CN105956982A - Method of predicting act of terror based on background change - Google Patents

Method of predicting act of terror based on background change Download PDF

Info

Publication number
CN105956982A
CN105956982A CN201610300731.7A CN201610300731A CN105956982A CN 105956982 A CN105956982 A CN 105956982A CN 201610300731 A CN201610300731 A CN 201610300731A CN 105956982 A CN105956982 A CN 105956982A
Authority
CN
China
Prior art keywords
behavior
change
background
change table
predict
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610300731.7A
Other languages
Chinese (zh)
Inventor
薛安荣
王孟頔
毛文渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu University
Original Assignee
Jiangsu University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu University filed Critical Jiangsu University
Priority to CN201610300731.7A priority Critical patent/CN105956982A/en
Publication of CN105956982A publication Critical patent/CN105956982A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Educational Administration (AREA)
  • General Health & Medical Sciences (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本发明公开了一种利用背景变化预测恐怖行为的方法,主要步骤为:变化表的生成、使用贝叶斯方法预测行为。在生成h‑变化表时,将当前时刻的背景变化与h周期之后的行为变化结合,形成变化表中的一项纪录。预测时,在输入背景变化向量的前提下,贝叶斯方法从变化表中计算最大概率的分类结果,从而预测h周期的之后的行为。考虑到背景的变化可能会在时间序列上对组织行为产生持续的影响,因此建立加权贝叶斯模型。模型实现在时间滞差分别为1到H的情况下,计算在不同变化表中各种行为的概率,最后加权计算各种行为的概率。本发明为了能根据任意背景变化预测恐怖行为,利用贝叶斯方法可快速有效解决高维小样本分类问题的特性,提高了预测的精度。

The invention discloses a method for predicting terrorist behavior by using background changes. The main steps are: generating a change table and using Bayesian method to predict behavior. When generating the h-change table, the background change at the current moment is combined with the behavior change after the h period to form a record in the change table. When predicting, under the premise of inputting the background change vector, the Bayesian method calculates the classification result of the maximum probability from the change table, so as to predict the behavior after the h period. Considering that changes in the background may have a continuous impact on organizational behavior in time series, a weighted Bayesian model is established. The model implements the calculation of the probabilities of various behaviors in different change tables when the time lags are 1 to H respectively, and finally calculates the probabilities of various behaviors by weighting. In order to predict terrorist behaviors according to arbitrary background changes, the present invention utilizes the characteristics that the Bayesian method can quickly and effectively solve the classification problem of high-dimensional small samples, and improves the prediction accuracy.

Description

一种利用背景变化预测恐怖行为的方法A Method to Predict Terrorist Behavior Using Context Changes

技术领域technical field

本发明属于数据挖掘中的组织行为预测技术,具体涉及一种在改进的变化表上,使用贝叶斯方法预测恐怖行为的算法。The invention belongs to the technology of predicting organizational behavior in data mining, and in particular relates to an algorithm for predicting terrorist behavior using a Bayesian method on an improved change table.

背景技术Background technique

恐怖行为是指实施者对非武装人员有组织地使用暴力或以暴力相威胁,通过将一定的对象置于恐怖之中,来达成宗教、政治或意识形态上的目的。美国“9·11”事件震惊了全世界,使得恐怖组织成为全球的焦点,成为影响着世界和平的因素之一。最近,伊斯兰国(ISIS)在中东的活动愈演愈烈。该组织于2014年11月在法国巴黎发动报复性炸弹袭击事件,造成了大量的无辜民众的伤亡,恐怖袭击再次成了主要关注目标。如何利用已有的信息预测恐怖组织的行为,成为一个重要的课题。Terrorist acts refer to the organized use of violence or threat of violence against non-armed persons by the perpetrators to achieve religious, political or ideological goals by placing certain objects in terror. The "9.11" incident in the United States shocked the whole world, making terrorist organizations the focus of the world and one of the factors affecting world peace. Recently, the activities of the Islamic State (ISIS) in the Middle East have intensified. The organization launched a retaliatory bomb attack in Paris, France in November 2014, causing a large number of casualties of innocent people. Terrorist attacks have once again become the main focus of attention. How to use existing information to predict the behavior of terrorist organizations has become an important topic.

恐怖行为预测是知识挖掘的典型应用,它利用数据挖掘和机器学习的相关技术对过去、现在恐怖组织策划实施的恐怖行为的情况进行科学的统计分析,然后预测其发展趋势。恐怖预测不是证实过去,也不是说明现实,而是探索未来,预测恐怖主义组织的发展趋势。其目的在于为采取有效的预防措施提供决策支持。恐怖袭击事件发生的原因包含政治、经济和文化等方面的因素,各种因素交织在一起,使恐怖行为预测显得错综复杂。对恐怖行为预测的研究不能单单考虑恐怖事件发生的时间、地点及影响程度等信息,而应以各类学科(计算机数据挖掘技术与社会学,犯罪学等)为基础,综合考虑包括恐怖组织的政治、文化、经济等背景因素,并通过对这些数据的分析为当局的决策提供更有效的支持。因此,分析恐怖组织的背景知识与其行为之间的关系成为研究的热点。Terrorist behavior prediction is a typical application of knowledge mining. It uses data mining and machine learning related technologies to conduct scientific statistical analysis of past and present terrorist organizations planning and implementing terrorist behavior, and then predicts its development trend. Terror forecasting is not to confirm the past, nor to explain the reality, but to explore the future and predict the development trend of terrorist organizations. Its purpose is to provide decision support for effective preventive measures. The reasons for terrorist attacks include political, economic and cultural factors, and various factors are intertwined, making the prediction of terrorist behavior complex. Research on the prediction of terrorist acts should not only consider information such as the time, place, and degree of influence of terrorist events, but should be based on various disciplines (computer data mining technology and sociology, criminology, etc.), comprehensively considering the information of terrorist organizations, including terrorist organizations. Political, cultural, economic and other background factors, and provide more effective support for the authorities' decision-making through the analysis of these data. Therefore, analyzing the relationship between the background knowledge of terrorist organizations and their behavior has become a research hotspot.

目前,基于背景知识预测恐怖行为的预测方法的基本思路基本相同,即根据组织背景与行为之间的关系,构建组织的行为预测模型。具体来说,这些方法利用背景向量之间的相似度预测对应的行为向量,再对预测的行为向量进行某种计算,得到行为向量中各行为的概率,然后根据各行为的发生概率给出预测结果。然而,在现实中,组织一般具有反侦查能力,其恐怖活动发生的时间、地点及行为强度等属性会因此改变。现有的大多数模型没有考虑组织的这种改变及由此引起的行为变化。而考虑到了背景与行为之间的变化联系的模型,虽然尝试通过学习组织改变行为的条件,构建了背景与行为之间的变化规则,但还存在许多缺点。例如,模型只能根据变化表中存在的背景变化预测行为,且预测准确率较低而时间复杂度高。At present, the basic ideas of the prediction methods based on background knowledge to predict terrorist behavior are basically the same, that is, to construct an organizational behavior prediction model based on the relationship between organizational background and behavior. Specifically, these methods use the similarity between background vectors to predict the corresponding behavior vector, and then perform some calculation on the predicted behavior vector to obtain the probability of each behavior in the behavior vector, and then give a prediction based on the occurrence probability of each behavior result. However, in reality, organizations generally have anti-investigation capabilities, and attributes such as the time, place, and intensity of terrorist activities will change accordingly. Most existing models do not account for this change in organization and the resulting behavioral changes. However, the model that takes into account the changing relationship between background and behavior, although it tries to construct the changing rules between background and behavior by learning the conditions under which organizations change behavior, has many shortcomings. For example, the model can only predict behavior based on the background changes existing in the change table, and the prediction accuracy is low and the time complexity is high.

本发明给出了一种基于变化表和贝叶斯方法的恐怖行为预测算法,该算法既可以有效提取恐怖行为的背景知识子空间,又能确保利用提取的背景子空间进行预测的有效性。The invention provides a terrorist behavior prediction algorithm based on the change table and the Bayesian method. The algorithm can not only effectively extract the background knowledge subspace of the terrorist behavior, but also ensure the effectiveness of prediction using the extracted background subspace.

发明内容Contents of the invention

本发明依据组织的背景变化可能导致行为的改变这一思想,利用恐怖分子的背景知识预测其行为。为了能够在任意的背景变化下预测组织行为,针对数据集高维小样本特点,提出一种基于贝叶斯方法和变化表的恐怖行为预测算法。改进的变化表存储了背景与行为已有的变化情况,使贝叶斯方法能方便地从中收集相关的变化信息。对于新的背景变化,贝叶斯方法根据输入背景变化向量中各个元素对不同分类结果的影响程度进行综合判断,从而能够在任意的背景变化下实现预测行为的目的。除此之外,对于高维小样本数据,贝叶斯方法能够快速有效的预测。最后,考虑到背景的改变对行为的影响不是瞬时的,而是会在一定的时间周期之内对行为产生持续影响。因此,该方法考虑在不同时间滞差下综合预测组织行为。Based on the idea that changes in the background of an organization may lead to changes in behavior, the present invention utilizes the background knowledge of terrorists to predict their behavior. In order to predict organizational behavior under arbitrary background changes, a terrorist behavior prediction algorithm based on Bayesian method and change table is proposed according to the high-dimensional and small-sample characteristics of the data set. The improved change table stores the existing changes of background and behavior, so that the Bayesian method can conveniently collect relevant change information. For new background changes, the Bayesian method makes a comprehensive judgment based on the influence of each element in the input background change vector on different classification results, so that the purpose of predicting behavior can be achieved under any background change. In addition, for high-dimensional small-sample data, Bayesian methods can quickly and effectively predict. Finally, consider that the impact of background changes on behavior is not instantaneous, but will have a continuous impact on behavior within a certain period of time. Therefore, this method considers comprehensively predicting tissue behavior under different time lags.

本发明利用恐怖组织的背景知识提取子空间的预测方法,包括以下步骤:The present invention utilizes the background knowledge of terrorist organization to extract the prediction method of subspace, comprises the following steps:

(1)原始数据集的预处理;(1) Preprocessing of the original data set;

原始数据由恐怖组织的基本信息、背景知识和行为活动构成,提取背景知识和行为,将其标记为(CS(g),AS(g))的向量对。其CS(g)=(C1,C2,…,CM)表示数据中的背景属性,AS(g)=(A1,A2,…,AN)表示数据中涉及到的行为属性。为了得到不同行为的背景子空间,需要对数据做预处理,形成(CS(g),Aj)的N个子数据集。若令g表示恐怖组织,Tg表示数据集中组织行为Aj的子数据集,则Tg=(x1,x2,...,xm)T,xi=(ci1,ci2,...,cin,aij),其中ci属于背景属性集CS(g),aj属于行为属性集AS(g)。The original data is composed of the basic information, background knowledge and behavior activities of terrorist organizations. The background knowledge and behavior are extracted and marked as (CS(g), AS(g)) vector pairs. Its CS(g)=(C 1 ,C 2 ,…,C M ) represents the background attributes in the data, and AS(g)=(A 1 ,A 2 ,…, AN ) represents the behavioral attributes involved in the data . In order to obtain background subspaces of different behaviors, it is necessary to preprocess the data to form N subdatasets of (CS(g),A j ). If g represents a terrorist organization, Tg represents the sub-dataset of organizational behavior A j in the data set, then Tg=(x 1 ,x 2 ,...,x m ) T , x i =(c i1 ,c i2 ,. ..,c in ,a ij ), where ci belongs to the background attribute set CS(g), and a j belongs to the behavior attribute set AS(g).

(2)针对AS(g)中每一种待预测行为,生成改进的变化表;(2) Generate an improved change table for each behavior to be predicted in AS(g);

变化表是一种记录组织在时间序列上行为随其背景变化关系的数据存储结构,表示背景的改变对行为变化的影响。对于整数h≥1,h-变化表CTh(g,Aj)中时间段i的记录由背景属性从时间段i-h到i-h+1的变化以及行为属性从i到i+1的变化产生。如表1所示包含背景和行为Aj的原始数据经过处理后,生成如表2所示的行为Aj的h-变化表CTh(g,Aj)。所述变化表包括1步变化表和多步变化表。The change table is a data storage structure that records the relationship between an organization's behavior and its background changes in time series, and represents the impact of background changes on behavior changes. For an integer h≥1, the record of time period i in h-change table CT h (g,A j ) consists of the change of background attribute from time period ih to i-h+1 and the change of behavior attribute from i to i+1 produce. As shown in Table 1, the original data including background and behavior A j are processed, and the h-change table CT h (g, A j ) of behavior A j shown in Table 2 is generated. The change table includes a one-step change table and a multi-step change table.

表2中,PAj表示上个周期的行为,LAJ表示当前时间的行为。In Table 2, PA j represents the behavior of the last period, and LA J represents the behavior of the current time.

(3)利用贝叶斯方法,在生成的变化表上计算预测结果;(3) Utilize the Bayesian method to calculate the prediction result on the generated change table;

(4)使用多步加权贝叶斯模型,在不同步长的变化表上分别预测,并给出综合预测结果:(4) Use the multi-step weighted Bayesian model to predict separately on the change tables of different step lengths, and give the comprehensive prediction results:

1)根据步数H,构建1到H步的变化表CTh(g,Aj),h=1,...,H;;1) According to the number of steps H, construct a change table CT h (g, A j ) from 1 to H steps, h=1,...,H;;

2)用h-变化表CTh(g,Aj)中的每一行的变化数据使用贝叶斯方法预测,得到预测的行为序列PYh2) Use the Bayesian method to predict the change data of each row in the h-change table CT h (g, A j ), and obtain the predicted behavior sequence PY h ;

3)根据公式rh=Cov(PYh,Yh)/(D(PYh)*D(Yh))1/2(其中Cov(.)为协方差,D(.)为方差)计算预测行为序列PYh与真实行为序列Yh的相关系数rh3) According to the formula r h =Cov(PY h ,Y h )/(D(PY h )*D(Y h )) 1/2 (where Cov(.) is the covariance, D(.) is the variance) calculation The correlation coefficient r h between the predicted behavior sequence PY h and the real behavior sequence Y h ;

4)判断是否结束?如果没有,则跳到2),计算下一个步长的相关系数;否则,进行下一步。4) Is the judgment over? If not, skip to 2) and calculate the correlation coefficient of the next step; otherwise, proceed to the next step.

5)使用公式wh=|rh|/Σ|ri|将得到的相关系数r1,r2,...,rH规一化,得到预测权重系数w1,w2,...,wH;Σ|ri|表示对相关系数求和,i=1,2,…H。5) Use the formula w h =|r h |/Σ|r i | to normalize the obtained correlation coefficients r 1 , r 2 ,...,r H to obtain the prediction weight coefficients w 1 , w 2 ,... .,w H ; Σ|r i | means to sum the correlation coefficients, i=1,2,...H.

6)对于每种行为,在各步变化表上使用贝叶斯分类预测,计算其目标函数maxih(wh*Ph(Ci|X)/ΣkPh(Ck|X))},选择使结果数值最大化的行为作为分类结果。其中,Ci表示每种行为;h=1,...,H,表示变化表的步数。目标函数的关系式表示分别在1到H步变化表上,计算行为Ci在所有行为的发生概率中的加权比重。6) For each behavior, use Bayesian classification prediction on each step change table to calculate its objective function max ih (w h *P h (C i |X)/Σ k P h (C k | X))}, select the behavior that maximizes the value of the result as the classification result. Among them, C i represents each behavior; h=1,...,H, represents the step number of the change table. The relational expression of the objective function indicates that on the 1 to H step change table, calculate the weighted proportion of the behavior C i in the occurrence probability of all behaviors.

本发明中的预测方法分为两个步骤:首先根据特定的恐怖行为生成与之对应的变化表,然后在生成的变化表中预测此行为的发生情况。The prediction method in the present invention is divided into two steps: first, a corresponding change table is generated according to a specific terrorist act, and then the occurrence of the act is predicted in the generated change table.

本发明中变化表的生成过程中的影响滞差h表示背景属性的变化会在h个时间周期之后对行为属性变化产生影响,进而使用贝叶斯方法预测h步之后的恐怖行为。而多步贝叶斯中和预测,综合考虑1到h步滞差影响下的预测情况,作出最终的预测结果。The impact hysteresis h in the process of generating the change table in the present invention indicates that the change of the background attribute will affect the change of the behavior attribute after h time periods, and then use the Bayesian method to predict the terrorist behavior after h steps. And the multi-step Bayesian neutralization forecast, comprehensively consider the forecast situation under the influence of 1 to h step lag, and make the final forecast result.

本发明主要有以下两个方面的有益效果:The present invention mainly has the beneficial effect of following two aspects:

(1)在预测算法方面(1) In terms of prediction algorithm

原始数据集中存在的高维小样本的特点,导致一般预测方法的效果欠佳。而贝叶斯方法解决这一问题具有天然的优势,能够快速有效的作出预测。最后,考虑到背景的改变对行为的影响不是瞬时的,而是会在一定的时间周期之内对行为产生持续影响。因此,算法考虑在不同时间滞差下综合预测组织行为。对于每种行为而言,计算在各步变化表上使用贝叶斯分类预测得到该行为的概率在所有分类结果概率中的比重之和,选择使结果数值最大化的行为作为分类结果。The characteristics of high-dimensional small samples in the original data set lead to poor performance of general prediction methods. The Bayesian method to solve this problem has natural advantages and can make predictions quickly and effectively. Finally, consider that the impact of background changes on behavior is not instantaneous, but will have a continuous impact on behavior within a certain period of time. Therefore, the algorithm considers comprehensively predicting tissue behavior under different time lags. For each behavior, calculate the sum of the proportions of the probability of using Bayesian classification prediction to obtain the behavior in all classification result probabilities on each step change table, and select the behavior that maximizes the result value as the classification result.

(2)在变化表生成方面(2) In terms of change table generation

改进的变化表存储了背景与行为已有的变化情况,使贝叶斯方法能方便地从中收集相关的变化信息。对于新的背景变化,贝叶斯方法使用一定方法进行校准,根据输入背景变化向量中各个元素对不同分类结果的影响程度进行综合判断,从而能够在任意的背景变化下实现预测行为的目的。而且变化表的生成过程中的影响滞差h表示背景属性的变化会在h个时间周期之后对行为属性变化产生影响,进而使用贝叶斯方法预测h步之后的恐怖行为。The improved change table stores the existing changes of background and behavior, so that the Bayesian method can conveniently collect relevant change information. For new background changes, the Bayesian method uses a certain method to calibrate, and comprehensively judges the degree of influence of each element in the input background change vector on different classification results, so that the purpose of predicting behavior can be achieved under any background change. Moreover, the influence hysteresis h in the process of generating the change table indicates that the change of the background attribute will affect the change of the behavior attribute after h time periods, and then use the Bayesian method to predict the terrorist behavior after h steps.

附图说明Description of drawings

图1是本发明中多步加权贝叶斯预测方法的训练模块计算权重的流程图。Fig. 1 is the flowchart of the weight calculation of the training module of the multi-step weighted Bayesian prediction method in the present invention.

图2是本发明中使用多步加权贝叶斯预测方法预测模块预测组织行为的流程图。Fig. 2 is a flow chart of predicting tissue behavior using a multi-step weighted Bayesian prediction method prediction module in the present invention.

具体实施方式detailed description

下面以表3所示的背景数据子集为例,结合图1、图2的多步加权贝叶斯预测模型中的权重计算以及行为预测流程,详细说明本发明的算法流程。Taking the background data subset shown in Table 3 as an example, the algorithm flow of the present invention will be described in detail in combination with the weight calculation and behavior prediction flow in the multi-step weighted Bayesian prediction model shown in Fig. 1 and Fig. 2 .

表3中共设置了八个字段,分别标记为Time、C1、C2、C3、C4、C5、C6和A,其中Time标记为记录在表中的时间序列,{C1,C2,C3,C4,C5,C6}=CS(g)属于背景知识属性,A属于行为属性。目的即利用表3所示的背景知识预测预测恐怖行为A的发生与否。A total of eight fields are set in Table 3, marked as Time, C1, C2, C3, C4, C5, C6 and A, where Time is marked as the time series recorded in the table, {C1, C2, C3, C4, C5 , C6}=CS(g) belongs to the attribute of background knowledge, and A belongs to the attribute of behavior. The purpose is to use the background knowledge shown in Table 3 to predict the occurrence of terrorist act A.

具体步骤如下:Specific steps are as follows:

(1)利用表3的数据生成1步变化表,得到变化表如表4所示。(1) Use the data in Table 3 to generate a one-step change table, and the obtained change table is shown in Table 4.

(2)根据贝叶斯方法,对变化表进行统计分类,得到分类结果如表5所示。(2) According to the Bayesian method, the change table is statistically classified, and the classification results are shown in Table 5.

表5中,使用贝叶斯分类需计算P(LA=0|X)以及P(LA=1|X),然后分类概率的大小,将较大概率的类标记作为分类预测结果。其中,根据贝叶斯定理,比较P(LA=0|X)以及P(LA=1|X)的大小等价于比较P(X|LA=0)P(LA=0)和P(X|LA=1)P(LA=1)的大小。其中,P(X|LA=0)P(LA=0)和P(X|LA=1)P(LA=1)分别表示在环境变化向量X下,行为为0的概率和行为为1的概率。In Table 5, it is necessary to calculate P(LA=0|X) and P(LA=1|X) when using Bayesian classification, and then classify the probability, and use the class label with higher probability as the classification prediction result. Among them, according to Bayes' theorem, comparing P(LA=0|X) and P(LA=1|X) is equivalent to comparing P(X|LA=0)P(LA=0) and P(X |LA=1) the size of P(LA=1). Among them, P(X|LA=0)P(LA=0) and P(X|LA=1)P(LA=1) respectively represent the probability of the behavior being 0 and the behavior being 1 under the environment change vector X probability.

使用1步变化表预测的结果,即为预测恐怖组织1个时间周期之后的行为。例如,假设当前的背景变化为:{(0,0),(1,1),(0,1),(0,0),(1,0),(1,0),0},那么预测下一个时间周期的行为为1,即发生该类恐怖活动。The result of using the 1-step change table prediction is to predict the behavior of terrorist organizations after 1 time period. For example, suppose the current background change is: {(0,0),(1,1),(0,1),(0,0),(1,0),(1,0),0}, then The behavior of predicting the next time period is 1, that is, such terrorist activities occur.

(3)使用多步加权贝叶斯综合预测,假设给定的步数为2。(3) Using multi-step weighted Bayesian comprehensive forecasting, assuming that the given number of steps is 2.

①首先,如表2中所示方法,建立1步和2步变化表,结果如表4,表6所示。① Firstly, according to the method shown in Table 2, the 1-step and 2-step change tables are established, and the results are shown in Table 4 and Table 6.

②其次,根据贝叶斯方法,对1步和2步变化表进行统计分类,得到结果如表5、表7所示。②Secondly, according to the Bayesian method, the 1-step and 2-step change tables are statistically classified, and the results are shown in Table 5 and Table 7.

③然后,使用预测得到的行为序列分别和真实的行为序列,计算每一步的相关系数,完成归一化,作为该步变化表预测的权重,结果如表8所示。③ Then, use the predicted behavior sequence and the real behavior sequence to calculate the correlation coefficient of each step, complete the normalization, and use it as the weight of the step change table prediction. The results are shown in Table 8.

④预测时,假设当前的背景变化向量X为:{(0,0),(1,1),(0,1),(0,0),(1,0),(1,0),0},分别在每步变化表中计算P(LA=0|X)和P(LA=1|X),同样使用P(X|LA=0)P(LA=0)和P(X|LA=1)P(LA=1)进行替换,计算结果如表9所示。④ When predicting, assume that the current background change vector X is: {(0,0),(1,1),(0,1),(0,0),(1,0),(1,0), 0}, calculate P(LA=0|X) and P(LA=1|X) in each step change table, and use P(X|LA=0)P(LA=0) and P(X| LA=1)P(LA=1) to replace, the calculation results are shown in Table 9.

当LA=0时,Σh(wh*Ph(Ci|X)/ΣkPh(Ck|X))=0.027*0.5+0.0610*0.5=0.044;When LA=0, Σ h (w h *P h (C i |X)/Σ k P h (C k |X))=0.027*0.5+0.0610*0.5=0.044;

当LA=1时,Σh(wh*Ph(Ci|X)/ΣkPh(Ck|X))=0.9730*0.5+0.9390*0.5=0.956;When LA=1, Σ h (w h *P h (C i |X)/Σ k P h (C k |X))=0.9730*0.5+0.9390*0.5=0.956;

因为0.044小于0.956,预测结果为LA=1,即发生恐怖活动。Because 0.044 is less than 0.956, the predicted result is LA=1, that is, terrorist activities occur.

上文所列出的一系列的详细说明仅仅是针对本发明的可行性实施方式的具体说明,它们并非用以限制本发明的保护范围,凡未脱离本发明技艺精神所作的等效实施方式或变更均应包含在本发明的保护范围之内。The series of detailed descriptions listed above are only specific descriptions for feasible implementations of the present invention, and they are not intended to limit the protection scope of the present invention. Any equivalent implementation or implementation that does not depart from the technical spirit of the present invention All changes should be included within the protection scope of the present invention.

Claims (4)

1.一种利用背景变化预测恐怖行为的方法,其特征在于,利用背景与行为之间的变化联系预测组织行为,包括如下步骤:1. A method for predicting acts of terrorism utilizing background changes, characterized in that utilizing the change linkages between backgrounds and behaviors to predict organizational behavior, comprising the steps of: (1)原始数据集的预处理;所述原始数据由恐怖组织的基本信息、背景知识和行为活动构成,提取背景知识和行为,将其标记为(CS(g),AS(g))的向量对;其中CS(g)=(C1,C2,…,CM)表示数据中的背景属性,AS(g)=(A1,A2,…,AN)表示数据中涉及到的行为属性;(1) Preprocessing of the original data set; the original data is composed of the basic information, background knowledge and behavior activities of terrorist organizations, the background knowledge and behavior are extracted, and they are marked as (CS(g), AS(g)) Vector pair; where CS(g)=(C 1 ,C 2 ,…,C M ) represents the background attributes in the data, AS(g)=(A 1 ,A 2 ,…,A N ) represents the data related to behavioral attributes; 为了得到不同行为的背景子空间,需要对原始数据做预处理,形成(CS(g),Aj)的N个子数据集;In order to obtain the background subspace of different behaviors, it is necessary to preprocess the original data to form N subdatasets of (CS(g),A j ); (2)针对AS(g)中每一种待预测行为,生成改进的变化表;所述改进的变化表是一种记录组织在时间序列上行为随其背景变化关系的数据存储结构,表示背景的改变对行为变化的影响,其存储内容包括背景与行为已有的变化情况;所述变化表包括1步变化表和多步变化表。(2) For each behavior to be predicted in AS(g), an improved change table is generated; the improved change table is a data storage structure that records the relationship between the organization's behavior in time series and its background change, representing the background The impact of the change on the behavior change, its storage content includes the existing changes of the background and behavior; the change table includes a one-step change table and a multi-step change table. (3)利用贝叶斯方法,在生成的1步或多步变化表上计算预测结果;(3) Using the Bayesian method, calculate the prediction results on the generated 1-step or multi-step change table; (4)使用多步加权贝叶斯模型,在1步到H步的变化表上分别预测,并给出综合预测结果。(4) Use the multi-step weighted Bayesian model to predict separately on the change table from step 1 to step H, and give a comprehensive prediction result. 2.根据权利要求1所述的一种利用背景变化预测恐怖行为的方法,其特征在于,所述步骤(2)中生成变化表的方法包括:对于整数h>1,h-变化表CTh(g,Aj)中时间段i的记录由背景属性从时间段i-h到i-h+1的变化以及行为属性从i到i+1的变化产生。2. a kind of method utilizing background change to predict terrorist behavior according to claim 1, is characterized in that, the method for generating change table in described step (2) comprises: for integer h>1, h-change table CT h Records for time period i in (g,A j ) are produced by changes in background attributes from time period ih to i−h+1 and behavioral attributes from i to i+1. 3.根据权利要求1所述的一种利用背景变化预测恐怖行为的方法,其特征在于,所述步骤(3)的实现包括:对变化表进行统计分类,计算P(LAj|X),然后根据行为概率的大小,将较大概率的类标记作为分类结果;其中X表示环境变化向量,LA表示当前时间的行为。3. a kind of method utilizing background change to predict terrorist behavior according to claim 1, is characterized in that, the realization of described step (3) comprises: the change table is carried out statistical classification, calculates P(LA j |X), Then according to the size of the behavior probability, the class label with higher probability is used as the classification result; where X represents the environmental change vector, and LA represents the behavior at the current time. 4.根据权利要求1所述的一种利用背景变化预测恐怖行为的方法,其特征在于,步骤(4)的实现包括如下步骤:4. a kind of method utilizing background change to predict terrorist act according to claim 1, is characterized in that, the realization of step (4) comprises the steps: 1)根据步数H,构建1到H步的变化表CTh(g,Aj),h=1,...,H;1) According to the number of steps H, construct a change table CT h (g, A j ) from 1 to H steps, h=1,...,H; 2)使用h-变化表CTh(g,Aj)中的每一行的变化数据使用贝叶斯方法预测,得到预测的行为序列PYh2) Use the change data of each row in the h-change table CT h (g, A j ) to predict using the Bayesian method to obtain the predicted behavior sequence PY h ; 3)根据rh=Cov(PYh,Yh)/(D(PYh)*D(Yh))1/2;其中Cov(.)为协方差,D(.)为方差,计算预测行为序列PYh与真实行为序列Yh的相关系数rh3) According to r h =Cov(PY h ,Y h )/(D(PY h )*D(Y h )) 1/2 ; where Cov(.) is the covariance, D(.) is the variance, calculate the forecast The correlation coefficient r h between the behavior sequence PY h and the real behavior sequence Y h ; 4)判断是否结束,如果没有结束,则跳到2),计算下一个步长的相关系数;否则,进行下一步。4) Judging whether it is over, if not, skip to 2) and calculate the correlation coefficient of the next step; otherwise, proceed to the next step. 5)使用公式wh=|rh|/Σ|ri|将得到的相关系数r1,r2,...,rH规一化,得到预测权重系数w1,w2,...,wH5) Use the formula w h =|r h |/Σ|r i | to normalize the obtained correlation coefficients r 1 , r 2 ,...,r H to obtain the prediction weight coefficients w 1 , w 2 ,... .,w H ; 6)对于每种行为,在各步变化表上使用贝叶斯分类预测,计算其目标函数maxih(wh*Ph(Ci|X)/ΣkPh(Ck|X))},选择使结果数值最大化的行为作为分类结果;其中,Ci表示每种行为;h=1,...,H,表示变化表的步数;目标函数的关系式表示分别在1到H步变化表上,计算行为Ci在所有行为的发生概率中的加权比重。6) For each behavior, use Bayesian classification prediction on each step change table to calculate its objective function max ih (w h *P h (C i |X)/Σ k P h (C k | X))}, select the behavior that maximizes the value of the result as the classification result; where, C i represents each behavior; h=1,...,H, represents the number of steps in the change table; the relational expression of the objective function represents respectively On the 1 to H step change table, calculate the weighted proportion of behavior C i in the occurrence probability of all behaviors.
CN201610300731.7A 2016-05-04 2016-05-04 Method of predicting act of terror based on background change Pending CN105956982A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610300731.7A CN105956982A (en) 2016-05-04 2016-05-04 Method of predicting act of terror based on background change

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610300731.7A CN105956982A (en) 2016-05-04 2016-05-04 Method of predicting act of terror based on background change

Publications (1)

Publication Number Publication Date
CN105956982A true CN105956982A (en) 2016-09-21

Family

ID=56914087

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610300731.7A Pending CN105956982A (en) 2016-05-04 2016-05-04 Method of predicting act of terror based on background change

Country Status (1)

Country Link
CN (1) CN105956982A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106776884A (en) * 2016-11-30 2017-05-31 江苏大学 A kind of act of terrorism Forecasting Methodology that multi-categorizer is combined based on multi-tag
CN108776817A (en) * 2018-06-04 2018-11-09 孟玺 The type prediction method and system of the attack of terrorism
CN109685321A (en) * 2018-11-26 2019-04-26 山东师范大学 Event risk method for early warning, electronic equipment and medium based on data mining
CN110009022A (en) * 2019-03-26 2019-07-12 第四范式(北京)技术有限公司 Prediction technique, device and the calculating equipment of drug addict's information

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106776884A (en) * 2016-11-30 2017-05-31 江苏大学 A kind of act of terrorism Forecasting Methodology that multi-categorizer is combined based on multi-tag
CN106776884B (en) * 2016-11-30 2021-04-20 江苏大学 Terrorism prediction method based on multi-label combination and multi-classifier
CN108776817A (en) * 2018-06-04 2018-11-09 孟玺 The type prediction method and system of the attack of terrorism
CN109685321A (en) * 2018-11-26 2019-04-26 山东师范大学 Event risk method for early warning, electronic equipment and medium based on data mining
CN110009022A (en) * 2019-03-26 2019-07-12 第四范式(北京)技术有限公司 Prediction technique, device and the calculating equipment of drug addict's information

Similar Documents

Publication Publication Date Title
Dash et al. An outliers detection and elimination framework in classification task of data mining
CN106776884A (en) A kind of act of terrorism Forecasting Methodology that multi-categorizer is combined based on multi-tag
Alvari et al. Detection of violent extremists in social media
Kim et al. Ordinal classification of imbalanced data with application in emergency and disaster information services
Tian et al. MANE: Model-agnostic non-linear explanations for deep learning model
CN113806564B (en) Multi-mode informative text detection method and system
Molaei et al. An analytical review for event prediction system on time series
Song et al. Tridirectional transfer learning for predicting gastric cancer morbidity
CN105956982A (en) Method of predicting act of terror based on background change
Mohd et al. A comparative study to evaluate filtering methods for crime data feature selection
CN104899430A (en) Multisource example transfer learning-based terror act prediction method
Ahmed et al. Recognizing a spatial extreme dependence structure: A deep learning approach
Lai et al. Neural network metalearning for credit scoring
Gao et al. Suspects prediction towards terrorist attacks based on machine learning
Alsayadi et al. Improving the regression of communities and crime using ensemble of machine learning models
Hossain et al. Predicting the success of suicide terrorist attacks using different machine learning algorithms
Jiang et al. Multi-feature deep learning for face gender recognition
Dutta et al. Better prediction of humidity using artificial neural network
Yang et al. Credit risk assessment in commercial banks based on SVM using PCA
CN116245645A (en) Financial crime partner detection method based on graph neural network
Zahera et al. DICE@ TREC-IS 2018: Combining Knowledge Graphs and Deep Learning to Identify Crisis-Relevant Tweets.
Nguyen et al. Detection of ransomware attacks using federated learning based on the CNN model
Lima Junior et al. An experimental study of fitness function and time series forecasting using artificial neural networks
Chen et al. Hybrid genetic algorithm and learning vector quantization modeling for cost-sensitive bankruptcy prediction
Alsulaimawi et al. Sequential game network (segane) with application to online data sanitization

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160921