Abstract
With the rapid development of China’s national economy, the effects of traditional public security management methods have been greatly weakened, and various new types of criminal activities have continued to occur. Social development has gradually separated from the previous model, and new social contradictions have become prominent. These social contradictions not only impact the lifestyle of ordinary individuals, but also affect the development of society. The data contains the laws of social development and crime governance. How criminal governance adapts to the big data wave has become the key to carrying out the number management in the three-dimensional security prevention and control. The data culture has promoted the transformation of the social governance model and has also led to the transformation of the social science research paradigm. At present, most of the research on big data is only from the perspective of informatics, and there is not much discussion about big data from the legal system level. With the advent of the era of big data, a series of problems have come along. In addition to strengthening the security of the big data operation process at the technical level, it is necessary to strengthen research from a technical level. In this paper, we propose a smart crime prevention and control big data analysis system based on machine Internet of Things and industrial object system. The experimental results show that the proposed method has higher data collection rate and crime prevention and control efficiency.
Similar content being viewed by others
Change history
11 April 2024
This article has been retracted. Please see the Retraction Notice for more detail: https://doi.org/10.1007/s11063-024-11602-3
References
Luo W (2009) Intrusion detection and video surveillance. Chinese People’s Public Security University Press, Beijing
Chen T et al (2015) National governance in the age of big data. China Social Science Press, Beijing, p 10
Tu Z (2014) The data: the big data revolution, history, reality and future, vol 27. CITIC Publishing House, Beijing, pp 258–259
Lu X, Qu Z, Li Q et al (2015) Privacy information security classification for internet of things based on internet data. Int J Distrib Sens Netw 2015(6):23
Perrone G, Vecchio M, Pecori R et al. (2017) The day after mirai: a survey on MQTT security solutions after the largest cyber-attack carried out through an Army of IoT devices: international conference on internet of things, big data and security
Cui L, Ma W, Zhao W et al (2017) Overview of botnets. Inf Secur Res 07:589–600
Chen Q, Zhang G, Yang X, Li S, Li Y, Wang HH (2018) Single image shadow detection and removal based on feature fusion and multiple dictionary learning. Multimed Tools Appl 77(14):18601–18624
Ahmed SB, Naz S, Swati S, Razzak MI (2019) Handwritten Urdu character recognition using one-dimensional BLSTM classifier. Neural Comput Appl 31(4):1143–1151
Huang C, Lin W, Lai C, Li X, Jin Y, Yong Q (2019) Coupling the post-extraction process to remove residual lignin and alter the recalcitrant structures for improving the enzymatic digestibility of acid-pretreated bamboo residues. Biores Technol 285:121355
Choi C, Esposito C, Wang H, Liu Z, Choi J (2018) Intelligent power equipment management based on distributed context-aware inference in smart cities. IEEE Commun Mag 56(7):212–217
Wickes R (2010) Review of: crime and everyday life by marcus felson and rachel boba. Aust New Zealand J Criminol 43(2):383–385
Kennedy LW, Forde DR (1996) Pathways to aggression: afactorial survey of “Routine conflict”. J Quant Criminol 12(4):417–438
Hayden CE (2009) James Wilson. Nat News 10(2):55–56
Gilling D (2010) crime control and due process in confidence-building strategies: a governmentality perspective. Br J Criminol 50(6):1136–1154
Pavlichin DS, Jiao J, Weissman T (2019) Approximate profile maximum likelihood. J Mach Learn Res 20(122):1–55
Allen TT, Sui Z, Akbari K (2018) Exploratory text data analysis for quality hypothesis generation. Qual Eng 30(4):701–712. https://doi.org/10.1080/08982112.2018.1481216
Jiao J, Han Y, Fischer-Hwang I, Weissman T (2019) Estimating the fundamental limits is easier than achieving the fundamental limits. IEEE Trans Inf Theory 65(10):6704–6715
Zhang S, Wang H, Huang W (2017) Two-stage plant species recognition by local mean clustering and Weighted sparse representation classification. Cluster Comput 20(2):1517–1525
Li F, Ye Y, Tian Z, Zhang X (2019) CPU versus GPU: which can perform matrix computation faster—performance comparison for basic linear algebra subprograms. Neural Comput Appl 31(8):4353–4365
Akira M, Noboru N, Kazunobu I (2005) Development of robot tractor using the low-cost GPS/INS system. ASAE meeting presentation. Paper number. 051138
Annamalai R, Lee WS, Burks TF (2004) Color vision system for estimating citrus yield in real-time. ASAE/CSAE Annual international meeting
Bastiaanssen WGM, Ali S (2003) A new crop yield forecasting based based on satellite measurements applied across the Indus Basin, Pakistan. Agr Ecosyst Environ 94:321–340
Sun Y (2019) Analysis for center deviation of circular target under perspective projection. Eng Comput 36(7):2403–2413. https://doi.org/10.1108/EC-09-2018-0431
Zhang S, Wang H, Huang W, You Z (2018) Plant diseased leaf segmentation and recognition by fusion of superpixel, K-means and PHOG. Optik 157:866–872
Fanti G, Jiao J, Makkuva A, Oh S, Rana R, Viswanath P (2019) Barracuda: the power of ℓ-polling in proof-of-stake blockchains. In: Proceedings of the twentieth ACM international symposium on mobile ad hoc networking and computing, pp 351–360
Granitto PM, Verdes PF, Alejandro H (2015) Large-scale investigation of weed seed identification by machine vision. Comput Electron Agric 47:15–24
Guyer DE, Miles GE, Schreiber MM et al (1986) Machine vision and image processing for Plant identification. Trans ASAE 29(6):1500–1507
Hague T, Marchant JA, Tillett ND (2000) Ground based sensing systems for autonomous agricultural vehicles. Comput Electron Agric 25:11–28
Hemming J, Rath T (2001) Computer-vision-based weed identification under field conditions using controlled lighting. J Agric Eng Res 78(3):233–243
Allen TT, Sui Z, Parker NL (2017) Timely decision analysis enabled by efficient social media modeling. Decis Anal 14(4):250–260. https://doi.org/10.1287/deca.2017.0360
Ruan L, Li C, Zhang Y, Wang H (2019) Soft computing model based financial aware spatiotemporal social network analysis and visualization for smart cities. Comput Environ Urban Syst 77:101268
Huang C, Wang X, Liang C, Jiang X, Yang G, Xu J, Yong Q (2019) A sustainable process for procuring biologically active fractions of high-purity xylooligosaccharides and water-soluble lignin from Moso bamboo prehydrolyzate. Biotechnol Biofuels 12(1):189
Niu CC, Zou KC, Yang YLO et al (2013) Security and privacy issues of the Internet of Things. Appl Mech Mater 416:1429–1433
Acknowledgements
This research was supported by the Youth Fund Project of Ministry of education of China: An Empirical Study of the influence of floating population status on sentencing discretion (Subject Number: 16YJC820015).
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s11063-024-11602-3
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Cai, Y., Li, D. & Wang, Y. RETRACTED ARTICLE: Intelligent Crime Prevention and Control Big Data Analysis System Based on Imaging and Capsule Network Model. Neural Process Lett 53, 2485–2499 (2021). https://doi.org/10.1007/s11063-020-10256-1
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11063-020-10256-1