Please wait a minute...
Computer & Telecommunication  2018, Vol. 1 Issue (9): 52-53    DOI:
Current Issue | Archive | Adv Search |
Design Method of Communication Trace and Information Analysis System
Jinzhou Senior Middle School
Download:   PDF(0KB)
Export: BibTeX | EndNote (RIS)      
Abstract  In criminal activities, criminal suspects usually leave different degree of communication traces. Moreover, these communication traces not only contain the track of the suspect's activities, but also have a certain degree of predictive effect on potential criminal activities. Then, the statistical analysis of the communication traces of the target personnel will be an important link in recovering the case, determining the direction of investigation, tracking the target personnel and collecting criminal evidence. Therefore, this article has carried on the related research on the communication trace and the intelligence analysis, and has developed this software.
Key wordscommunication trace      service number      technical reconnaissance      data mining      credibility     
Published: 10 September 2018
:  TP311.13  

Cite this article:

ZHAO Yu-kuo. Design Method of Communication Trace and Information Analysis System. Computer & Telecommunication, 2018, 1(9): 52-53.

URL:

https://www.computertelecom.com.cn/EN/     OR     https://www.computertelecom.com.cn/EN/Y2018/V1/I9/52

[1] HUANG Hui-jun  WANG Bo  LI Yu-zhong . Data Analysis on the Utilization Rate of“ Whole Village Credit” for Local Rural Commercial Bank ——Take H Rural Commercial Bank for Example[J]. 电脑与电信, 2024, 1(5): 1-.
[2] WANG Mao-fa WANG Zi-min WANG Hua-deng LIU Zhen-bing. Construction and Research on Data Mining Course Based on Jupyter[J]. 电脑与电信, 2021, 1(7): 12-16.
[3] GE Xiao-yan. Exploring on Mixed Teaching Reform of Data Mining Course[J]. 电脑与电信, 2021, 1(6): 43-46.
[4] DU Zhen-xin.
Research on Process Generation Heuristic Teaching in Data Mining Course
[J]. 电脑与电信, 2021, 1(12): 47-49.
[5] YU Ye.
Score Data Mining of Traffic Management Engineering Major Course
[J]. 电脑与电信, 2021, 1(12): 62-65.
[6] GONG Jian-feng.
Research on Cloud Security Evaluation Model Based on Data Mining
[J]. 电脑与电信, 2021, 1(11): 95-.
[7] CAI Zhao-zhao NUERAILI Aierken. Research on Mixed Teaching Mode of Data Mining Course Based on SPOC[J]. 电脑与电信, 2020, 1(9): 40-42.
[8] . K-Means ParallelizationAlgorithm Based on Canopy[J]. 电脑与电信, 2019, 1(7): 30-.
[9] WANG Yi-bai. Research on Clustering K-means Algorithm Based on Hadoop Platform[J]. 电脑与电信, 2018, 1(4): 18-20.
[10] ZHANG Zhi-wen, HE Ming-chang, YANGWei-wei, LIU Ren-xiao, WANG Yu, HU Xue-you. The Design and Implementation of System to Realize the Value of Knowledge and Skills[J]. 电脑与电信, 2018, 1(4): 27-30.
[11] WEI Shuang. An Enhanced Data Mining Method for Text Clustering[J]. 电脑与电信, 2018, 1(3): 46-48.
[12] PAN Zheng-yong. Design and Application of Automatic Data Acquisition System for Soil and Water Conservation Monitoring Station Based on Big Data[J]. 电脑与电信, 2018, 1(1-2): 64-66.
[13] Jiang Mengyi, He Mingchang, Zhou Linhui, Ye Huan, Yan Liuping, Wang Rong. The Design and Implementation of Public Square Dancing Online Community Based on .NET[J]. 电脑与电信, 2017, 1(5): 7-10.
[14] Qiu Junling, Zhang Pan. Application of Quantum Algorithm in Big Data Age[J]. 电脑与电信, 2017, 1(5): 47-49.
[15] Wei Di. The Application of Management Information System in Education and the Development Trend[J]. 电脑与电信, 2017, 1(1-2): 81-83.
Copyright © Computer & Telecommunication, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd