Skip to main content

Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network

  • Conference paper
Intelligence and Security Informatics (ISI 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3073))

Included in the following conference series:

Abstract

In light of the Bali bombings, East Asia nations rally the international community into a broad-based coalition to support a war against terrorism. The information sharing among different countries provides a challenge for cross-lingual semantic interoperability. In this work, we model the problem as an associate constraint network and propagation by backmarking is proposed for creating the cross-lingual concept space. The approach deals with structured as well as unstructured data, addresses relevancy of information, offers the user with associative navigation through the information embedded in the database, enables conduction of multiple languages. Evidence is presented to show that a constraint programming approach performs well and has the advantage in terms of tractability, ordering and efficiency over the Hopfield network. The research output consisted of a thesaurus-like, semantic network knowledge base relied on statistical correlation analysis of the semantics embedded in the documents of English/Chinese parallel corpus.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bartak, R.: Constraint Programming: In Pursuit of the Holy Grail. In: Proceedings of the Week of Doctoral Students (WDS 1999), Part IV, June 1999, pp. 555–564. MatFyzPress, Prague (1999)

    Google Scholar 

  2. Bartak, R.: Theory and Practice of Constraint Propagation. In: Proceedings of the 3rd Workshop on Constraint Programming for Decision and Control (CPDC 2001), Wydavnictvo Pracovni Komputerowej, Gliwice, Poland, June 2001, pp. 7–14 (2001)

    Google Scholar 

  3. Chen, H., Lynch, K.J.: Automatic construction of networks of concepts characterizing document database. IEEE Transactions on Systems, Man and Cybernetics 22(5), 885–902 (1992)

    Article  Google Scholar 

  4. Li, K.W., Yang, C.C.: Automatic Construction of Cross-lingual Networks of Concepts from the Hong Kong SAR Police Department. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol. 2665, pp. 138–152. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  5. Li, K.W., Yang, C.C.: Automatic Cross-Lingual Thesaurus Generated from the Hong Kong SAR Police Department Web Corpus for Crime Analysis. Journal of the American Society for Information Science and Technology (to appear)

    Google Scholar 

  6. Hopfield, J.J.: Neurons with graded response have collective computational properties like those of two-state neurons. Proceedings of the National Academy of Science, USA 81, 3088–3092 (1984)

    Article  Google Scholar 

  7. Hopfield, J.J.: Neural network and physical systems with collective computational abilities. Proceedings of the National Academy of Science, USA 79(4), 2554–2558 (1982)

    Article  MathSciNet  Google Scholar 

  8. Kumar, V.: Algorithms for Constraint Satisfaction Problems: A Survey. AI Magazine 13(1), 32–44 (1992)

    Google Scholar 

  9. Montanary, U.: Network constraints fundamental properties and applications to picture processing. Information Sciences 7, 95–132 (1974)

    Article  Google Scholar 

  10. Tsang, E.: Foundations of Constraint Satisfaction. Academic Press, London (1995)

    Google Scholar 

  11. van Beek, P., Dechter, R.: On the Minimallity and Global Consistency of Row- Convex Constraint Networks. Journal of the Association for Computing Machinery 42(3), 543–561 (1995)

    MATH  MathSciNet  Google Scholar 

  12. van Beek, P., Chen, X.: CPlan: A constraint programming approach to planning. In: Proceedings of the 16th National Conference on Artificial Intelligence, Orlando, Florida (July 1999)

    Google Scholar 

  13. Waltz, D.L.: Understanding line drawings of scenes with shadows. In: Psychology of Computer Vision, McGraw-Hill, New York (1975)

    Google Scholar 

  14. Yang, C.C., Luk, J.: Automatic Generation of English/Chinese Thesaurus Based on a Parallel Corpus in Law. Journal of the American Society for Information Science and Technology, Special Topic Issue on Web Retrieval and Mining: A Machine Learning Perspective 54(7), 671–682 (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yang, C.C., Li, K.W. (2004). Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network. In: Chen, H., Moore, R., Zeng, D.D., Leavitt, J. (eds) Intelligence and Security Informatics. ISI 2004. Lecture Notes in Computer Science, vol 3073. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-25952-7_35

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-25952-7_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22125-8

  • Online ISBN: 978-3-540-25952-7

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics