Edge assisted crime prediction and evaluation framework for machine learning algorithms
The growing global populations, particularly in major cities, have created new problems, notably in terms of public safety regulation and optimization. As a result, in this paper, a strategy is provided for predicting crime occurrences in a city based on historical events and demographic observation...
| Main Authors: | Adhikary, Apurba, Murad, Saydul Akbar, Munir, Md Shirajum, Choong Seon, Hong Seong |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English English |
| Published: |
IEEE Computer Society
2022
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/39595/ http://umpir.ump.edu.my/id/eprint/39595/1/Edge%20Assisted%20Crime%20Prediction%20and%20Evaluation%20Framework%20for%20Machine.pdf http://umpir.ump.edu.my/id/eprint/39595/2/Edge%20assisted%20crime%20prediction%20and%20evaluation%20framework%20for%20machine%20learning%20algorithms_ABS.pdf |
Similar Items
PhishGuard: Machine learning-powered phishing URL detection
by: Murad, Saydul Akbar, et al.
Published: (2023)
by: Murad, Saydul Akbar, et al.
Published: (2023)
Impact learning : A learning method from feature’s impact and competition
by: Prottasha, Nusrat Jahan, et al.
Published: (2023)
by: Prottasha, Nusrat Jahan, et al.
Published: (2023)
Performance evaluation of micro lens arrays: Improvement of light intensity and efficiency of white organic light emitting diodes
by: Adhikary, Apurba, et al.
Published: (2022)
by: Adhikary, Apurba, et al.
Published: (2022)
AI powered asthma prediction towards treatment formulation : An android app approach
by: Murad, Saydul Akbar, et al.
Published: (2022)
by: Murad, Saydul Akbar, et al.
Published: (2022)
Impact learning: A learning method from feature’s impact and competition
by: Prottasha, Nusrat Jahan, et al.
Published: (2023)
by: Prottasha, Nusrat Jahan, et al.
Published: (2023)
A new priority rule cloud scheduling technique that utilizes gaps to increase the efficiency of jobs distribution
by: Saydul Akbar, Murad
Published: (2023)
by: Saydul Akbar, Murad
Published: (2023)
Impact learning: A learning method from feature's impact and competition
by: Prottasha, Nusrat Jahan, et al.
Published: (2023)
by: Prottasha, Nusrat Jahan, et al.
Published: (2023)
Artificial intelligence and edge computing for machine maintenance-review
by: Bala, Abubakar, et al.
Published: (2024)
by: Bala, Abubakar, et al.
Published: (2024)
AI powered asthma prediction towards treatment formulation: an android app approach
by: Murad, Saydul Akbar, et al.
Published: (2022)
by: Murad, Saydul Akbar, et al.
Published: (2022)
Multiple vehicle cooperation and collision avoidance in automated vehicles : Survey and an AI‑enabled conceptual framework
by: Abu Jafar, Md Muzahid, et al.
Published: (2023)
by: Abu Jafar, Md Muzahid, et al.
Published: (2023)
A social network of crime : A review of the use of social networks for crime and the detection of crime
by: Drury, Brett, et al.
Published: (2022)
by: Drury, Brett, et al.
Published: (2022)
A review on job scheduling technique in cloud computing and priority rule based intelligent framework
by: Murad, Saydul Akbar, et al.
Published: (2022)
by: Murad, Saydul Akbar, et al.
Published: (2022)
Comparative study on job scheduling using priority rule and machine learning
by: Murad, Saydul Akbar, et al.
Published: (2021)
by: Murad, Saydul Akbar, et al.
Published: (2021)
The Development and Deployment of an Online Exam System A Web Application
by: Islam, Md. Monarul, et al.
Published: (2023)
by: Islam, Md. Monarul, et al.
Published: (2023)
Priority based fair scheduling : Enhancing efficiency in cloud job distribution
by: Murad, Saydul Akbar, et al.
Published: (2023)
by: Murad, Saydul Akbar, et al.
Published: (2023)
A deep Spatio-temporal network for vision-based sexual harassment detection
by: Islam, Md Shamimul, et al.
Published: (2021)
by: Islam, Md Shamimul, et al.
Published: (2021)
Transforming education with cutting-edge technology
by: Mohamed Ariff, Ameedeen
Published: (2022)
by: Mohamed Ariff, Ameedeen
Published: (2022)
An Edge-Wise Linear Shortest Path Algorithm for Non-Negative Weighted Undirected Graphs
by: Qureshi, M.A., et al.
Published: (2010)
by: Qureshi, M.A., et al.
Published: (2010)
Image resolution enhancement using improved edge directed interpolation algorithm
by: Hossain, Md Shamim, et al.
Published: (2019)
by: Hossain, Md Shamim, et al.
Published: (2019)
A conceptual anonymity model to ensure privacy for sensitive network data
by: Arafat, N.H.M., et al.
Published: (2021)
by: Arafat, N.H.M., et al.
Published: (2021)
Bilinear-pairing-based remote user authentication schemes using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
by: Pathan, Al-Sakib Khan, et al.
Published: (2009)
Secure framework for implementing close circuit television (CCTV) system as a crime prevention tool : case study (Malaysia)
by: Achin, Hamidi
Published: (2008)
by: Achin, Hamidi
Published: (2008)
Transfer learning for sentiment analysis using bert based supervised fine-tuning
by: Prottasha, Nusrat Jahan, et al.
Published: (2022)
by: Prottasha, Nusrat Jahan, et al.
Published: (2022)
Priority based job scheduling technique that utilizes gaps to increase the efficiency of job distribution in cloud computing
by: Murad, Saydul Akbar, et al.
Published: (2024)
by: Murad, Saydul Akbar, et al.
Published: (2024)
Machine learning algorithms for early predicting dropout student online learning
by: Dewi, Meta Amalya, et al.
Published: (2023)
by: Dewi, Meta Amalya, et al.
Published: (2023)
4D : A real-time driver drowsiness detector using deep learning
by: Jahan, Israt, et al.
Published: (2023)
by: Jahan, Israt, et al.
Published: (2023)
Image edge detection system / Azimah Razali
by: Azimah, Razali
Published: (2003)
by: Azimah, Razali
Published: (2003)
Edge link detector based weed classifier
by: M.H., Siddiqi, et al.
Published: (2009)
by: M.H., Siddiqi, et al.
Published: (2009)
A framework for providing e-services to the rural areas using wireless ad hoc and sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
SG-PBFS : Shortest Gap-Priority Based Fair Scheduling technique for job scheduling in cloud environment
by: Murad, Saydul Akbar, et al.
Published: (2024)
by: Murad, Saydul Akbar, et al.
Published: (2024)
Optimization of Processor Architecture for Image Edge Detection Filter
by: M. Osman, Zahraa Elhassan, et al.
Published: (2010)
by: M. Osman, Zahraa Elhassan, et al.
Published: (2010)
Oscillating supersonic delta wings with curved leading edges
by: Khan, Sher Afghan, et al.
Published: (2010)
by: Khan, Sher Afghan, et al.
Published: (2010)
Public key cryptography in resource-constrained WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
by: Pathan, Al-Sakib Khan, et al.
Published: (2008)
Developing an efficient DMCIS with next-generation wireless networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Secure clustering in DSN with key predistribution and WCDS
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
An improved timestamp-based password authentication scheme with two-party verification using smart cards
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
An efficient scheme for secure data transmission in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A secure and efficient way of node membership verification in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Securing sensor reports in wireless sensor networks
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
A secure energy-efficient routing protocol for WSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
by: Pathan, Al-Sakib Khan, et al.
Published: (2007)
Similar Items
-
PhishGuard: Machine learning-powered phishing URL detection
by: Murad, Saydul Akbar, et al.
Published: (2023) -
Impact learning : A learning method from feature’s impact and competition
by: Prottasha, Nusrat Jahan, et al.
Published: (2023) -
Performance evaluation of micro lens arrays: Improvement of light intensity and efficiency of white organic light emitting diodes
by: Adhikary, Apurba, et al.
Published: (2022) -
AI powered asthma prediction towards treatment formulation : An android app approach
by: Murad, Saydul Akbar, et al.
Published: (2022) -
Impact learning: A learning method from feature’s impact and competition
by: Prottasha, Nusrat Jahan, et al.
Published: (2023)