Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Yates, Simeon; Akhgar, Babak; Bates, Christopher; Jopek, Lukasz; Wilson, Richard (2011)
Publisher: Inderscience
Languages: English
Types: Article
Criminal investigations generate large volumes of complex data that detectives have to analyse and understand. This data tends to be "siloed" within individual jurisdictions and re-using it in other investigations can be difficult. Investigations into trans-national crimes are hampered by the problem of discovering relevant data held by agencies in other countries and of sharing those data. Gun-crimes are one major type of incident that showcases this: guns are easily moved across borders and used in multiple crimes but finding that a weapon was used elsewhere in Europe is difficult. In this paper we report on the Odyssey Project, an EU-funded initiative to mine, manipulate and share data about weapons and crimes. The project demonstrates the automatic combining of data from disparate repositories for cross-correlation and automated analysis. The data arrive from different cultural/domains with multiple reference models using real-time data feeds and historical databases.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • Interpol, 2007. Connecting Police: I-24/7. Available at: http://www.interpol.int/Public/ICPO/FactSheets/GI03.pdf. [Accessed February 3rd, 2011]
    • Europa, 2002. Proposal for a Framework Decision on exchange of information under the principle of availability. Available at: http://europa.eu/rapid/pressReleasesAction.do?reference=MEMO/05/367&format=HTML&aged=0&languag e=EN&guiLanguage=en [Accessed January 25, 2011].
    • Prüm, 2010. Prüm Decision. Available at: http://ec.europa.eu/home-affairs/policies/police/police_prum_en.htm [Accessed January 25, 2011].
    • NABIS, 2009. National Ballistics Intelligence Service. Available at: http://nabis.police.uk/database.asp [Accessed January 25, 2011].
    • Akhgar, B et al., 2009. A Pan European Platform for Combating Organized Crime and Terrorism (Odyssey Platform). In Centeris Conference on Enterprise Information Systems. Ofir, Portugal.
    • Akrivas, G, Wallace, M, Andreou, G, Stamou, G, Kollias, S, Context-Sensitive Semantic Query Expansion, in Proceedings of IEEE International Conference on Artificial Intelligence Systems (ICAIS'02. pp 109. 2002 .
    • Bonino, D, Corno, F and Farinetti, L, 2004. Domain specific searches using conceptual spectra. In 16th IEEE International Conference on Tools with Artificial Intelligence. ICTAI 2004, pp. 680-687.
    • Bundeskriminalant, 2004. Firearm Type Determination. Available at: https://www.forensic-firearms.bund.de [Accessed January 25, 2011].
    • Chen, H. et al., 2004. Crime data mining: A general framework and some examples. IEEE Computer, 37(4), pp.50- 56.
    • Chen, H. et al., 2003. COPLINK: managing law enforcement data and knowledge. Communications of the ACM, 46, pp.28-34. Available at: http://doi.acm.org/10.1145/602421.602441.
    • De Bruin, J. S. et al., 2006. Data mining approaches to criminal career analysis. In Proceedings of the Sixth International Conference on Data Mining. Sixth International Conference on Data Mining. pp. 171-177.
    • Fowler, M and Parsons, R., 2010. Domain-specific Languages, Addison Wesley.
    • Giacomo, G, 1996. Intensional query answering by partial evaluation. Journal of Intelligent Information Systems, 7:4, pp 205-233. Published by Springer Netherlands, Nov. 1996.
    • Jopek, L., Wilson, R., and Bates, C, 2010. An application of a domain specific language facilitating abstraction and secure access to a crime. In Proceedings of IARIA 2010. pp 29-33, Lisbon, Portugal, October 2010.
    • Mernik, M., Heering, J. & Sloane, A.M., 2005. When and how to develop domain-specific languages. ACM Comput. Surv., 37, pp.316-344. Available at: http://doi.acm.org/10.1145/1118890.1118892.
    • Nath, S. V., 2006. Crime pattern detection using data mining. In Proceedings of the 2006 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology. International Conference on Web Intelligence and Intelligent Agent Technology. pp. 41-44
    • Nygren, F, 2008. The Swedish Initiative. http://www.daten.european-police.eu/2008/nygren.pdf [Accessed January 25, 2011].
    • Sims, C, 2010. National Ballistics Intelligence Service Update Report. Available at: http://www.west-midlandspa.gov.uk/documents/committees/public/2010/12_PerfandOps_22April2010_National_Ballistics_Report.pdf.
    • Smith, M. and Tilley, N. 2005. Crime Science: New Approaches to Preventing and Detecting Crime, Portland, USA: Willan Publishing.
    • Strohmaier, M., Kröll, M. & Körner, C., 2009. Intentional query suggestion: making user goals more explicit during search. In Proceedings of the 2009 workshop on Web Search Click Data . WSCD '09. New York, NY, USA: ACM, pp. 68-74. Available at: http://doi.acm.org/10.1145/1507509.1507520.
    • Vallet, D, Castells, P, Fernández, M, Mylonas, P, and Avrithis, Y, 2007. Personalized Content Retrieval in Context Using Ontological Knowledge. IEEE Transactions On Circuits And Systems For Video Technology, 17:3. MARCH 2007.
    • Wilson, R., Jopek, L., and Bates, C, 2010. Sharing Ballistics Data across the European Union. In Proceedings of IARIA 2010. pp 8-13, Lisbon, Portugal, October 2010.
    • Yates, S., et al., 2009. Semantic Interoperability between Ballistic Systems through the Application of Ontology. In IADIS WWW/ Internet Conference. pp. 153-157.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article