Access the full text.
Sign up today, get DeepDyve free for 14 days.
G. Carpenter, S. Grossberg (1988)
The ART of Adaptive Pattern Recognition Self-organizing by a Neu Network
(1998)
Statistical Pattern Recognition with NN: Benchmarking Studies
J. Naylor, A. Higgins, K. Li, D. Schmoldt (1988)
Speaker recognition using kohonen's self-organizing feature map algorithmNeural Networks, 1
T. Muscarello, Kamal Dahbur (2000)
An artificial intelligence approach to pattern discovery in criminal databases
(1995)
Application of Artificial Intelligence Methodology to the Problem of Identifying Career Criminals in Large Crime Databases, Project Report
E. Diday (1973)
The dynamic clusters method in nonhierarchical clusteringInternational Journal of Computer & Information Sciences, 2
Y. Pao, G. Park, D. Sobajic (1994)
Learning and generalization characteristics of the random vector Functional-link netNeurocomputing, 6
T. Kohonen (1990)
The self-organizing mapNeurocomputing, 21
(2019)
1. WHAT IS DATA MINING?Data Mining for the Social Sciences
T. Cover, P. Hart (1967)
Nearest neighbor pattern classificationIEEE Trans. Inf. Theory, 13
P. McKenzie, M. Alder (1994)
Unsupervised learning: the Dog Rabbit strategyProceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94), 2
G. Carpenter, S. Grossberg (1987)
ART 2: self-organization of stable category recognition codes for analog input patterns.Applied optics, 26 23
V. Moustakis, M. Lehto, G. Salvendy (1996)
Survey of expert opinion: Which machine learning method may be used for which task?Int. J. Hum. Comput. Interact., 8
G. Carpenter, S. Grossberg (1990)
ART 3: Hierarchical search using chemical transmitters in self-organizing pattern recognition architecturesNeural Networks, 3
J. MacQueen (1967)
Some methods for classification and analysis of multivariate observations, 1
G. Carpenter, S. Grossberg (1987)
The ART of adaptive pattern recognition by a self-organizing neural networkComputer, 21
(1976)
Patterns of Robbery Characteristics and Their Occurrence Among Social Areas, Analytic Report 15, Utilization of Criminal Justice Statistics Project, Criminal Justice Research Center
K. Chung, Tong Lee (1994)
Fuzzy competitive learningNeural Networks, 7
G. Ball, D. Hall (1967)
A clustering technique for summarizing multivariate data.Behavioral science, 12 2
(1995)
Application of Artificial Intelligence Methodology to the Problem of Identifying Career Criminals in Large Crime Databases
T. Kohonen (1988)
An introduction to neural computingNeural Networks, 1
Xiaohua Xia, P. Brockett (1996)
Neural network models in predicting insurance insolvency and detecting insurance claim fraud
(1976)
Patterns of Robbery Characteristics and Their Occurrence Among Social Areas, Analytic Report 15
Dong-Hyun Lee, John Payne, H. Byun, K. Persaud (1996)
Application of Radial Basis Function Neural Networks to Odour Sensing Using a Broad Specifity Array of Conducting Polymers
B. Batchelor (1969)
Method for location of clusters of patterns to initialise a learning machineElectronics Letters, 5
G. Carpenter, S. Grossberg (1988)
A massively parallel architecture for a self-organizing neural pattern recognition machineComput. Vis. Graph. Image Process., 37
Philippe Wilde (1996)
Neural Network Models
J. Bigus (1996)
Data mining with neural networks: solving business problems from application development to decision support
R. Bharath, James Drosen (1994)
Neural Network Computing
D.C. Park, I. Dagher (1994)
Gradient based fuzzy c-means (GBFCM) algorithmProceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94), 3
The data mining field in computer science specializes in extracting implicit information that is distributed across the stored data records and/or exists as associations among groups of records. Criminal databases contain information on the crimes themselves, the offenders, the victims as well as the vehicles that were involved in the crime. Among these records lie groups of crimes that can be attributed to serial criminals who are responsible for multiple criminal offenses and usually exhibit patterns in their operations, by specializing in a particular crime category (i.e., rape, murder, robbery, etc.), and applying a specific method for implementing their crimes. Discovering serial criminal patterns in crime databases is, in general, a clustering activity in the area of data mining that is concerned with detecting trends in the data by classifying and grouping similar records. In this paper, we report on the different statistical and neural network approaches to the clustering problem in data mining in general, and as it applies to our crime domain in particular. We discuss our approach of using a cascaded network of Kohonen neural networks followed by heuristic processing of the networks outputs that best simulated the experts in the field. We address the issues in this project and the reasoning behind this approach, including: the choice of neural networks, in general, over statistical algorithms as the main tool, and the use of Kohonen networks in particular, the choice for the cascaded approach instead of the direct approach, and the choice of a heuristics subsystem as a back-end subsystem to the neural networks. We also report on the advantages of this approach over both the traditional approach of using a single neural network to accommodate all the attributes, and that of applying a single clustering algorithm on all the data attributes.
Artificial Intelligence and Law – Springer Journals
Published: Nov 7, 2004
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.