CN108257070A - Suspect's localization method, device, electronic equipment and storage medium - Google Patents

Suspect's localization method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN108257070A
CN108257070A CN201810157386.5A CN201810157386A CN108257070A CN 108257070 A CN108257070 A CN 108257070A CN 201810157386 A CN201810157386 A CN 201810157386A CN 108257070 A CN108257070 A CN 108257070A
Authority
CN
China
Prior art keywords
node
personnel
accomplice
behavior
group number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810157386.5A
Other languages
Chinese (zh)
Inventor
傅兰涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dt Dream Technology Co Ltd
Original Assignee
Hangzhou Dt Dream Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dt Dream Technology Co Ltd filed Critical Hangzhou Dt Dream Technology Co Ltd
Priority to CN201810157386.5A priority Critical patent/CN108257070A/en
Publication of CN108257070A publication Critical patent/CN108257070A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Tourism & Hospitality (AREA)
  • Primary Health Care (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Health & Medical Sciences (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a kind of suspect's localization method, device, electronic equipment and storage mediums.Wherein method includes:Behavior relation data are obtained, wherein, behavior relation data include the behavior relation of multiple behavior personnel and each behavior personnel;Crime case data are obtained, and criminal gang's relational network figure is built based on crime case data;According to behavior relation data and criminal gang's relational network figure, the holotopy network being suspected of committing a crime is generated;According to holotopy network, suspect is positioned from multiple behavior personnel.This method can greatly improve the case handling efficiency of public security officer, greatly reduce the human cost of public security, improve the locating effect of suspect, be particularly involved in drug traffic, having the significant effect of comparison on the relational network that isodensity of gambling is high.

Description

Suspect's localization method, device, electronic equipment and storage medium
Technical field
The present invention relates to technical field of information processing more particularly to a kind of suspect's localization method, device, electronics to set Standby and computer readable storage medium.
Background technology
At present, in cracking of cases, public security officer often obtains and investigates clue by personnel's relationship.In the prior art Relationship analysis be only capable of analyzing personnel's relationship by public security officer itself, and be only capable of starting with from single personnel, by The interpersonal relationship of point analysis, carrys out screening suspect.But the mode of this positioning suspect, from single Relational network node is started with, and is analyzed one by one, and as the node relationships number of degrees increase, generating the side of relationship can be exponentially increased, this nothing The plenty of time of public security officer can be consumed by doubting, and substantially increased manpower screening cost, caused locating effect poor, positioning method is not Enough intelligences.
Invention content
The purpose of the present invention is intended to solve one of the technical issues of above-mentioned at least to a certain extent.
For this purpose, first purpose of the present invention is to propose a kind of suspect's localization method.This method can be very big Ground improves the case handling efficiency of public security officer, greatly reduces the human cost of public security, improves the locating effect of suspect, especially It is to be involved in drug traffic, having the significant effect of comparison on the relational network that isodensity of gambling is high.
Second object of the present invention is to propose a kind of suspect's positioning device.
Third object of the present invention is to propose a kind of electronic equipment.
Fourth object of the present invention is to propose a kind of computer readable storage medium.
In order to achieve the above objectives, suspect's localization method that first aspect present invention embodiment proposes, including:It obtains Behavior relation data, wherein, the behavior relation data include the behavior relation of multiple behavior personnel and each behavior personnel;It obtains Crime case data are taken, and criminal gang's relational network figure is built based on the crime case data;According to the behavior relation Data and criminal gang's relational network figure, generate the holotopy network being suspected of committing a crime;According to the holotopy net Network figure positions suspect from the multiple behavior personnel.
In order to achieve the above objectives, suspect's positioning device that second aspect of the present invention embodiment proposes, including:First Acquisition module, for obtaining behavior relation data, wherein, the behavior relation data include multiple behavior personnel and each behavior The behavior relation of personnel;Second acquisition module, for obtaining crime case data;Module is built, for being based on the crime case Number of packages is according to structure criminal gang's relational network figure;Generation module, for according to the behavior relation data and the criminal gang Relational network figure generates the holotopy network being suspected of committing a crime;Locating module, for according to the holotopy network, Suspect is positioned from the multiple behavior personnel.
In order to achieve the above objectives, the electronic equipment that third aspect present invention embodiment proposes, including:Memory, processor And the computer program that can be run on the memory and on the processor is stored in, the processor performs described program When, realize suspect's localization method described in first aspect present invention embodiment.
In order to achieve the above objectives, the non-transitorycomputer readable storage medium that fourth aspect present invention embodiment proposes, Computer program is stored thereon with, the crime described in first aspect present invention embodiment is realized when described program is executed by processor Suspect's localization method.
Suspect's localization method, device, electronic equipment and storage medium according to embodiments of the present invention, can obtain row For relation data, wherein, behavior relation data includes the behavior relation of multiple behavior personnel and each behavior personnel, and obtains Crime case data, and criminal gang's relational network figure is built based on crime case data, later, according to behavior relation data and Criminal gang's relational network figure generates the holotopy network being suspected of committing a crime, finally, according to holotopy network, from more Suspect is positioned in a behavior personnel.A kind of intelligentized positioning method is provided as a result, i.e., by being closed from global analysis It is network, combines the business experience that public security officer handles a case, look for automatically has behavior relation with multiple and different criminal gangs Suspect, greatly improve the case handling efficiency of public security officer, greatly reduce the human cost of public security, improve suspect Locating effect, be particularly involved in drug traffic, having the significant effect of comparison on the relational network that isodensity of gambling is high.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partly become from the following description It obtains significantly or is recognized by the practice of the present invention.
Description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention, for those of ordinary skill in the art, without creative efforts, can be with Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the flow chart of suspect's localization method according to an embodiment of the invention;
Fig. 2 is the exemplary plot of criminal gang's relational network figure according to embodiments of the present invention;
Fig. 3 is the stream of the accomplice personnel node progress group number mark in the relational graph according to embodiments of the present invention to accomplice Cheng Tu;
Fig. 4 is the exemplary plot of holotopy network being suspected of committing a crime according to embodiments of the present invention;
Fig. 5 is each behavior personnel's node in the calculating holotopy network according to an embodiment of the invention The flow chart of relevant information;
Fig. 6 is the structure diagram of suspect's positioning device according to an embodiment of the invention;
Fig. 7 is the structure diagram according to suspect's positioning device of a specific embodiment of the invention;
Fig. 8 is the structure diagram according to suspect's positioning device of another specific embodiment of the invention;
Fig. 9 is the structure diagram according to suspect's positioning device of another specific embodiment of the invention;
Figure 10 is the structure diagram of electronic equipment according to an embodiment of the invention.
Specific embodiment
The embodiment of the present invention is described below in detail, the example of the embodiment is shown in the drawings, wherein from beginning to end Same or similar label represents same or similar element or the element with same or like function.Below with reference to attached The embodiment of figure description is exemplary, it is intended to for explaining the present invention, and is not considered as limiting the invention.
Below with reference to the accompanying drawings suspect's localization method, device, electronic equipment and the calculating of the embodiment of the present invention are described Machine readable storage medium storing program for executing.
Fig. 1 is the flow chart of suspect's localization method according to an embodiment of the invention.It should be noted that this Suspect's localization method of inventive embodiments can be applied to suspect's positioning device of the embodiment of the present invention, the crime Suspect's positioning device can be configured on electronic equipment.Wherein, which can be personal computer, mobile terminal Can be the hardware device that mobile phone, tablet computer, personal digital assistant etc. have various operating systems Deng, the mobile terminal.
As shown in Figure 1, suspect's localization method can include:
S110 obtains behavior relation data, wherein, behavior relation data include multiple behavior personnel and each behavior personnel Behavior relation.
Optionally, the Ticketing information that client is bought, the booking are obtained from the booking website of various traffic trip tools Information may include identity information (such as identification card number, name), the booking time, booking number, origin, destination, purchase train number, Buy seat number etc.;The lodging information of lodging personnel, the lodging information packet can be also obtained from the server in various lodging shops The identity information (such as identification card number, name) of lodging personnel is included, the time is moved in, moves in duration, lodging personnel number, moves in room Number etc..
After the Ticketing information and the lodging information of lodging personnel bought in acquisition client, the booking of the acquisition can be believed Breath and lodging information carry out data analysis, to obtain behavior caused by each behavior personnel and each behavior personnel Relationship.As a kind of example, the behavior relation may include but be not limited to same train relationship, with aircraft relationship, with lodging relationship Deng.
It for example, can be by these after the Ticketing information and the lodging information of lodging personnel bought in acquisition client Client and lodging personnel as behavior personnel, wherein, if there is a situation where to belong to same person in the client and lodging personnel, Then using this belong to same person client and lodging personnel as a behavior personnel;Also, from the Ticketing information and lodging Behavior relation caused by each behavior personnel is found out in information.For example, behavioral data can as the form shown in table 1 below into Row information stores, and has behavior personnel A, B, C and D in behavior data, and, there is " train adjacent seat between behavior personnel A and B Twice " and the behavior relation of " train with ticket booking 1 time ", there is " train adjacent seat is twice " between behavior personnel A and C and " train is same There is the behavior relation of " aircraft is with ticket booking 3 times ", behavior personnel B and D between behavior personnel A and D in the behavior relation of ticket booking 1 time " Between exist " train adjacent seat is twice ", " with stay 3 times " and " aircraft adjacent seat 1 time " behavior relation.
Table 1
Src_ID Dest_ID Value
A B 1001:2;1002:1
A C 1001:2;1002:1
A D 2002:3
B D 1001:2;3003:3;2001:1
Wherein, Src_ID represents that starting involved party person (node) ID, Dest_ID represent purpose behavior personnel (node) ID, Value represents that behavior relation value, such as relations codes on probation represent, such as 1001:2 represent train adjacent seat twice, and 1002:1 generation The same ticket booking of table train 1 time, 2002:3, which represent aircraft, books tickets 3 times together, and 3003:3 representatives are same to stay 3 times, and 2001:1 represents aircraft neighbour 1 inferior, multiple relationship semicolon separateds of seat.
S120 obtains crime case data, and builds criminal gang's relational network figure based on crime case data.
Optionally, crime case data are obtained, and build based on the crime case data from the server end of public security department Go out criminal gang's relational network figure.
As a kind of example, the criminal in crime case data is extracted, and extract the accomplice in crime case data Personnel's relationship, wherein, the case type (i.e. accomplice relationship) that accomplice personnel relationship includes personnel concerning the case, is related to, later, with crime Personnel are node, and accomplice personnel relationship is node relationships, establish accomplice relational graph, and using connected graph algorithm to accomplice relational graph In accomplice personnel node carry out group number mark, using the accomplice relational graph where the identical accomplice personnel's node of group number as Criminal gang's relational network figure.
Which that is, can be extracted in comprising criminal, and from crime case number of packages in from crime case number of packages The personnel for being related to identical case are extracted, and determine the case type involved by the personnel, it later, can be using criminal as section Point, accomplice personnel relationship are node relationships (i.e. using accomplice personnel relationship as side), accomplice relational graph are built, then, using figure Computational frame realizes connected graph algorithm, accomplice personnel is labeled as the identical criminal gang of group number, to obtain the crime group Partner's relational network figure.
For example, as shown in Fig. 2, give criminal gang's exemplary plot of relational network figure, wherein, criminal gang's network of personal connections Network figure contains the accomplice relational graph of 3 different criminal gangs, and each accomplice relational graph has itself corresponding group number.As A kind of example, the accomplice relational graph can be stored by the form shown in table 2 below into row information, it is assumed that be wrapped in accomplice relational graph A containing personnel concerning the case, b, c and d, and there is the accomplice relationship of " with taking drugs 1 time " between the personnel a and b, exist between personnel a and c There is the accomplice relationship of " with taking drugs 1 time " and " with burglary 1 time " between personnel b and c in the accomplice relationship of " with taking drugs 1 time ", There is the accomplice relationship " with burglary 1 time " between personnel b and d, exist between personnel c and d same " with burglary 1 time " Case relationship.
Table 2
Src_ID Dest_ID Value
a b 4001:1
a c 4001:1
b c 4001:1;4002:1
b d 4002:1
c d 4002:1
Wherein, Src_ID represents that starting personnel (node) ID, Dest_ID represent that purpose personnel (node) ID, Value are represented Accomplice relation value can try out the expression of accomplice relations codes, for example, 4001:2 representatives are same to take drugs 2 times, and 4002:1 represents with the robber that enters the room Surreptitiously 1 is inferior, multiple accomplice relationship semicolon separateds.
Optionally, in one embodiment of the invention, as shown in figure 3, described utilize connected graph algorithm to the accomplice The specific implementation process that accomplice personnel node in relational graph carries out group number mark may include following steps:
S310 determines the node corresponding to each accomplice personnel in accomplice relational graph, and sets each accomplice in accomplice relational graph The initial group number of personnel's node;
Optionally, the node in accomplice relational graph corresponding to each accomplice personnel is first determined, and will be in the accomplice relational graph Initial group number of the node ID of each accomplice personnel node as each accomplice personnel node.
Itself group number of each accomplice personnel node is sent to neighbor node by S320 respectively;
The group number that each accomplice personnel node receives and itself group number are compared by S330;
S340, if the group number that each accomplice personnel node receives is less than itself group number of each accomplice personnel node, Itself group number of each accomplice personnel node is then set as the group number received, and returns and performs the step S320;
S350, if the group number that each accomplice personnel node receives is greater than or equal to itself group of each accomplice personnel node Number then controls each accomplice personnel node to stop sending group number.
For example, by taking the accomplice relational graph of a, b, c, d in Fig. 2 as an example, the step of figure calculating is carried out to the accomplice relational graph It is rapid as follows:
It 1) can be first using the node ID of each node in the accomplice relational graph as the initial group number of each node;
2) itself group number of each node in the accomplice relational graph is first sent to neighbor node by first run iteration;
3) for each node, the group number that upper wheel iteration receives is compared with itself group number, if receive Group number is less than itself group number, then itself group number of the node is set as group minimum in the group number received compiles Number, and continue to send itself group number to neighbor node;
4) when the group number received is less than or equal to itself group number of node, iteration stopping, the i.e. node stop hair Send group number.
For example, iterative process can be as follows:
First run iteration:
a->b:A represents the value a that a sends itself group number groupid to b;
ID groupid Send (transmission) Recv (reception)
a a a->b:a;a->c:a null
b b b->a:b;b->c:b;b->d:b null
c c c->a:c;c->b:c;c->d:c null
d d d->c:d;d->b:d null
Second wheel iteration:
Since the group number groupid that a is received is b and c, all bigger than itself group number groupid, iteration stopping, a is no longer Itself groupid is all set as the value smaller than itself groupid received by other nodes of transmission message, as shown in table below;
ID GroupID send recv
a a null b;c
b a b->a:a;b->c:a;b->d:a a,d
c a c->a:a;c->b:a;c->d:a a,b,d
d b d->c:b;d->b:b b,c
Third round iteration:
It takes turns iteration on a nodes to have stopped, the groupid that b, c node epicycle receive is not less than itself groupid, iteration Stop, the groupid that d node epicycles receive is smaller than itself groupid, itself groupid is updated, as shown in table below;
ID GroupID send recv
a a null null
b a null a,b
c a null a,b
d b d->c:a;d->b:a a,a
Fourth round iteration:
A, b, c node in iteration round before to stop, and d nodes epicycle does not receive any message, iteration stopping, final a, B, tetra- accomplice personnel's nodes of c, d, the groupid of itself are same value, i.e., this four artificial same criminal gangs are such as following Shown in table;
Group number mark is carried out to the accomplice personnel node in accomplice relational graph using connected graph algorithm as a result, in this way, can Using the accomplice relational graph where the identical accomplice personnel's node of group number as criminal gang's relational network figure.
S130 according to behavior relation data and criminal gang's relational network figure, generates the holotopy network being suspected of committing a crime Figure.
Optionally, personnel concerning the case's node in criminal gang's relational network figure is extracted, and based on each behavior The behavior relation of personnel finds out personnel concerning the case's node with behavior relation, and based on described from personnel concerning the case's node On the basis of criminal gang's relational network figure, personnel concerning the case's node with behavior relation is saved with corresponding behavior personnel Point carries out side connection, the holotopy network being suspected of committing a crime described in generation, wherein, the side connection is used to indicate connection and generates The node of behavior relation.
For example, by taking criminal gang's relational network figure shown in Fig. 2 as an example, have in criminal gang's relational network figure 3 different accomplice relational graphs, can first extract all personnel concerning the case's node a, b in criminal gang's relational network figure, c, D, e, f, g, h, i, j, k and l, and based on the behavior relation of each behavior personnel, found out from these personnel concerning the case's nodes Personnel concerning the case's node with behavior relation is closed such as node a, b, c, d, e, f, g, h, i, j and l, and based on the criminal gang It is on the basis of network, these personnel concerning the case's nodes with behavior relation is subjected to side company with corresponding behavior personnel node It connects, the holotopy network being suspected of committing a crime described in generation.
For example, it is assumed that behavior personnel node corresponding with personnel concerning the case's node a, b, e is node A, with relating to The corresponding behavior personnel nodes of case personnel's node b, f, h, j be node B, behavior personnel corresponding with personnel concerning the case's node c, d, i Node be node C, behavior personnel node corresponding with personnel concerning the case's node g be node D and E, it is corresponding with personnel concerning the case's node j, l Behavior personnel node for node F, the node in figure corresponding to capitalization English letter is behavior personnel's node, small English alphabet Corresponding node is personnel concerning the case's node, and the side connection between personnel concerning the case's node represents to generate accomplice relationship between node, relates to Side connection between case personnel node and behavior personnel's node represents to generate behavior relation between node.
According to holotopy network, suspect is positioned from multiple behavior personnel by S140.
Optionally, using figure Computational frame algorithm, each behavior personnel's node in the holotopy network is calculated Relevant information, wherein, the relevant information include with each behavior personnel node have behavior relation criminal gang's number, The behavior relation quantity generated with criminal, and according to preset ordering rule, to the phase of each behavior personnel node It closes information to be ranked up, finally, will put in order the corresponding behavior personnel node of relevant information that meets preset condition, be positioned as The suspect.
That is, using figure Computational frame algorithm, each behavior personnel are calculated in the holotopy network The relevant information of node, wherein, which may include but be not limited to:There is behavior relation and more from how many different cliques Few different criminal has behavior relation, the behavior relation quantity generated with criminal, the row generated with criminal For relationship type etc..Later, the relevant information being calculated can be ranked up according to certain ordering rule, and will arrangement Sequence meets the corresponding behavior personnel node of relevant information of preset condition, is positioned as the suspect, and export the criminal Guilty suspect is to be supplied to user (such as public security officer).
As a kind of example, as shown in figure 5, described utilize figure Computational frame algorithm, the holotopy network is calculated In the specific implementation process of relevant information of each behavior personnel's node may include following steps:
Based on each node and side information in holotopy network, destination node is determined from each node by S510, In, which is used to indicate the node that self attributes are accomplice personnel node and side information is behavior relation;
S520 by the node serial number, group number and side information of destination node, is sent to involved party corresponding with destination node Member's node, the corresponding behavior personnel node are used to indicate the node that behavior relation is generated with destination node;
S530 according to the node serial number, group number and side information received, calculates each row in holotopy network Relevant information for personnel's node.
For example, the iterative process for figure calculating being carried out to holotopy network can be as follows:1) first run iteration is sentenced first The self attributes and side information of each node in disconnected figure, if the self attributes of node is accomplice personnel nodes, (as shown in Figure 4 is small Write the node corresponding to English alphabet), and side information is behavior relation (the corresponding section of capital and small letter English alphabet as shown in Figure 4 Side connection between point), then by the node serial number, group number and side information of the node itself, it is sent to the involved party of corresponding sides Member's node.For example, by taking holotopy network shown in Fig. 4 as an example, node a things done in first run iteration are as follows:Section Point a judges itself for accomplice personnel's node, obtains the side information of node a, it (is respectively a that node a, which has three sides,<->b,a<-> c,a<->A), only side information " a<->A " is behavior relation, at this point, can be by the node serial number, group number and side information of node a “a<->A " (side information that will represent behavior relation) is sent to behavior personnel's node A of corresponding sides.
2) the second wheel iteration:For behavior personnel node according to the node serial number, group number and side information received, calculating should The relevant information of behavior personnel's node, such as:There are behavior relation, the criminal different with how many from how many different cliques There are behavior relation, the behavior relation quantity generated with criminal, the behavior relation type generated with criminal etc..
In this way, after the relevant information of each behavior personnel node is obtained, it can be according to the relevant information, according to certain row Node in the top as suspect and is recommended use by sequence rule to each behavior personnel node carry out sequence sequence Family.
Suspect's localization method according to embodiments of the present invention, can obtain behavior relation data, wherein, the behavior closes Coefficient evidence includes the behavior relation of multiple behavior personnel and each behavior personnel, and obtains crime case data, and based on crime Case data build criminal gang's relational network figure, later, according to behavior relation data and criminal gang's relational network figure, generation The holotopy network being suspected of committing a crime finally, according to holotopy network, suspicion of crime is positioned from multiple behavior personnel People.A kind of intelligentized positioning method is provided as a result, i.e., by from global analysis's relational network, combining public security officer and doing The business experience of case looks for the suspect for having behavior relation with multiple and different criminal gangs, greatly improves public affairs automatically The case handling efficiency of peace personnel greatly reduces the human cost of public security, improves the locating effect of suspect, is particularly relating to There is the significant effect of comparison on the high relational network of poison, gambling isodensity.
Corresponding with suspect's localization method that above-mentioned several embodiments provide, a kind of embodiment of the invention also carries For a kind of suspect's positioning device, due to suspect's positioning device provided in an embodiment of the present invention and above-mentioned several realities The suspect's localization method for applying example offer is corresponding, therefore is also fitted in the embodiment of aforementioned suspect's localization method For suspect's positioning device provided in this embodiment, it is not described in detail in the present embodiment.Fig. 6 is according to the present invention The structure diagram of suspect's positioning device of one embodiment.As shown in fig. 6, suspect's positioning device 600 It can include:First acquisition module 610, the second acquisition module 620, structure module 630, generation module 640 and locating module 650。
Specifically, the first acquisition module 610 can be used for obtaining behavior relation data, wherein, behavior relation data include more A behavior personnel and the behavior relation of each behavior personnel.
Second acquisition module 620 can be used for obtaining crime case data.
Module 630 is built to can be used for building criminal gang's relational network figure based on crime case data.As a kind of example, As shown in fig. 7, the structure module 630 can include:First extraction unit 631, the second extraction unit 632, first establishing unit 633rd, group number mark unit 634 and second establishes unit 635.Wherein, the first extraction unit 631 is used to extract crime case number of packages Criminal in;Second extraction unit 632 is used to extract accomplice personnel's relationship in crime case data, wherein, accomplice The case type that personnel's relationship includes personnel concerning the case, is related to;First establishing unit 633 is used for using criminal as node, accomplice Personnel's relationship is node relationships, establishes accomplice relational graph;Group number mark unit 634 is used to close accomplice using connected graph algorithm It is the accomplice personnel node progress group number mark in figure;Second, which establishes unit 635, is used for the identical accomplice personnel of group number Accomplice relational graph where node is as criminal gang's relational network figure.
As a kind of example, group number mark unit 634 can be specifically used for:Determine each accomplice people in the accomplice relational graph Node corresponding to member, and the initial group number of each accomplice personnel node in the accomplice relational graph is set;It respectively will be described each Itself group number of accomplice personnel's node is sent to neighbor node;Group number that each accomplice personnel node is received with from Body group number is compared;If the group number that each accomplice personnel node receives is less than each accomplice personnel node Itself group number of each accomplice personnel node is then set as the group number received, and returned by itself group number Perform described the step of itself group number of each accomplice personnel node is sent to neighbor node respectively;It is if described each same The group number that case personnel's node receives is greater than or equal to itself group number of each accomplice personnel node, then controls described each Accomplice personnel node stops sending group number.
Generation module 640 can be used for according to behavior relation data and criminal gang's relational network figure, generate what is be suspected of committing a crime Holotopy network.As a kind of example, as shown in figure 8, the generation module 640 can include:Extraction unit 641 determines Unit 642 and generation unit 643.Wherein, extraction unit 641 is used to extract personnel concerning the case's section in criminal gang's relational network figure Point;Determination unit 642 is used for the behavior relation based on each behavior personnel, is found out from personnel concerning the case's node with behavior relation Personnel concerning the case's node;Generation unit 643 is used to be based on the basis of criminal gang's relational network figure, will be with behavior relation Personnel concerning the case's node carries out side connection with corresponding behavior personnel node, generates the holotopy network being suspected of committing a crime, wherein, Side connection is used to indicate the node that connection generates behavior relation.
Locating module 650 can be used for according to holotopy network, and suspect is positioned from multiple behavior personnel.Make For a kind of example, as shown in figure 9, the locating module 650 can include:Computing unit 651, sequencing unit 652 and positioning unit 653.Wherein, computing unit 651 is used for using figure Computational frame algorithm, calculates each behavior personnel section in holotopy network The relevant information of point, wherein, relevant information includes the criminal gang's number for having behavior relation with each behavior personnel node, with violating The behavior relation quantity that guilty person person generates;Sequencing unit 652 is used for according to preset ordering rule, to each behavior personnel node Relevant information be ranked up;Positioning unit 653 meets the corresponding behavior of relevant information of preset condition for that will put in order Personnel's node, is positioned as suspect.
Wherein, in one embodiment of the invention, computing unit 651 can be specifically used for:Based on holotopy network In each node and side information, determine destination node from each node, wherein, it is same that destination node, which is used to indicate self attributes, Case personnel node and the node that side information is behavior relation;By the node serial number, group number and side information of destination node, send The corresponding behavior personnel node of destination node is given, corresponding behavior personnel node is used to indicate generates behavior pass with destination node The node of system;According to the node serial number, group number and side information received, each involved party in holotopy network is calculated The relevant information of member's node.
Suspect's positioning device according to embodiments of the present invention can obtain behavior relation number by the first acquisition module According to, wherein, behavior relation data includes the behavior relation of multiple behavior personnel and each behavior personnel, and the second acquisition module obtains Crime case data are taken, structure module is based on crime case data and builds criminal gang's relational network figure, and generation module is according to row For relation data and criminal gang's relational network figure, the holotopy network being suspected of committing a crime is generated, locating module is according to the overall situation Relational network figure positions suspect from multiple behavior personnel.A kind of intelligentized positioning method is provided as a result, i.e., By from global analysis's relational network, combining the business experience that public security officer handles a case, looking for automatically and multiple and different crimes There is the suspect of behavior relation in clique, greatly improves the case handling efficiency of public security officer, greatly reduces the manpower of public security Cost improves the locating effect of suspect, is particularly being involved in drug traffic, is having the comparison significant on the relational network that isodensity of gambling is high Effect.
In order to realize above-described embodiment, the invention also provides a kind of electronic equipment.
Figure 10 is the structure diagram of electronic equipment according to an embodiment of the invention.As shown in Figure 10, which sets Standby 1000 can include:It memory 1010, processor 1020 and is stored on memory 1010 and can be transported on processor 1020 Capable computer program 1030 when processor 1020 performs described program 1030, realizes any of the above-described a embodiment institute of the present invention The suspect's localization method stated.
In order to realize above-described embodiment, the invention also provides a kind of non-transitorycomputer readable storage medium, thereon Computer program is stored with, realizes that the crime described in any of the above-described a embodiment of the present invention is disliked when described program is executed by processor Doubt people's localization method.
In the description of the present invention, it is to be understood that term " first ", " second " are only used for description purpose, and cannot It is interpreted as indicating or implies relative importance or imply the quantity of the technical characteristic indicated by indicating.Define as a result, " the One ", at least one this feature can be expressed or be implicitly included to the feature of " second ".In the description of the present invention, " multiple " It is meant that at least two, such as two, three etc., unless otherwise specifically defined.
In the description of this specification, reference term " one embodiment ", " example ", " is specifically shown " some embodiments " The description of example " or " some examples " etc. means specific features, structure, material or the spy for combining the embodiment or example description Point is contained at least one embodiment of the present invention or example.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It is combined in an appropriate manner in one or more embodiments or example.In addition, without conflicting with each other, the skill of this field Art personnel can tie the different embodiments or examples described in this specification and the feature of different embodiments or examples It closes and combines.
Any process described otherwise above or method description are construed as in flow chart or herein, represent to include Module, segment or the portion of the code of the executable instruction of one or more the step of being used to implement specific logical function or process Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discuss suitable Sequence, including according to involved function by it is basic simultaneously in the way of or in the opposite order, to perform function, this should be of the invention Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction The system of row system, device or equipment instruction fetch and execute instruction) it uses or combines these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium " can any can be included, store, communicate, propagate or pass Defeated program is for instruction execution system, device or equipment or the dress used with reference to these instruction execution systems, device or equipment It puts.The more specific example (non-exhaustive list) of computer-readable medium is including following:Electricity with one or more wiring Connecting portion (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable Medium, because can be for example by carrying out optical scanner to paper or other media, then into edlin, interpretation or when necessary with it His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the present invention can be realized with hardware, software, firmware or combination thereof.Above-mentioned In embodiment, software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage Or firmware is realized.If for example, with hardware come realize in another embodiment, can be under well known in the art Any one of row technology or their combination are realized:With for the logic gates to data-signal realization logic function Discrete logic, have suitable combinational logic gate circuit application-specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are appreciated that realize all or part of step that above-described embodiment method carries Suddenly it is that relevant hardware can be instructed to complete by program, the program can be stored in a kind of computer-readable storage medium In matter, the program when being executed, one or a combination set of the step of including embodiment of the method.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing module, it can also That each unit is individually physically present, can also two or more units be integrated in a module.Above-mentioned integrated mould The form that hardware had both may be used in block is realized, can also be realized in the form of software function module.The integrated module is such as Fruit is realized in the form of software function module and is independent product sale or in use, can also be stored in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although it has been shown and retouches above The embodiment of the present invention is stated, it is to be understood that above-described embodiment is exemplary, it is impossible to be interpreted as the limit to the present invention System, those of ordinary skill in the art can be changed above-described embodiment, change, replace and become within the scope of the invention Type.

Claims (14)

1. a kind of suspect's localization method, which is characterized in that including:
Behavior relation data are obtained, wherein, the behavior relation data include the row of multiple behavior personnel and each behavior personnel For relationship;
Crime case data are obtained, and criminal gang's relational network figure is built based on the crime case data;
According to the behavior relation data and criminal gang's relational network figure, the holotopy network being suspected of committing a crime is generated Figure;
According to the holotopy network, suspect is positioned from the multiple behavior personnel.
2. suspect's localization method as described in claim 1, which is characterized in that described to be built based on crime case data Criminal gang's relational network figure, including:
Extract the criminal in the crime case data;
Accomplice personnel's relationship in the crime case data is extracted, wherein, the accomplice personnel relationship includes personnel concerning the case, relates to And case type;
Using the criminal as node, the accomplice personnel relationship is node relationships, establishes accomplice relational graph;
Group number mark is carried out to the accomplice personnel node in the accomplice relational graph using connected graph algorithm;
Using the accomplice relational graph where the identical accomplice personnel's node of group number as criminal gang's relational network figure.
3. suspect's localization method as claimed in claim 2, which is characterized in that described to utilize connected graph algorithm to described Accomplice personnel node in accomplice relational graph carries out group number mark, including:
It determines the node corresponding to each accomplice personnel in the accomplice relational graph, and each accomplice people in the accomplice relational graph is set The initial group number of member's node;
Itself group number of each accomplice personnel node is sent to neighbor node respectively;
The group number that each accomplice personnel node receives is compared with itself group number;
If the group number that each accomplice personnel node receives is less than itself group number of each accomplice personnel node, Itself group number of each accomplice personnel node is set as the group number received, and returns and performs the general respectively The step of itself group number of each accomplice personnel node is sent to neighbor node;
If the group number that each accomplice personnel node receives is greater than or equal to itself group of each accomplice personnel node Number then controls each accomplice personnel node to stop sending group number.
4. suspect's localization method as described in claim 1, which is characterized in that described according to behavior relation data and institute Criminal gang's relational network figure is stated, generates the holotopy network being suspected of committing a crime, including:
Extract personnel concerning the case's node in criminal gang's relational network figure;
Based on the behavior relation of each behavior personnel, found out from personnel concerning the case's node with the case-involving of behavior relation Personnel's node;
On the basis of criminal gang's relational network figure, by personnel concerning the case's node with behavior relation with it is corresponding Behavior personnel node carry out side connection, the holotopy network being suspected of committing a crime described in generation, wherein, the side connection is used for Indicate that connection generates the node of behavior relation.
5. suspect's localization method according to any one of claims 1 to 4, which is characterized in that described according to the overall situation Relational network figure positions suspect from the multiple behavior personnel, including:
Using figure Computational frame algorithm, the relevant information of each behavior personnel's node in the holotopy network is calculated, In, the relevant information includes the criminal gang's number and criminal that have behavior relation with each behavior personnel node The behavior relation quantity of generation;
According to preset ordering rule, the relevant information of each behavior personnel node is ranked up;
By the corresponding behavior personnel node of relevant information for meeting preset condition that puts in order, it is positioned as the suspect.
6. suspect's localization method as claimed in claim 5, which is characterized in that it is described to utilize figure Computational frame algorithm, The relevant information of each behavior personnel node in the holotopy network is calculated, including:
Based on each node and side information in the holotopy network, destination node is determined from each node, In, the destination node is used to indicate the node that self attributes are accomplice personnel node and the side information is behavior relation;
By the node serial number, group number and side information of the destination node, it is sent to involved party corresponding with the destination node Member's node, the corresponding behavior personnel node are used to indicate the node that behavior relation is generated with the destination node;
According to the node serial number, group number and side information received, each involved party in the holotopy network is calculated The relevant information of member's node.
7. a kind of suspect's positioning device, which is characterized in that including:
First acquisition module, for obtaining behavior relation data, wherein, the behavior relation data include multiple behavior personnel and The behavior relation of each behavior personnel;
Second acquisition module, for obtaining crime case data;
Module is built, for being based on crime case data structure criminal gang's relational network figure;
Generation module, for according to the behavior relation data and criminal gang's relational network figure, generating what is be suspected of committing a crime Holotopy network;
Locating module, for according to the holotopy network, suspect to be positioned from the multiple behavior personnel.
8. suspect's positioning device as claimed in claim 7, which is characterized in that the structure module includes:
First extraction unit, for extracting the criminal in the crime case data;
Second extraction unit, for extracting accomplice personnel's relationship in the crime case data, wherein, the accomplice personnel are closed It is the case type for including personnel concerning the case, being related to;
First establishing unit, for using the criminal as node, the accomplice personnel relationship to be node relationships, establishes accomplice Relational graph;
Group number marks unit, for carrying out group's volume to the accomplice personnel node in the accomplice relational graph using connected graph algorithm Number mark;
Second establishes unit, for using the accomplice relational graph where the identical accomplice personnel's node of group number as the crime group Partner's relational network figure.
9. suspect's positioning device as claimed in claim 8, which is characterized in that the group number mark unit is specifically used In:
It determines the node corresponding to each accomplice personnel in the accomplice relational graph, and each accomplice people in the accomplice relational graph is set The initial group number of member's node;
Itself group number of each accomplice personnel node is sent to neighbor node respectively;
The group number that each accomplice personnel node receives is compared with itself group number;
If the group number that each accomplice personnel node receives is less than itself group number of each accomplice personnel node, Itself group number of each accomplice personnel node is set as the group number received, and returns and performs the general respectively The step of itself group number of each accomplice personnel node is sent to neighbor node;
If the group number that each accomplice personnel node receives is greater than or equal to itself group of each accomplice personnel node Number then controls each accomplice personnel node to stop sending group number.
10. suspect's positioning device as claimed in claim 7, which is characterized in that the generation module includes:
Extraction unit, for extracting personnel concerning the case's node in criminal gang's relational network figure;
Determination unit, for the behavior relation based on each behavior personnel, being found out from personnel concerning the case's node has Personnel concerning the case's node of behavior relation;
Generation unit, will be described case-involving with behavior relation on the basis of being based on criminal gang's relational network figure Personnel's node and corresponding behavior personnel node carry out side connection, the holotopy network being suspected of committing a crime described in generation, wherein, The side connection is used to indicate the node that connection generates behavior relation.
11. suspect's positioning device as described in any one of claim 7 to 10, which is characterized in that the positioning mould Block includes:
Computing unit for utilizing figure Computational frame algorithm, calculates each behavior personnel's node in the holotopy network Relevant information, wherein, the relevant information includes the criminal gang for having behavior relation with each behavior personnel node Number, the behavior relation quantity generated with criminal;
Sequencing unit, for according to preset ordering rule, being ranked up to the relevant information of each behavior personnel node;
Positioning unit for the corresponding behavior personnel node of relevant information that meets preset condition of putting in order, is positioned as institute State suspect.
12. suspect's positioning device as claimed in claim 11, which is characterized in that the computing unit is specifically used for:
Based on each node and side information in the holotopy network, destination node is determined from each node, In, the destination node is used to indicate the node that self attributes are accomplice personnel node and the side information is behavior relation;
By the node serial number, group number and side information of the destination node, it is sent to involved party corresponding with the destination node Member's node, the corresponding behavior personnel node are used to indicate the node that behavior relation is generated with the destination node;
According to the node serial number, group number and side information received, each involved party in the holotopy network is calculated The relevant information of member's node.
13. a kind of electronic equipment, including:It memory, processor and is stored on the memory and can be on the processor The computer program of operation, which is characterized in that when the processor performs described program, realize as any in claim 1 to 6 Suspect's localization method described in.
14. a kind of non-transitorycomputer readable storage medium, is stored thereon with computer program, which is characterized in that the journey Such as suspect's localization method according to any one of claims 1 to 6 is realized when sequence is executed by processor.
CN201810157386.5A 2018-02-24 2018-02-24 Suspect's localization method, device, electronic equipment and storage medium Pending CN108257070A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810157386.5A CN108257070A (en) 2018-02-24 2018-02-24 Suspect's localization method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810157386.5A CN108257070A (en) 2018-02-24 2018-02-24 Suspect's localization method, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN108257070A true CN108257070A (en) 2018-07-06

Family

ID=62745192

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810157386.5A Pending CN108257070A (en) 2018-02-24 2018-02-24 Suspect's localization method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108257070A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110580260A (en) * 2019-08-07 2019-12-17 北京明略软件系统有限公司 Data mining method and device for specific group
CN110717425A (en) * 2019-09-26 2020-01-21 深圳市商汤科技有限公司 Case association method and device, electronic equipment and storage medium
CN110738431A (en) * 2019-10-28 2020-01-31 北京明略软件系统有限公司 Method and device for allocating monitoring resources
CN110825785A (en) * 2019-11-05 2020-02-21 佳都新太科技股份有限公司 Data mining method and device, electronic equipment and storage medium
CN111090681A (en) * 2019-11-12 2020-05-01 高新兴科技集团股份有限公司 Group mining method, device, equipment and storage medium
CN111210118A (en) * 2019-12-23 2020-05-29 北京市新技术应用研究所 Crime suspect comprehensive influence evaluation method based on social network analysis
CN111935634A (en) * 2020-08-17 2020-11-13 范松 Personnel positioning system
CN111984831A (en) * 2020-08-21 2020-11-24 北京明略软件系统有限公司 Method and apparatus for theft event information mining
CN112416922A (en) * 2021-01-25 2021-02-26 北京数网信息技术有限公司 Group partner association data mining method, device, equipment and storage medium

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110580260A (en) * 2019-08-07 2019-12-17 北京明略软件系统有限公司 Data mining method and device for specific group
CN110580260B (en) * 2019-08-07 2023-05-26 北京明智和术科技有限公司 Data mining method and device for specific group
CN110717425A (en) * 2019-09-26 2020-01-21 深圳市商汤科技有限公司 Case association method and device, electronic equipment and storage medium
CN110738431B (en) * 2019-10-28 2022-06-17 北京明略软件系统有限公司 Method and device for allocating monitoring resources
CN110738431A (en) * 2019-10-28 2020-01-31 北京明略软件系统有限公司 Method and device for allocating monitoring resources
CN110825785A (en) * 2019-11-05 2020-02-21 佳都新太科技股份有限公司 Data mining method and device, electronic equipment and storage medium
CN111090681A (en) * 2019-11-12 2020-05-01 高新兴科技集团股份有限公司 Group mining method, device, equipment and storage medium
CN111090681B (en) * 2019-11-12 2023-08-15 高新兴科技集团股份有限公司 Method, device, equipment and storage medium for group excavation
CN111210118A (en) * 2019-12-23 2020-05-29 北京市新技术应用研究所 Crime suspect comprehensive influence evaluation method based on social network analysis
CN111935634A (en) * 2020-08-17 2020-11-13 范松 Personnel positioning system
CN111935634B (en) * 2020-08-17 2023-06-02 范松 Personnel positioning system
CN111984831A (en) * 2020-08-21 2020-11-24 北京明略软件系统有限公司 Method and apparatus for theft event information mining
CN112416922A (en) * 2021-01-25 2021-02-26 北京数网信息技术有限公司 Group partner association data mining method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108257070A (en) Suspect&#39;s localization method, device, electronic equipment and storage medium
US10671936B2 (en) Method for clustering nodes of a textual network taking into account textual content, computer-readable storage device and system implementing said method
Ali et al. Adam deep learning with SOM for human sentiment classification
Schneider et al. Urban growth in Chengdu, Western China: application of remote sensing to assess planning and policy outcomes
Saavedra et al. Asymmetric disassembly and robustness in declining networks
Zhang et al. User community discovery from multi-relational networks
Jiang et al. Fema: flexible evolutionary multi-faceted analysis for dynamic behavioral pattern discovery
Yu et al. A node deployment algorithm based on van der Waals force in wireless sensor networks
Ríos et al. Dark web portal overlapping community detection based on topic models
CN107872436A (en) A kind of account recognition methods, apparatus and system
CN103733190B (en) For the method and apparatus protecting the privacy of network data
Elalfi et al. Extracting rules from trained neural network using GA for managing E-business
Mirani et al. Sentiment analysis of isis related tweets using absolute location
Kutty et al. A people-to-people recommendation system using tensor space models
CN108153824A (en) The determining method and device of targeted user population
Isah et al. Bipartite network model for inferring hidden ties in crime data
Kazienko et al. Evaluation of node position based on email communication
Lyzinski et al. Matchability of heterogeneous networks pairs
CN110413900A (en) More social networks account matching process based on viterbi algorithm
Chen et al. A novel approach to uncover health care frauds through spectral analysis
Qiu et al. Graph simplification and matching using commute times
Huang et al. Social friend recommendation based on network correlation and feature co-clustering
Liang et al. Federal learning edge network based sentiment analysis combating global COVID-19
Punde et al. Fake product review monitoring & removal and sentiment analysis of genuine reviews
Lookman et al. A framework for occupational fraud detection by social network analysis

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180706

RJ01 Rejection of invention patent application after publication