skip to main content
10.1145/3501409.3501707acmotherconferencesArticle/Chapter ViewAbstractPublication PageseitceConference Proceedingsconference-collections
research-article

Construction and Optimization of Emergency Prediction Model based on random Forest algorithm

Authors Info & Claims
Published:31 December 2021Publication History

ABSTRACT

Based on the massive emergency data set, the emergency early warning model is established by using machine learning method to predict the realization risk of emergency attack target, and the importance characteristics of emergency early warning can be found. The 135-dimensional emergency features are screened, normalized, single thermal coding and chi-square test. Random forest algorithm and other machine learning algorithms are tested and evaluated. It is proved that random forest algorithm is better than other machine learning algorithms in performance. Based on the global emergency data from 2001 to 2019, this paper uses the random forest algorithm to reduce the dimension of the factors affecting the number of emergency casualties, selects the more important event characteristics, and forecasts the number of emergency casualties in the target country. finally, the international community overseas investment risk assessment and emergency early warning model construction optimization.

References

  1. China has signed 205 cooperation documents for the joint construction of "Belt and Road Initiative", https://www.yidaiyilu.gov.cn/xwzx/gnxw/163241.htm.Google ScholarGoogle Scholar
  2. Yu Chen, Wang Gaohui, Lu Wenbo. (2021). Research on casualty assessment model of sudden explosion in subway station. Journal of Underground Space and Engineering (04), 1273--1280.Google ScholarGoogle Scholar
  3. Wang Chenhui, Yuan Ying, Liu Lishen, Chen Kenan (2019). Prediction of earthquake casualties based on PCA-GSM-SVM. Seismological science in North China (03), 25--30.Google ScholarGoogle Scholar
  4. Li, S., Zhuang, J., & Shen, S. (2017). Dynamic Forecasting Conditional Probability of Bombing Attacks Based on Time - Series and Intervention Analysis. Risk analysis, 37(7), 1287--1297.Google ScholarGoogle Scholar
  5. University of Maryland. The Global Terrorism Database (GTD) - https://www.start.umd.edu/gtd.Google ScholarGoogle Scholar
  6. Yang Xiaolei. (2019). Research and Application of data Mining Technology in Global Terrorism Database (Master's thesis, Guangxi normal University).Google ScholarGoogle Scholar
  7. Tang Zheng. (2019). Research on risk Analysis method of Urban Nuclear, biochemical and unexpected events (Master's thesis, people's Public Security University of China).Google ScholarGoogle Scholar
  8. Guo Xuan, Wu Wenhui, Xiao Zhiting. (2017). Anti-terrorism intelligence mining based on deep learning and open source information. Information Theory and practice (09), 135--139.Google ScholarGoogle Scholar
  9. Wang Xin, Wu Shaozheng.(2020). Why it is difficult for intelligence to dominate policing: an analysis of the predicament and root causes of the five-eye alliance countries. Information magazine (12), 27--32+8. doGoogle ScholarGoogle Scholar
  10. Zhou Zhiren, Li Le.(2013). Evidence-based decision-making: international practice, theoretical origin and academic orientation. Chinese administration. (12), 23--27+43. doi:CNKI:SUN:ZXGL.0.2013-12-010.Google ScholarGoogle Scholar

Index Terms

  1. Construction and Optimization of Emergency Prediction Model based on random Forest algorithm

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      EITCE '21: Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering
      October 2021
      1723 pages
      ISBN:9781450384322
      DOI:10.1145/3501409

      Copyright © 2021 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 31 December 2021

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

      Acceptance Rates

      EITCE '21 Paper Acceptance Rate294of531submissions,55%Overall Acceptance Rate508of972submissions,52%
    • Article Metrics

      • Downloads (Last 12 months)11
      • Downloads (Last 6 weeks)1

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader