Abstract
A security portrait big data application system is introduced in this paper. Including its design requirements, business database, overall architecture, logical integration architecture and key technologies. The security portrait data application system has been used in the police industry. The application results show that the system can dynamically monitor and track the suspects. The system can effectively predict the crime situation, and has played a role in practice. It provides effective data support and assistant decision-making services for social security, crime search and prediction. And the system effectively improves the actual combat ability of police departments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Lane, J.: Building an infrastructure to support the use of government administrative data for program performance and social science research. Ann. Am. Acad. Polit. Soc. Sci. 675(1), 240–252 (2018)
Lin, L.: Application of data mining in library-based personalized learning. Int. J. Emerg. Technol. Learn. 12(12), 127–133 (2017)
Hong, Y., Ruiqi, Z.: Data analysis framework of user information search behavior and its key technologies. Libr. Sci. Res., 39–46 (2016)
Ramesh, B.: Big data architecture. In: Mohanty, H., Bhuyan, P., Chenthati, D. (eds.) Big Data. SBD, vol. 11, pp. 29–59. Springer, New Delhi (2015). https://doi.org/10.1007/978-81-322-2494-5_2
Park, E., Kim, K.: An integrated adoption model of mobile cloud services. Telematics Inform. 31(3), 376–385 (2014)
Turel, O., Connelly, E.: Too busy to help: antecedents and outcomes of interactional justice in web-based service encounters. Int. J. Inf. Manag. 33(4), 674–683 (2013)
Dong, X., Chang, Y., Wang, Y.: Understanding usage of Internet of Things (IOT) systems in China: cognitive experience and affect experience as moderator. Inf. Technol. People 30(1), 117–138 (2017)
Shin, H.: Effect of the customer experience on satisfaction with smartphones: assessing smart satisfaction index with partial least squares. Telecommun. Policy 39(8), 627–641 (2015)
Bae, S.J., Lee, H., Suh, E.K.: Shared experience in pretrip and experience sharing in posttrip: a survey of Airbnb users. Inf. Manag. 54(6), 714–727 (2017)
Lowry, P.B., Wilson, D.: Creating agile organizations through IT: the influence of internal IT service perceptions on IT service quality and IT agility. J. Strateg. Inf. Syst. 25(3), 211–226 (2016)
Park, M.: Human multiple information task behavior on the web. Aslib J. Inf. Manag. 67(2), 118–135 (2015)
Wenjia, X., Shijun, X., Vasily, S.: A cryptograph domain image retrieval method based on Paillier homomorphic block encryption. CMC Comput. Mater. Continua 055(2), 285–295 (2018)
Zhenjun, T., et al.: Robust image hashing via random Gabor filtering and DWT. CMC Comput. Mater. Continua 55(2), 331–344 (2018)
Xiang, W., Chen, X., Qingqi, P., Youyang, Q.: Expression preserved face privacy protection based on multi-mode discriminant analysis. CMC Comput. Mater. Continua 57(1), 107–121 (2018)
Guoyuan, L., Bowen, L., Pengcheng, X., Min, L., Wei, B.: Phishing detection with image retrieval based on improved text on correlation descriptor. CMC Comput. Mater. Continua 57(3), 533–547 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Hui, Y. (2019). Design of Security Portrait Big Data Application System. In: Sun, X., Pan, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2019. Lecture Notes in Computer Science(), vol 11633. Springer, Cham. https://doi.org/10.1007/978-3-030-24265-7_41
Download citation
DOI: https://doi.org/10.1007/978-3-030-24265-7_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24264-0
Online ISBN: 978-3-030-24265-7
eBook Packages: Computer ScienceComputer Science (R0)