Part of the book series:Studies in Computational Intelligence ((SCI,volume 244))
476Accesses
Abstract
Current techniques of language identification are based on a method that assigns one or more textual documents into a set of predefined languages that are relevant to page contents. In this paper, we proposed an agent architecture that is used in criminal mobile devices identification systems. It is based on the usage of a software agent to process at least one document by using a dictionary that belong to a set of languages in order to determine the type of language features to be used in the text preprocessing module. Then, the agent will map at least one of the documents with the content of the dictionary in order to identify the languages used in the text by the language identification agent. Finally, the digital forensic agent will check the potential criminal short messages through the predefined keyword repository of corresponding language. Form our experiments, the agent architecture has been able to identify correctly the types of languages written in the short text messaging (SMS) system.
This is a preview of subscription content,log in via an institution to check access.
Access this chapter
Subscribe and save
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
- Chapter
- JPY 3498
- Price includes VAT (Japan)
- eBook
- JPY 17159
- Price includes VAT (Japan)
- Softcover Book
- JPY 21449
- Price includes VAT (Japan)
- Hardcover Book
- JPY 21449
- Price includes VAT (Japan)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Selamat, A., Selamat, H.: Analysis on the performance of mobile agents for query retrieval. Information Sciences 172(3-4), 281–307 (2005)
Cormack, G.V., Hidalgo, J.M.G., Snz, E.P.: Spam filtering for short messages. In: Proceedings of the sixteenth ACM conference on Conference on information and knowledge management, Lisbon, Portugal, pp. 313–320. ACM, New York (2007)
Mishne, G., Carmel, D., Lempel, R.: Blocking blog spam with language model disagreement. In: Proceedings of the First International Workshop on Adversarial Information Retrieval on the Web (AIRWeb), Chiba, Japan (2005)
Selamat, A., Ng, C.C.: Arabic script language identification using letter frequency neural networks. International Journal of Web Information Systems 4(4), 484–500 (2008)
Nykodym, N., Taylor, R., Vilela, J.: Criminal profiling and insider cyber crime. Digital Investigation 2, 261–267 (2005)
Enck, W., Traynor, P., McDaniel, P., La Porta, T.: Exploiting open functionality in sms-capable cellular networks. In: Proceedings of the 12th ACM conference on Computer and communications security, pp. 393–404. ACM, New York (2005)
Mellars, B.: Forensic examination of mobile phones. Digital Investigation 1, 266–272 (2004)
Hakkinen, J., Tian, J.: N-gram and decision tree based language identification for written words. In: Proceedings of the IEEE Workshop on Automatic Speech Recognition and Understanding, ASRU 2001, pp. 335–338 (2001)
Schultz, T., Waibel, A.: Language independent and language adaptive large vocabulary speech recognition. In: Proceedings of the Fifth International Conference on Spoken Language Processing, ISCA, pp. 1819–1822 (1998)
Schultz, T., Kirchhoff, K.: Multilingual speech processing. Academic Press, London (2006)
Li, H.Z., Ma, B., Lee, C.H.: A vector space modeling approach to spoken language identification. IEEE Transactions on Audio, Speech, and Language Processing 15(1), 271–284 (2007)
Selamat, A., Omatu, S.: Web page feature selection and classification using neural networks. Information Sciences 158, 69–88 (2004)
Cavnar, W.B., Trenkle, J.M.: N-gram-based text categorization. In: Proceedings of the 3rd Annual Symposium on Document Analysis and Information Retrieval, Las Vegas, Nevada, USA, pp. 161–175 (1994)
Author information
Authors and Affiliations
Universiti Teknologi Malaysia, 81310 UTM Skudai, Johor, Malaysia
Ali Selamat, Choon-Ching Ng, Md. Hafiz Selamat & Siti Dianah Abdul Bujang
- Ali Selamat
You can also search for this author inPubMed Google Scholar
- Choon-Ching Ng
You can also search for this author inPubMed Google Scholar
- Md. Hafiz Selamat
You can also search for this author inPubMed Google Scholar
- Siti Dianah Abdul Bujang
You can also search for this author inPubMed Google Scholar
Editor information
Editors and Affiliations
Institute of Informatics, Wroclaw University of Technology, Str. Janiszewskiego 11/17, 50-370, Wroclaw, Poland
Ngoc Thanh Nguyen & Radosław Piotr Katarzyniak &
Institute of Computer Engineering, Control and Robotics, Wroclaw University of Technology, WybrzezeWyspianskiego 27, 50-370, Wroclaw, Poland
Adam Janiak
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Selamat, A., Ng, CC., Selamat, M.H., Bujang, S.D.A. (2009). Agent Architecture for Criminal Mobile Devices Identification Systems. In: Nguyen, N.T., Katarzyniak, R.P., Janiak, A. (eds) New Challenges in Computational Collective Intelligence. Studies in Computational Intelligence, vol 244. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-03958-4_24
Download citation
Publisher Name:Springer, Berlin, Heidelberg
Print ISBN:978-3-642-03957-7
Online ISBN:978-3-642-03958-4
eBook Packages:EngineeringEngineering (R0)
Share this chapter
Anyone you share the following link with will be able to read this content:
Sorry, a shareable link is not currently available for this article.
Provided by the Springer Nature SharedIt content-sharing initiative