Skip to main content

Agent Architecture for Criminal Mobile Devices Identification Systems

  • Chapter
New Challenges in Computational Collective Intelligence

Part of the book series: Studies in Computational Intelligence ((SCI,volume 244))

  • 454 Accesses

Abstract

Current techniques of language identification are based on a method that assigns one or more textual documents into a set of predefined languages that are relevant to page contents. In this paper, we proposed an agent architecture that is used in criminal mobile devices identification systems. It is based on the usage of a software agent to process at least one document by using a dictionary that belong to a set of languages in order to determine the type of language features to be used in the text preprocessing module. Then, the agent will map at least one of the documents with the content of the dictionary in order to identify the languages used in the text by the language identification agent. Finally, the digital forensic agent will check the potential criminal short messages through the predefined keyword repository of corresponding language. Form our experiments, the agent architecture has been able to identify correctly the types of languages written in the short text messaging (SMS) system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Selamat, A., Selamat, H.: Analysis on the performance of mobile agents for query retrieval. Information Sciences 172(3-4), 281–307 (2005)

    Article  Google Scholar 

  2. Cormack, G.V., Hidalgo, J.M.G., Snz, E.P.: Spam filtering for short messages. In: Proceedings of the sixteenth ACM conference on Conference on information and knowledge management, Lisbon, Portugal, pp. 313–320. ACM, New York (2007)

    Chapter  Google Scholar 

  3. Mishne, G., Carmel, D., Lempel, R.: Blocking blog spam with language model disagreement. In: Proceedings of the First International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), Chiba, Japan (2005)

    Google Scholar 

  4. Selamat, A., Ng, C.C.: Arabic script language identification using letter frequency neural networks. International Journal of Web Information Systems 4(4), 484–500 (2008)

    Article  Google Scholar 

  5. Nykodym, N., Taylor, R., Vilela, J.: Criminal profiling and insider cyber crime. Digital Investigation 2, 261–267 (2005)

    Article  Google Scholar 

  6. Enck, W., Traynor, P., McDaniel, P., La Porta, T.: Exploiting open functionality in sms-capable cellular networks. In: Proceedings of the 12th ACM conference on Computer and communications security, pp. 393–404. ACM, New York (2005)

    Chapter  Google Scholar 

  7. Mellars, B.: Forensic examination of mobile phones. Digital Investigation 1, 266–272 (2004)

    Article  Google Scholar 

  8. Hakkinen, J., Tian, J.: N-gram and decision tree based language identification for written words. In: Proceedings of the IEEE Workshop on Automatic Speech Recognition and Understanding, ASRU 2001, pp. 335–338 (2001)

    Google Scholar 

  9. Schultz, T., Waibel, A.: Language independent and language adaptive large vocabulary speech recognition. In: Proceedings of the Fifth International Conference on Spoken Language Processing, ISCA, pp. 1819–1822 (1998)

    Google Scholar 

  10. Schultz, T., Kirchhoff, K.: Multilingual speech processing. Academic Press, London (2006)

    Google Scholar 

  11. Li, H.Z., Ma, B., Lee, C.H.: A vector space modeling approach to spoken language identification. IEEE Transactions on Audio, Speech, and Language Processing 15(1), 271–284 (2007)

    Article  Google Scholar 

  12. Selamat, A., Omatu, S.: Web page feature selection and classification using neural networks. Information Sciences 158, 69–88 (2004)

    Article  MathSciNet  Google Scholar 

  13. Cavnar, W.B., Trenkle, J.M.: N-gram-based text categorization. In: Proceedings of the 3rd Annual Symposium on Document Analysis and Information Retrieval, Las Vegas, Nevada, USA, pp. 161–175 (1994)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Selamat, A., Ng, CC., Selamat, M.H., Bujang, S.D.A. (2009). Agent Architecture for Criminal Mobile Devices Identification Systems. In: Nguyen, N.T., Katarzyniak, R.P., Janiak, A. (eds) New Challenges in Computational Collective Intelligence. Studies in Computational Intelligence, vol 244. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03958-4_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-03958-4_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-03957-7

  • Online ISBN: 978-3-642-03958-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics