevant evidence data. After that, the system hierarchizes and transforms these evidence data concepts and selects some related attributes to transform into the form required by data mining technology. After the preprocessing of the evidence data is completed, the analysts use the data in the improved FP-growth algorithm proposed in this paper to use association rules for data mining. System business flow chart is shown in Figure 6.
[figure omitted; refer to PDF]
The electronic evidence similarity frequent mining algorithm first proposed in this paper has two advantages. The first point is that the time in the data preprocessing part is saved. By formulating similar rules, the work of frequently modifying data items compared to the data preprocessing stage is saved. Moreover, the time spent in the execution of the entire algorithm is much smaller than that of data preprocessing, as shown in Table 1 and Figures 7 and 8.
Table 1
Comparison of mining time between similar frequent patterns and frequent patterns.
Similar frequent pattern mining | Frequent pattern mining | |||
Data preprocessing time | Mining time | Data preprocessing time | ||
1 K | 70 s | 56 s | 1 K | 70 s |
10 K | 125 s | 73 s | 10 K | 125 s |
100 K | 672 s | 132 s | 100 K | 672 s |
6. Model Performance Analysis
This paper analyzes the data processing performance of the model. First, this paper studies the classification effect of the model on criminal cases. In the classification profile, the specific distribution interval of the 10 classifications and the number of cases contained in each classification are reflected. In order to make the boundaries of the 10 classifications clearer, an accurate classification boundary interval is obtained by drilling. The specific money value distribution of 10 classifications is shown in Table 2 and Figure 9.
Table 2
Number of cases and loss interval from category 1 to category 10.
Classification | Number of cases | Minimum | Max |
1 | 1764 | 0 | 1194 |
2 | 1634 | 1211 | 1919 |
3 | 1120 | 1949 | 2626 |
4 | 827 | 2656 | 3656 |
5 | 1007 | 3666 | 5050 |
6 | 886 | 5070 | 7323 |
7 | 747 | 7346 | 12070 |
8 | 705 | 12080 | 23634 |
9 | 529 | 23699 | 69112 |
10 | 207 | 69690 | 2532070 |
Next, this paper analyzes the accuracy of case investigation by the model constructed in this paper. This paper collects the case data that has been solved in the past 3 years, inputs the case data into the model for data processing, and compares the obtained results with the real results to calculate the correct rate of case detection. The results are shown in Table 3 and Figure 10.
Table 3
Statistical table of the case detection rate of the model.
No. | Case detection rate (%) | No. | Case detection rate (%) | No. | Case detection rate (%) | No. | Case detection rate (%) |
1 | 64.4 | 21 | 62.5 | 41 | 47.8 | 61 | 48.5 |
2 | 55.3 | 22 | 54.4 | 42 | 60.1 | 62 | 45.6 |
3 | 59.2 | 23 | 46.4 | 43 | 60.9 | 63 | 49.4 |
4 | 59.9 | 24 | 51.8 | 44 | 53.1 | 64 | 45.9 |
5 | 64.9 | 25 | 58.2 | 45 | 51.4 | 65 | 57.2 |
6 | 49.5 | 26 | 51.7 | 46 | 56.8 | 66 | 55.1 |
7 | 52.7 | 27 | 61.3 | 47 | 52.2 | 67 | 63.8 |
8 | 64.9 | 28 | 61.8 | 48 | 46.6 | 68 | 59.9 |
9 | 48.9 | 29 | 56.7 | 49 | 49.5 | 69 | 49.0 |
10 | 58.7 | 30 | 50.5 | 50 | 53.2 | 70 | 54.3 |
11 | 48.1 | 31 | 50.7 | 51 | 57.5 | 71 | 55.5 |
12 | 55.2 | 32 | 61.6 | 52 | 57.6 | 72 | 58.6 |
13 | 57.1 | 33 | 60.6 | 53 | 64.4 | 73 | 54.7 |
14 | 57.9 | 34 | 46.5 | 54 | 53.6 | 74 | 46.9 |
15 | 52.7 | 35 | 64.0 | 55 | 55.1 | 75 | 54.7 |
16 | 58.2 | 36 | 48.3 | 56 | 48.7 | 76 | 51.0 |
17 | 48.8 | 37 | 45.1 | 57 | 64.4 | 77 | 56.4 |
18 | 63.5 | 38 | 52.4 | 58 | 45.4 | 78 | 51.4 |
19 | 49.7 | 39 | 47.8 | 59 | 54.5 | 79 | 53.7 |
20 | 49.6 | 40 | 58.6 | 60 | 62.5 | 80 | 47.2 |
As shown in Figure 10 and Table 3, after inputting real data from the investigation scene of the case, this paper found that the detection rate after the investigation of the case was distributed between 45% and 65%. It can be seen that the practical effect of the model constructed in this paper is very good and can be applied to practice in the later stage.
7. Conclusion
This paper conducts in-depth research on the investigation analysis and decision-making of public security cases and proposes a case-based reasoning model based on two case databases. Moreover, this paper discusses in detail the use of data mining technology to automatically establish a case database, which is a useful exploration and practice for the public security department to establish a new and efficient case investigation auxiliary decision-making system. In addition, this paper studies the method of using data mining technology to assist in the establishment of a case database, analyzes the characteristics of traditional case storage methods, and designs and implements a CBML criminal case modeling language that conforms to the XML standard. In order to mine traditional case data to extract effective case information, this paper discusses how to perform data preprocessing, including operations such as data cleaning, data integration, data transformation, and data reduction. Then, this paper applies outlier data analysis and cluster analysis techniques to case mining and designs an electronic evidence analysis system model based on data mining. The model proposed in this question mainly includes three parts: electronic evidence preprocessing, electronic evidence frequent pattern mining, and electronic evidence similar frequent pattern mining. The experimental results show that the model constructed in this paper has good performance.
This paper mostly uses simulation research combined with a small amount of data for analysis. The model studied in this paper needs further practical research in the follow-up.
Acknowledgments
This research is supported by the following: (1) General Project of Humanities and Social Science Research in Colleges and Universities in Henan Province in 2022: Research on the Countermeasures of Telecommunication Network Fraud Crimes in the Post-epidemic Era (2022-ZZJH-014) and (2) Henan scientific and technological research projects (202102310487).
[1] A. A. Al-Musawi, A. A. H. Alwanas, S. Q. Salih, Z. H. Ali, M. T. Tran, Z. M. Yaseen, "Shear strength of SFRCB without stirrups simulation: implementation of hybrid artificial intelligence model," Engineering with Computers, vol. 36 no. 1,DOI: 10.1007/s00366-018-0681-8, 2020.
[2] H. Lu, Y. Li, M. Chen, H. Kim, S. Serikawa, "Brain intelligence: go beyond artificial intelligence," Mobile Networks and Applications, vol. 23 no. 2, pp. 368-375, DOI: 10.1007/s11036-017-0932-8, 2018.
[3] R. Ferrari, C. Mancini-Terracciano, C. Voena, M. Rengo, M. Zerunian, A. Ciardiello, S. Grasso, V. Mare, R. Paramatti, A. Russomando, R. Santacesaria, A. Satta, E. S. Camillocci, R. Faccini, A. Laghi, "MR-based artificial intelligence model to assess response to therapy in locally advanced rectal cancer," European Journal of Radiology, vol. 118,DOI: 10.1016/j.ejrad.2019.06.013, 2019.
[4] T. Fu, C. Wang, "A hybrid wind speed forecasting method and wind energy resource analysis based on a swarm intelligence optimization algorithm and an artificial intelligence model," Sustainability, vol. 10 no. 11,DOI: 10.3390/su10113913, 2018.
[5] X. Sun, J. Young, J.-H. Liu, D. Newman, "Prediction of pork loin quality using online computer vision system and artificial intelligence model," Meat Science, vol. 140, pp. 72-77, DOI: 10.1016/j.meatsci.2018.03.005, 2018.
[6] A. Zappone, M. Di Renzo, M. Debbah, T. T. Lam, X. Qian, "Model-aided wireless artificial intelligence: embedding expert knowledge in deep neural networks for wireless system optimization," IEEE Vehicular Technology Magazine, vol. 14 no. 3, pp. 60-69, DOI: 10.1109/MVT.2019.2921627, 2019.
[7] X.-N. Bui, H. Nguyen, Y. Choi, T. Nguyen-Thoi, J. Zhou, J. Dou, "Prediction of slope failure in open-pit mines using a novel hybrid artificial intelligence model based on decision tree and evolution algorithm," Scientific Reports, vol. 10 no. 1,DOI: 10.1038/s41598-020-66904-y, 2020.
[8] Z. M. Yaseen, A. El-shafie, O. Jaafar, H. A. Afan, K. N. Sayl, "Artificial intelligence based models for stream-flow forecasting: 2000-2015," Journal of Hydrology, vol. 530, pp. 829-844, DOI: 10.1016/j.jhydrol.2015.10.038, 2015.
[9] J. E. Laird, C. Lebiere, P. S. Rosenbloom, "A standard model of the mind: toward a common computational framework across artificial intelligence, cognitive science, neuroscience, and robotics," AI Magazine, vol. 38 no. 4, pp. 13-26, DOI: 10.1609/aimag.v38i4.2744, 2017.
[10] K. Chapi, V. P. Singh, A. Shirzadi, H. Shahabi, D. T. Bui, B. T. Pham, K. Khosravi, "A novel hybrid artificial intelligence approach for flood susceptibility assessment," Environmental Modelling & Software, vol. 95, pp. 229-245, DOI: 10.1016/j.envsoft.2017.06.012, 2017.
[11] M. R. Hashemi, M. L. Spaulding, A. Shaw, H. Farhadi, M. Lewis, "An efficient artificial intelligence model for prediction of tropical storm surge," Natural Hazards, vol. 82 no. 1, pp. 471-491, DOI: 10.1007/s11069-016-2193-4, 2016.
[12] J. Ma, J. Yu, G. Hao, D. Wang, Y. Sun, J. Lu, H. Cao, F. Lin, "Assessment of triglyceride and cholesterol in overweight people based on multiple linear regression and artificial intelligence model," Lipids in Health and Disease, vol. 16 no. 1,DOI: 10.1186/s12944-017-0434-5, 2017.
[13] T. Sustrova, "A suitable artificial intelligence model for inventory level optimization," Trends Economics and Management, vol. 10 no. 25, pp. 48-55, DOI: 10.13164/trends.2016.25.48, 2016.
[14] B. T. Pham, M. D. Nguyen, D. Van Dao, I. Prakash, H.-B. Ly, T.-T. Le, L. S. Ho, K. T. Nguyen, T. Q. Ngo, V. Hoang, L. H. Son, H. T. T. Ngo, H. T. Tran, N. M. Do, H. Van Le, H. L. Ho, D. T. Bui, "Development of artificial intelligence models for the prediction of Compression Coefficient of soil: an application of Monte Carlo sensitivity analysis," Science of the Total Environment, vol. 679, pp. 172-184, DOI: 10.1016/j.scitotenv.2019.05.061, 2019.
[15] A. Enshaei, C. N. Robson, R. J. Edmondson, "Artificial intelligence systems as prognostic and predictive tools in ovarian cancer," Annals of Surgical Oncology, vol. 22 no. 12, pp. 3970-3975, DOI: 10.1245/s10434-015-4475-6, 2015.
[16] Z. Ghahramani, "Probabilistic machine learning and artificial intelligence," Nature, vol. 521 no. 7553, pp. 452-459, DOI: 10.1038/nature14541, 2015.
[17] D. T. Bui, B. Pradhan, H. Nampak, Q.-T. Bui, Q.-A. Tran, Q.-P. Nguyen, "Hybrid artificial intelligence approach based on neural fuzzy inference model and metaheuristic optimization for flood susceptibilitgy modeling in a high- frequency tropical cyclone area using GIS," Journal of Hydrology, vol. 540, pp. 317-330, DOI: 10.1016/j.jhydrol.2016.06.027, 2016.
[18] S. Keel, P. Y. Lee, J. Scheetz, Z. Li, M. A. Kotowicz, R. J. MacIsaac, M. He, "Feasibility and patient acceptability of a novel artificial intelligence- based screening model for diabetic retinopathy at endocrinology outpatient services: a pilot study," Scientific Reports, vol. 8 no. 1,DOI: 10.1038/s41598-018-22612-2, 2018.
[19] H. A. Afan, A. El-shafie, W. H. M. W. Mohtar, Z. M. Yaseen, "Past, present and prospect of an Artificial Intelligence (AI) based model for sediment transport prediction," Journal of Hydrology, vol. 541, pp. 902-913, DOI: 10.1016/j.jhydrol.2016.07.048, 2016.
[20] D. T. Bui, Q.-T. Bui, Q.-P. Nguyen, B. Pradhan, H. Nampak, P. T. Trinh, "A hybrid artificial intelligence approach using GIS-based neural-fuzzy inference system and particle swarm optimization for forest fire susceptibility modeling at a tropical area," Agricultural and Forest Meteorology, vol. 233, pp. 32-44, DOI: 10.1016/j.agrformet.2016.11.002, 2017.
[21] F. Fathian, S. Mehdizadeh, A. K. Sales, M. J. S. Safari, "Hybrid models to improve the monthly river flow prediction: integrating artificial intelligence and non-linear time series models," Journal of Hydrology, vol. 575, pp. 1200-1213, DOI: 10.1016/j.jhydrol.2019.06.025, 2019.
[22] X. Zhao, C. Wang, J. Su, J. Wang, "Research and application based on the swarm intelligence algorithm and artificial intelligence for wind farm decision system," Renewable Energy, vol. 134, pp. 681-697, DOI: 10.1016/j.renene.2018.11.061, 2019.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Copyright © 2021 Jianwei Ding. This is an open access article distributed under the Creative Commons Attribution License (the “License”), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. https://creativecommons.org/licenses/by/4.0/
Abstract
Through data mining technology, the hidden information behind a large amount of data is discovered, which can help various management services and provide scientific basis for leadership decision-making. It is an important subject of current police information research. This paper conducts in-depth research on the investigation analysis and decision-making of public security cases and proposes a case-based reasoning model based on two case databases. Moreover, this paper discusses in detail the use of data mining technology to automatically establish a case database, which is a useful exploration and practice for the public security department to establish a new and efficient case investigation auxiliary decision-making system. In addition, this paper studies the method of using data mining technology to assist in the establishment of a case database, analyzes the characteristics of traditional case storage methods, and constructs a case investigation model based on artificial intelligence data processing. The research results show that the model constructed in this paper has certain practical effects.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer