2013 IEEE International Conference on Intelligence and Security Informatics 2013
DOI: 10.1109/isi.2013.6578772
|View full text |Cite
|
Sign up to set email alerts
|

Crime linkage: A fuzzy MCDM approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…In the domain of crime analysis, such flexible and intuitive approaches for change points detection are particularly sought, especially for crime trends monitoring. Previous studies from the authors ( [1], [2], [3], and [4]) emphasize on the usefulness of crime trends monitoring activities and advocate the use of appropriate methods for considering the specificities and the constraints of the crime analysis domain, that is basically dealing with uncertainties. The automated process of change points detection is considered as a major step in the production of intelligence, supporting the activity of crime analysis (also sometimes referred to crime intelligence).…”
Section: Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…In the domain of crime analysis, such flexible and intuitive approaches for change points detection are particularly sought, especially for crime trends monitoring. Previous studies from the authors ( [1], [2], [3], and [4]) emphasize on the usefulness of crime trends monitoring activities and advocate the use of appropriate methods for considering the specificities and the constraints of the crime analysis domain, that is basically dealing with uncertainties. The automated process of change points detection is considered as a major step in the production of intelligence, supporting the activity of crime analysis (also sometimes referred to crime intelligence).…”
Section: Motivationmentioning
confidence: 99%
“…. , y 10 ), the change points x detected are x 3 and x 7 ; then x = (3, 7), W(s) = {s (1) , s (2) , s (3) }, with s (1) = (y 0 , y 1 , y 2 , y 3 ), s (2) = (y 4 , y 5 , y 6 , y 7 ), s (3) = (y 8 , y 9 , y 10 ). It has to be emphasized that these contiguous windows do not need to have the same size.…”
Section: Segmenting Time Seriesmentioning
confidence: 99%
“…In the existing literature, some papers adeal with crime by applying an MCDM framework. However, all of them examined the root of crimes by using these techniques instead of making a performance analysis on this issue (Manning et al 2013;Albertetti et al 2013;Shamsuddin et al, 2012). Although these papers are valuable, they are not related to the scope of the current paper, and they used traditional MCDM approaches, which has many drawbacks and limitations.…”
Section: Introductionmentioning
confidence: 99%
“…To do so, several mathematical methods that effectively compute these similarities can be put altogether. This paper is an extension of a preliminary study [1]. It is supported by the Swiss National Science Foundation (SNSF) [project 135236].…”
Section: Introductionmentioning
confidence: 99%
“…As an extension of a preliminary study [1] describing a crime linkage method, this current paper provides further work with a step-by-step methodology, thorough theoretical foundations, detailed experiments and interpreted results.…”
Section: Introductionmentioning
confidence: 99%