Skip to main content

Advertisement

Log in

RETRACTED ARTICLE: Intelligent Crime Prevention and Control Big Data Analysis System Based on Imaging and Capsule Network Model

  • Published:
Neural Processing Letters Aims and scope Submit manuscript

This article was retracted on 11 April 2024

This article has been updated

Abstract

With the rapid development of China’s national economy, the effects of traditional public security management methods have been greatly weakened, and various new types of criminal activities have continued to occur. Social development has gradually separated from the previous model, and new social contradictions have become prominent. These social contradictions not only impact the lifestyle of ordinary individuals, but also affect the development of society. The data contains the laws of social development and crime governance. How criminal governance adapts to the big data wave has become the key to carrying out the number management in the three-dimensional security prevention and control. The data culture has promoted the transformation of the social governance model and has also led to the transformation of the social science research paradigm. At present, most of the research on big data is only from the perspective of informatics, and there is not much discussion about big data from the legal system level. With the advent of the era of big data, a series of problems have come along. In addition to strengthening the security of the big data operation process at the technical level, it is necessary to strengthen research from a technical level. In this paper, we propose a smart crime prevention and control big data analysis system based on machine Internet of Things and industrial object system. The experimental results show that the proposed method has higher data collection rate and crime prevention and control efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Change history

References

  1. Luo W (2009) Intrusion detection and video surveillance. Chinese People’s Public Security University Press, Beijing

    Google Scholar 

  2. Chen T et al (2015) National governance in the age of big data. China Social Science Press, Beijing, p 10

    Google Scholar 

  3. Tu Z (2014) The data: the big data revolution, history, reality and future, vol 27. CITIC Publishing House, Beijing, pp 258–259

    Google Scholar 

  4. Lu X, Qu Z, Li Q et al (2015) Privacy information security classification for internet of things based on internet data. Int J Distrib Sens Netw 2015(6):23

    Google Scholar 

  5. Perrone G, Vecchio M, Pecori R et al. (2017) The day after mirai: a survey on MQTT security solutions after the largest cyber-attack carried out through an Army of IoT devices: international conference on internet of things, big data and security

  6. Cui L, Ma W, Zhao W et al (2017) Overview of botnets. Inf Secur Res 07:589–600

    Google Scholar 

  7. Chen Q, Zhang G, Yang X, Li S, Li Y, Wang HH (2018) Single image shadow detection and removal based on feature fusion and multiple dictionary learning. Multimed Tools Appl 77(14):18601–18624

    Article  Google Scholar 

  8. Ahmed SB, Naz S, Swati S, Razzak MI (2019) Handwritten Urdu character recognition using one-dimensional BLSTM classifier. Neural Comput Appl 31(4):1143–1151

    Article  Google Scholar 

  9. Huang C, Lin W, Lai C, Li X, Jin Y, Yong Q (2019) Coupling the post-extraction process to remove residual lignin and alter the recalcitrant structures for improving the enzymatic digestibility of acid-pretreated bamboo residues. Biores Technol 285:121355

    Article  Google Scholar 

  10. Choi C, Esposito C, Wang H, Liu Z, Choi J (2018) Intelligent power equipment management based on distributed context-aware inference in smart cities. IEEE Commun Mag 56(7):212–217

    Article  Google Scholar 

  11. Wickes R (2010) Review of: crime and everyday life by marcus felson and rachel boba. Aust New Zealand J Criminol 43(2):383–385

    Google Scholar 

  12. Kennedy LW, Forde DR (1996) Pathways to aggression: afactorial survey of “Routine conflict”. J Quant Criminol 12(4):417–438

    Article  Google Scholar 

  13. Hayden CE (2009) James Wilson. Nat News 10(2):55–56

    Google Scholar 

  14. Gilling D (2010) crime control and due process in confidence-building strategies: a governmentality perspective. Br J Criminol 50(6):1136–1154

    Article  Google Scholar 

  15. Pavlichin DS, Jiao J, Weissman T (2019) Approximate profile maximum likelihood. J Mach Learn Res 20(122):1–55

    MathSciNet  Google Scholar 

  16. Allen TT, Sui Z, Akbari K (2018) Exploratory text data analysis for quality hypothesis generation. Qual Eng 30(4):701–712. https://doi.org/10.1080/08982112.2018.1481216

    Article  Google Scholar 

  17. Jiao J, Han Y, Fischer-Hwang I, Weissman T (2019) Estimating the fundamental limits is easier than achieving the fundamental limits. IEEE Trans Inf Theory 65(10):6704–6715

    Article  MathSciNet  Google Scholar 

  18. Zhang S, Wang H, Huang W (2017) Two-stage plant species recognition by local mean clustering and Weighted sparse representation classification. Cluster Comput 20(2):1517–1525

    Article  Google Scholar 

  19. Li F, Ye Y, Tian Z, Zhang X (2019) CPU versus GPU: which can perform matrix computation faster—performance comparison for basic linear algebra subprograms. Neural Comput Appl 31(8):4353–4365

    Article  Google Scholar 

  20. Akira M, Noboru N, Kazunobu I (2005) Development of robot tractor using the low-cost GPS/INS system. ASAE meeting presentation. Paper number. 051138

  21. Annamalai R, Lee WS, Burks TF (2004) Color vision system for estimating citrus yield in real-time. ASAE/CSAE Annual international meeting

  22. Bastiaanssen WGM, Ali S (2003) A new crop yield forecasting based based on satellite measurements applied across the Indus Basin, Pakistan. Agr Ecosyst Environ 94:321–340

    Article  Google Scholar 

  23. Sun Y (2019) Analysis for center deviation of circular target under perspective projection. Eng Comput 36(7):2403–2413. https://doi.org/10.1108/EC-09-2018-0431

    Article  Google Scholar 

  24. Zhang S, Wang H, Huang W, You Z (2018) Plant diseased leaf segmentation and recognition by fusion of superpixel, K-means and PHOG. Optik 157:866–872

    Article  Google Scholar 

  25. Fanti G, Jiao J, Makkuva A, Oh S, Rana R, Viswanath P (2019) Barracuda: the power of ℓ-polling in proof-of-stake blockchains. In: Proceedings of the twentieth ACM international symposium on mobile ad hoc networking and computing, pp 351–360

  26. Granitto PM, Verdes PF, Alejandro H (2015) Large-scale investigation of weed seed identification by machine vision. Comput Electron Agric 47:15–24

    Article  Google Scholar 

  27. Guyer DE, Miles GE, Schreiber MM et al (1986) Machine vision and image processing for Plant identification. Trans ASAE 29(6):1500–1507

    Article  Google Scholar 

  28. Hague T, Marchant JA, Tillett ND (2000) Ground based sensing systems for autonomous agricultural vehicles. Comput Electron Agric 25:11–28

    Article  Google Scholar 

  29. Hemming J, Rath T (2001) Computer-vision-based weed identification under field conditions using controlled lighting. J Agric Eng Res 78(3):233–243

    Article  Google Scholar 

  30. Allen TT, Sui Z, Parker NL (2017) Timely decision analysis enabled by efficient social media modeling. Decis Anal 14(4):250–260. https://doi.org/10.1287/deca.2017.0360

    Article  MathSciNet  Google Scholar 

  31. Ruan L, Li C, Zhang Y, Wang H (2019) Soft computing model based financial aware spatiotemporal social network analysis and visualization for smart cities. Comput Environ Urban Syst 77:101268

    Article  Google Scholar 

  32. Huang C, Wang X, Liang C, Jiang X, Yang G, Xu J, Yong Q (2019) A sustainable process for procuring biologically active fractions of high-purity xylooligosaccharides and water-soluble lignin from Moso bamboo prehydrolyzate. Biotechnol Biofuels 12(1):189

    Article  Google Scholar 

  33. Niu CC, Zou KC, Yang YLO et al (2013) Security and privacy issues of the Internet of Things. Appl Mech Mater 416:1429–1433

    Article  Google Scholar 

Download references

Acknowledgements

This research was supported by the Youth Fund Project of Ministry of education of China: An Empirical Study of the influence of floating population status on sentencing discretion (Subject Number: 16YJC820015).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yijun Cai.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article has been retracted. Please see the retraction notice for more detail: https://doi.org/10.1007/s11063-024-11602-3

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cai, Y., Li, D. & Wang, Y. RETRACTED ARTICLE: Intelligent Crime Prevention and Control Big Data Analysis System Based on Imaging and Capsule Network Model. Neural Process Lett 53, 2485–2499 (2021). https://doi.org/10.1007/s11063-020-10256-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11063-020-10256-1

Keywords

Navigation