Skip to main content

Design of Security Portrait Big Data Application System

  • Conference paper
  • First Online:
Artificial Intelligence and Security (ICAIS 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11633))

Included in the following conference series:

  • 1653 Accesses

Abstract

A security portrait big data application system is introduced in this paper. Including its design requirements, business database, overall architecture, logical integration architecture and key technologies. The security portrait data application system has been used in the police industry. The application results show that the system can dynamically monitor and track the suspects. The system can effectively predict the crime situation, and has played a role in practice. It provides effective data support and assistant decision-making services for social security, crime search and prediction. And the system effectively improves the actual combat ability of police departments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lane, J.: Building an infrastructure to support the use of government administrative data for program performance and social science research. Ann. Am. Acad. Polit. Soc. Sci. 675(1), 240–252 (2018)

    Article  Google Scholar 

  2. Lin, L.: Application of data mining in library-based personalized learning. Int. J. Emerg. Technol. Learn. 12(12), 127–133 (2017)

    Article  Google Scholar 

  3. Hong, Y., Ruiqi, Z.: Data analysis framework of user information search behavior and its key technologies. Libr. Sci. Res., 39–46 (2016)

    Google Scholar 

  4. Ramesh, B.: Big data architecture. In: Mohanty, H., Bhuyan, P., Chenthati, D. (eds.) Big Data. SBD, vol. 11, pp. 29–59. Springer, New Delhi (2015). https://doi.org/10.1007/978-81-322-2494-5_2

    Chapter  Google Scholar 

  5. Park, E., Kim, K.: An integrated adoption model of mobile cloud services. Telematics Inform. 31(3), 376–385 (2014)

    Article  Google Scholar 

  6. Turel, O., Connelly, E.: Too busy to help: antecedents and outcomes of interactional justice in web-based service encounters. Int. J. Inf. Manag. 33(4), 674–683 (2013)

    Article  Google Scholar 

  7. Dong, X., Chang, Y., Wang, Y.: Understanding usage of Internet of Things (IOT) systems in China: cognitive experience and affect experience as moderator. Inf. Technol. People 30(1), 117–138 (2017)

    Article  Google Scholar 

  8. Shin, H.: Effect of the customer experience on satisfaction with smartphones: assessing smart satisfaction index with partial least squares. Telecommun. Policy 39(8), 627–641 (2015)

    Article  Google Scholar 

  9. Bae, S.J., Lee, H., Suh, E.K.: Shared experience in pretrip and experience sharing in posttrip: a survey of Airbnb users. Inf. Manag. 54(6), 714–727 (2017)

    Article  Google Scholar 

  10. Lowry, P.B., Wilson, D.: Creating agile organizations through IT: the influence of internal IT service perceptions on IT service quality and IT agility. J. Strateg. Inf. Syst. 25(3), 211–226 (2016)

    Article  Google Scholar 

  11. Park, M.: Human multiple information task behavior on the web. Aslib J. Inf. Manag. 67(2), 118–135 (2015)

    Article  Google Scholar 

  12. Wenjia, X., Shijun, X., Vasily, S.: A cryptograph domain image retrieval method based on Paillier homomorphic block encryption. CMC Comput. Mater. Continua 055(2), 285–295 (2018)

    Google Scholar 

  13. Zhenjun, T., et al.: Robust image hashing via random Gabor filtering and DWT. CMC Comput. Mater. Continua 55(2), 331–344 (2018)

    Google Scholar 

  14. Xiang, W., Chen, X., Qingqi, P., Youyang, Q.: Expression preserved face privacy protection based on multi-mode discriminant analysis. CMC Comput. Mater. Continua 57(1), 107–121 (2018)

    Article  Google Scholar 

  15. Guoyuan, L., Bowen, L., Pengcheng, X., Min, L., Wei, B.: Phishing detection with image retrieval based on improved text on correlation descriptor. CMC Comput. Mater. Continua 57(3), 533–547 (2018)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yin Hui .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hui, Y. (2019). Design of Security Portrait Big Data Application System. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11633. Springer, Cham. https://doi.org/10.1007/978-3-030-24265-7_41

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-24265-7_41

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-24264-0

  • Online ISBN: 978-3-030-24265-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics