2021
DOI: 10.1016/j.ijinfomgt.2019.102045
|View full text |Cite
|
Sign up to set email alerts
|

Leveraging Deep Learning and SNA approaches for Smart City Policing in the Developing World

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
4
1

Relationship

1
9

Authors

Journals

citations
Cited by 27 publications
(9 citation statements)
references
References 43 publications
0
9
0
Order By: Relevance
“…A citation network is a graph, its nodes being articles and its edges citation links between them [24,25]. In recent years, a number of studies have been conducted to leverage deep neural networks and word embedding to extract entities from web and social network datasets [26][27][28][29][30].…”
Section: Literature Reviewmentioning
confidence: 99%
“…A citation network is a graph, its nodes being articles and its edges citation links between them [24,25]. In recent years, a number of studies have been conducted to leverage deep neural networks and word embedding to extract entities from web and social network datasets [26][27][28][29][30].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The diffusion of information technology in the policing services lies in the entire operations. From the back-end strategies, the use of the information technology includes data security and data protection (Roseline & Geetha, 2021), distinguishing criminals from non-criminals by tapping into the power of social network analysis (Hassan et al, 2019), and early predictions of crimes by real-time analysis (Manjunatha & Annappa, 2020). Likewise, the success of the IT adoption and usage is also evaluated against the perception of the police officers.…”
Section: Introductionmentioning
confidence: 99%
“…These solutions must be compatible with standard communication protocols. IoT devices generate vast quantities of data during industrial operations, which can make an IIoT system a favorite target for attackers [7], [8]. Due to the large quantity of data, traditional data processing techniques are not suitable for IoT and IIoT applications.…”
Section: Introductionmentioning
confidence: 99%