CN105956982A - Method of predicting act of terror based on background change - Google Patents
Method of predicting act of terror based on background change Download PDFInfo
- Publication number
- CN105956982A CN105956982A CN201610300731.7A CN201610300731A CN105956982A CN 105956982 A CN105956982 A CN 105956982A CN 201610300731 A CN201610300731 A CN 201610300731A CN 105956982 A CN105956982 A CN 105956982A
- Authority
- CN
- China
- Prior art keywords
- behavior
- change
- background
- change table
- predict
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000008859 change Effects 0.000 title claims abstract description 80
- 238000000034 method Methods 0.000 title claims abstract description 20
- 230000006399 behavior Effects 0.000 claims abstract description 101
- 238000013398 bayesian method Methods 0.000 claims abstract description 20
- 239000013598 vector Substances 0.000 claims abstract description 12
- 230000008520 organization Effects 0.000 claims description 7
- 230000000694 effects Effects 0.000 claims description 6
- 230000003542 behavioural effect Effects 0.000 claims description 4
- 238000013500 data storage Methods 0.000 claims description 2
- 238000007781 pre-processing Methods 0.000 claims description 2
- 230000007613 environmental effect Effects 0.000 claims 1
- 238000004364 calculation method Methods 0.000 abstract description 6
- 238000004422 calculation algorithm Methods 0.000 description 7
- 238000007418 data mining Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 238000006386 neutralization reaction Methods 0.000 description 1
- 238000010606 normalization Methods 0.000 description 1
- 230000003449 preventive effect Effects 0.000 description 1
- 238000007619 statistical method Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/04—Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Economics (AREA)
- Strategic Management (AREA)
- Human Resources & Organizations (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Primary Health Care (AREA)
- Educational Administration (AREA)
- General Health & Medical Sciences (AREA)
- Game Theory and Decision Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
本发明公开了一种利用背景变化预测恐怖行为的方法,主要步骤为:变化表的生成、使用贝叶斯方法预测行为。在生成h‑变化表时,将当前时刻的背景变化与h周期之后的行为变化结合,形成变化表中的一项纪录。预测时,在输入背景变化向量的前提下,贝叶斯方法从变化表中计算最大概率的分类结果,从而预测h周期的之后的行为。考虑到背景的变化可能会在时间序列上对组织行为产生持续的影响,因此建立加权贝叶斯模型。模型实现在时间滞差分别为1到H的情况下,计算在不同变化表中各种行为的概率,最后加权计算各种行为的概率。本发明为了能根据任意背景变化预测恐怖行为,利用贝叶斯方法可快速有效解决高维小样本分类问题的特性,提高了预测的精度。
The invention discloses a method for predicting terrorist behavior by using background changes. The main steps are: generating a change table and using Bayesian method to predict behavior. When generating the h-change table, the background change at the current moment is combined with the behavior change after the h period to form a record in the change table. When predicting, under the premise of inputting the background change vector, the Bayesian method calculates the classification result of the maximum probability from the change table, so as to predict the behavior after the h period. Considering that changes in the background may have a continuous impact on organizational behavior in time series, a weighted Bayesian model is established. The model implements the calculation of the probabilities of various behaviors in different change tables when the time lags are 1 to H respectively, and finally calculates the probabilities of various behaviors by weighting. In order to predict terrorist behaviors according to arbitrary background changes, the present invention utilizes the characteristics that the Bayesian method can quickly and effectively solve the classification problem of high-dimensional small samples, and improves the prediction accuracy.
Description
技术领域technical field
本发明属于数据挖掘中的组织行为预测技术,具体涉及一种在改进的变化表上,使用贝叶斯方法预测恐怖行为的算法。The invention belongs to the technology of predicting organizational behavior in data mining, and in particular relates to an algorithm for predicting terrorist behavior using a Bayesian method on an improved change table.
背景技术Background technique
恐怖行为是指实施者对非武装人员有组织地使用暴力或以暴力相威胁,通过将一定的对象置于恐怖之中,来达成宗教、政治或意识形态上的目的。美国“9·11”事件震惊了全世界,使得恐怖组织成为全球的焦点,成为影响着世界和平的因素之一。最近,伊斯兰国(ISIS)在中东的活动愈演愈烈。该组织于2014年11月在法国巴黎发动报复性炸弹袭击事件,造成了大量的无辜民众的伤亡,恐怖袭击再次成了主要关注目标。如何利用已有的信息预测恐怖组织的行为,成为一个重要的课题。Terrorist acts refer to the organized use of violence or threat of violence against non-armed persons by the perpetrators to achieve religious, political or ideological goals by placing certain objects in terror. The "9.11" incident in the United States shocked the whole world, making terrorist organizations the focus of the world and one of the factors affecting world peace. Recently, the activities of the Islamic State (ISIS) in the Middle East have intensified. The organization launched a retaliatory bomb attack in Paris, France in November 2014, causing a large number of casualties of innocent people. Terrorist attacks have once again become the main focus of attention. How to use existing information to predict the behavior of terrorist organizations has become an important topic.
恐怖行为预测是知识挖掘的典型应用,它利用数据挖掘和机器学习的相关技术对过去、现在恐怖组织策划实施的恐怖行为的情况进行科学的统计分析,然后预测其发展趋势。恐怖预测不是证实过去,也不是说明现实,而是探索未来,预测恐怖主义组织的发展趋势。其目的在于为采取有效的预防措施提供决策支持。恐怖袭击事件发生的原因包含政治、经济和文化等方面的因素,各种因素交织在一起,使恐怖行为预测显得错综复杂。对恐怖行为预测的研究不能单单考虑恐怖事件发生的时间、地点及影响程度等信息,而应以各类学科(计算机数据挖掘技术与社会学,犯罪学等)为基础,综合考虑包括恐怖组织的政治、文化、经济等背景因素,并通过对这些数据的分析为当局的决策提供更有效的支持。因此,分析恐怖组织的背景知识与其行为之间的关系成为研究的热点。Terrorist behavior prediction is a typical application of knowledge mining. It uses data mining and machine learning related technologies to conduct scientific statistical analysis of past and present terrorist organizations planning and implementing terrorist behavior, and then predicts its development trend. Terror forecasting is not to confirm the past, nor to explain the reality, but to explore the future and predict the development trend of terrorist organizations. Its purpose is to provide decision support for effective preventive measures. The reasons for terrorist attacks include political, economic and cultural factors, and various factors are intertwined, making the prediction of terrorist behavior complex. Research on the prediction of terrorist acts should not only consider information such as the time, place, and degree of influence of terrorist events, but should be based on various disciplines (computer data mining technology and sociology, criminology, etc.), comprehensively considering the information of terrorist organizations, including terrorist organizations. Political, cultural, economic and other background factors, and provide more effective support for the authorities' decision-making through the analysis of these data. Therefore, analyzing the relationship between the background knowledge of terrorist organizations and their behavior has become a research hotspot.
目前,基于背景知识预测恐怖行为的预测方法的基本思路基本相同,即根据组织背景与行为之间的关系,构建组织的行为预测模型。具体来说,这些方法利用背景向量之间的相似度预测对应的行为向量,再对预测的行为向量进行某种计算,得到行为向量中各行为的概率,然后根据各行为的发生概率给出预测结果。然而,在现实中,组织一般具有反侦查能力,其恐怖活动发生的时间、地点及行为强度等属性会因此改变。现有的大多数模型没有考虑组织的这种改变及由此引起的行为变化。而考虑到了背景与行为之间的变化联系的模型,虽然尝试通过学习组织改变行为的条件,构建了背景与行为之间的变化规则,但还存在许多缺点。例如,模型只能根据变化表中存在的背景变化预测行为,且预测准确率较低而时间复杂度高。At present, the basic ideas of the prediction methods based on background knowledge to predict terrorist behavior are basically the same, that is, to construct an organizational behavior prediction model based on the relationship between organizational background and behavior. Specifically, these methods use the similarity between background vectors to predict the corresponding behavior vector, and then perform some calculation on the predicted behavior vector to obtain the probability of each behavior in the behavior vector, and then give a prediction based on the occurrence probability of each behavior result. However, in reality, organizations generally have anti-investigation capabilities, and attributes such as the time, place, and intensity of terrorist activities will change accordingly. Most existing models do not account for this change in organization and the resulting behavioral changes. However, the model that takes into account the changing relationship between background and behavior, although it tries to construct the changing rules between background and behavior by learning the conditions under which organizations change behavior, has many shortcomings. For example, the model can only predict behavior based on the background changes existing in the change table, and the prediction accuracy is low and the time complexity is high.
本发明给出了一种基于变化表和贝叶斯方法的恐怖行为预测算法,该算法既可以有效提取恐怖行为的背景知识子空间,又能确保利用提取的背景子空间进行预测的有效性。The invention provides a terrorist behavior prediction algorithm based on the change table and the Bayesian method. The algorithm can not only effectively extract the background knowledge subspace of the terrorist behavior, but also ensure the effectiveness of prediction using the extracted background subspace.
发明内容Contents of the invention
本发明依据组织的背景变化可能导致行为的改变这一思想,利用恐怖分子的背景知识预测其行为。为了能够在任意的背景变化下预测组织行为,针对数据集高维小样本特点,提出一种基于贝叶斯方法和变化表的恐怖行为预测算法。改进的变化表存储了背景与行为已有的变化情况,使贝叶斯方法能方便地从中收集相关的变化信息。对于新的背景变化,贝叶斯方法根据输入背景变化向量中各个元素对不同分类结果的影响程度进行综合判断,从而能够在任意的背景变化下实现预测行为的目的。除此之外,对于高维小样本数据,贝叶斯方法能够快速有效的预测。最后,考虑到背景的改变对行为的影响不是瞬时的,而是会在一定的时间周期之内对行为产生持续影响。因此,该方法考虑在不同时间滞差下综合预测组织行为。Based on the idea that changes in the background of an organization may lead to changes in behavior, the present invention utilizes the background knowledge of terrorists to predict their behavior. In order to predict organizational behavior under arbitrary background changes, a terrorist behavior prediction algorithm based on Bayesian method and change table is proposed according to the high-dimensional and small-sample characteristics of the data set. The improved change table stores the existing changes of background and behavior, so that the Bayesian method can conveniently collect relevant change information. For new background changes, the Bayesian method makes a comprehensive judgment based on the influence of each element in the input background change vector on different classification results, so that the purpose of predicting behavior can be achieved under any background change. In addition, for high-dimensional small-sample data, Bayesian methods can quickly and effectively predict. Finally, consider that the impact of background changes on behavior is not instantaneous, but will have a continuous impact on behavior within a certain period of time. Therefore, this method considers comprehensively predicting tissue behavior under different time lags.
本发明利用恐怖组织的背景知识提取子空间的预测方法,包括以下步骤:The present invention utilizes the background knowledge of terrorist organization to extract the prediction method of subspace, comprises the following steps:
(1)原始数据集的预处理;(1) Preprocessing of the original data set;
原始数据由恐怖组织的基本信息、背景知识和行为活动构成,提取背景知识和行为,将其标记为(CS(g),AS(g))的向量对。其CS(g)=(C1,C2,…,CM)表示数据中的背景属性,AS(g)=(A1,A2,…,AN)表示数据中涉及到的行为属性。为了得到不同行为的背景子空间,需要对数据做预处理,形成(CS(g),Aj)的N个子数据集。若令g表示恐怖组织,Tg表示数据集中组织行为Aj的子数据集,则Tg=(x1,x2,...,xm)T,xi=(ci1,ci2,...,cin,aij),其中ci属于背景属性集CS(g),aj属于行为属性集AS(g)。The original data is composed of the basic information, background knowledge and behavior activities of terrorist organizations. The background knowledge and behavior are extracted and marked as (CS(g), AS(g)) vector pairs. Its CS(g)=(C 1 ,C 2 ,…,C M ) represents the background attributes in the data, and AS(g)=(A 1 ,A 2 ,…, AN ) represents the behavioral attributes involved in the data . In order to obtain background subspaces of different behaviors, it is necessary to preprocess the data to form N subdatasets of (CS(g),A j ). If g represents a terrorist organization, Tg represents the sub-dataset of organizational behavior A j in the data set, then Tg=(x 1 ,x 2 ,...,x m ) T , x i =(c i1 ,c i2 ,. ..,c in ,a ij ), where ci belongs to the background attribute set CS(g), and a j belongs to the behavior attribute set AS(g).
(2)针对AS(g)中每一种待预测行为,生成改进的变化表;(2) Generate an improved change table for each behavior to be predicted in AS(g);
变化表是一种记录组织在时间序列上行为随其背景变化关系的数据存储结构,表示背景的改变对行为变化的影响。对于整数h≥1,h-变化表CTh(g,Aj)中时间段i的记录由背景属性从时间段i-h到i-h+1的变化以及行为属性从i到i+1的变化产生。如表1所示包含背景和行为Aj的原始数据经过处理后,生成如表2所示的行为Aj的h-变化表CTh(g,Aj)。所述变化表包括1步变化表和多步变化表。The change table is a data storage structure that records the relationship between an organization's behavior and its background changes in time series, and represents the impact of background changes on behavior changes. For an integer h≥1, the record of time period i in h-change table CT h (g,A j ) consists of the change of background attribute from time period ih to i-h+1 and the change of behavior attribute from i to i+1 produce. As shown in Table 1, the original data including background and behavior A j are processed, and the h-change table CT h (g, A j ) of behavior A j shown in Table 2 is generated. The change table includes a one-step change table and a multi-step change table.
表2中,PAj表示上个周期的行为,LAJ表示当前时间的行为。In Table 2, PA j represents the behavior of the last period, and LA J represents the behavior of the current time.
(3)利用贝叶斯方法,在生成的变化表上计算预测结果;(3) Utilize the Bayesian method to calculate the prediction result on the generated change table;
(4)使用多步加权贝叶斯模型,在不同步长的变化表上分别预测,并给出综合预测结果:(4) Use the multi-step weighted Bayesian model to predict separately on the change tables of different step lengths, and give the comprehensive prediction results:
1)根据步数H,构建1到H步的变化表CTh(g,Aj),h=1,...,H;;1) According to the number of steps H, construct a change table CT h (g, A j ) from 1 to H steps, h=1,...,H;;
2)用h-变化表CTh(g,Aj)中的每一行的变化数据使用贝叶斯方法预测,得到预测的行为序列PYh;2) Use the Bayesian method to predict the change data of each row in the h-change table CT h (g, A j ), and obtain the predicted behavior sequence PY h ;
3)根据公式rh=Cov(PYh,Yh)/(D(PYh)*D(Yh))1/2(其中Cov(.)为协方差,D(.)为方差)计算预测行为序列PYh与真实行为序列Yh的相关系数rh;3) According to the formula r h =Cov(PY h ,Y h )/(D(PY h )*D(Y h )) 1/2 (where Cov(.) is the covariance, D(.) is the variance) calculation The correlation coefficient r h between the predicted behavior sequence PY h and the real behavior sequence Y h ;
4)判断是否结束?如果没有,则跳到2),计算下一个步长的相关系数;否则,进行下一步。4) Is the judgment over? If not, skip to 2) and calculate the correlation coefficient of the next step; otherwise, proceed to the next step.
5)使用公式wh=|rh|/Σ|ri|将得到的相关系数r1,r2,...,rH规一化,得到预测权重系数w1,w2,...,wH;Σ|ri|表示对相关系数求和,i=1,2,…H。5) Use the formula w h =|r h |/Σ|r i | to normalize the obtained correlation coefficients r 1 , r 2 ,...,r H to obtain the prediction weight coefficients w 1 , w 2 ,... .,w H ; Σ|r i | means to sum the correlation coefficients, i=1,2,...H.
6)对于每种行为,在各步变化表上使用贝叶斯分类预测,计算其目标函数maxi{Σh(wh*Ph(Ci|X)/ΣkPh(Ck|X))},选择使结果数值最大化的行为作为分类结果。其中,Ci表示每种行为;h=1,...,H,表示变化表的步数。目标函数的关系式表示分别在1到H步变化表上,计算行为Ci在所有行为的发生概率中的加权比重。6) For each behavior, use Bayesian classification prediction on each step change table to calculate its objective function max i {Σ h (w h *P h (C i |X)/Σ k P h (C k | X))}, select the behavior that maximizes the value of the result as the classification result. Among them, C i represents each behavior; h=1,...,H, represents the step number of the change table. The relational expression of the objective function indicates that on the 1 to H step change table, calculate the weighted proportion of the behavior C i in the occurrence probability of all behaviors.
本发明中的预测方法分为两个步骤:首先根据特定的恐怖行为生成与之对应的变化表,然后在生成的变化表中预测此行为的发生情况。The prediction method in the present invention is divided into two steps: first, a corresponding change table is generated according to a specific terrorist act, and then the occurrence of the act is predicted in the generated change table.
本发明中变化表的生成过程中的影响滞差h表示背景属性的变化会在h个时间周期之后对行为属性变化产生影响,进而使用贝叶斯方法预测h步之后的恐怖行为。而多步贝叶斯中和预测,综合考虑1到h步滞差影响下的预测情况,作出最终的预测结果。The impact hysteresis h in the process of generating the change table in the present invention indicates that the change of the background attribute will affect the change of the behavior attribute after h time periods, and then use the Bayesian method to predict the terrorist behavior after h steps. And the multi-step Bayesian neutralization forecast, comprehensively consider the forecast situation under the influence of 1 to h step lag, and make the final forecast result.
本发明主要有以下两个方面的有益效果:The present invention mainly has the beneficial effect of following two aspects:
(1)在预测算法方面(1) In terms of prediction algorithm
原始数据集中存在的高维小样本的特点,导致一般预测方法的效果欠佳。而贝叶斯方法解决这一问题具有天然的优势,能够快速有效的作出预测。最后,考虑到背景的改变对行为的影响不是瞬时的,而是会在一定的时间周期之内对行为产生持续影响。因此,算法考虑在不同时间滞差下综合预测组织行为。对于每种行为而言,计算在各步变化表上使用贝叶斯分类预测得到该行为的概率在所有分类结果概率中的比重之和,选择使结果数值最大化的行为作为分类结果。The characteristics of high-dimensional small samples in the original data set lead to poor performance of general prediction methods. The Bayesian method to solve this problem has natural advantages and can make predictions quickly and effectively. Finally, consider that the impact of background changes on behavior is not instantaneous, but will have a continuous impact on behavior within a certain period of time. Therefore, the algorithm considers comprehensively predicting tissue behavior under different time lags. For each behavior, calculate the sum of the proportions of the probability of using Bayesian classification prediction to obtain the behavior in all classification result probabilities on each step change table, and select the behavior that maximizes the result value as the classification result.
(2)在变化表生成方面(2) In terms of change table generation
改进的变化表存储了背景与行为已有的变化情况,使贝叶斯方法能方便地从中收集相关的变化信息。对于新的背景变化,贝叶斯方法使用一定方法进行校准,根据输入背景变化向量中各个元素对不同分类结果的影响程度进行综合判断,从而能够在任意的背景变化下实现预测行为的目的。而且变化表的生成过程中的影响滞差h表示背景属性的变化会在h个时间周期之后对行为属性变化产生影响,进而使用贝叶斯方法预测h步之后的恐怖行为。The improved change table stores the existing changes of background and behavior, so that the Bayesian method can conveniently collect relevant change information. For new background changes, the Bayesian method uses a certain method to calibrate, and comprehensively judges the degree of influence of each element in the input background change vector on different classification results, so that the purpose of predicting behavior can be achieved under any background change. Moreover, the influence hysteresis h in the process of generating the change table indicates that the change of the background attribute will affect the change of the behavior attribute after h time periods, and then use the Bayesian method to predict the terrorist behavior after h steps.
附图说明Description of drawings
图1是本发明中多步加权贝叶斯预测方法的训练模块计算权重的流程图。Fig. 1 is the flowchart of the weight calculation of the training module of the multi-step weighted Bayesian prediction method in the present invention.
图2是本发明中使用多步加权贝叶斯预测方法预测模块预测组织行为的流程图。Fig. 2 is a flow chart of predicting tissue behavior using a multi-step weighted Bayesian prediction method prediction module in the present invention.
具体实施方式detailed description
下面以表3所示的背景数据子集为例,结合图1、图2的多步加权贝叶斯预测模型中的权重计算以及行为预测流程,详细说明本发明的算法流程。Taking the background data subset shown in Table 3 as an example, the algorithm flow of the present invention will be described in detail in combination with the weight calculation and behavior prediction flow in the multi-step weighted Bayesian prediction model shown in Fig. 1 and Fig. 2 .
表3中共设置了八个字段,分别标记为Time、C1、C2、C3、C4、C5、C6和A,其中Time标记为记录在表中的时间序列,{C1,C2,C3,C4,C5,C6}=CS(g)属于背景知识属性,A属于行为属性。目的即利用表3所示的背景知识预测预测恐怖行为A的发生与否。A total of eight fields are set in Table 3, marked as Time, C1, C2, C3, C4, C5, C6 and A, where Time is marked as the time series recorded in the table, {C1, C2, C3, C4, C5 , C6}=CS(g) belongs to the attribute of background knowledge, and A belongs to the attribute of behavior. The purpose is to use the background knowledge shown in Table 3 to predict the occurrence of terrorist act A.
具体步骤如下:Specific steps are as follows:
(1)利用表3的数据生成1步变化表,得到变化表如表4所示。(1) Use the data in Table 3 to generate a one-step change table, and the obtained change table is shown in Table 4.
(2)根据贝叶斯方法,对变化表进行统计分类,得到分类结果如表5所示。(2) According to the Bayesian method, the change table is statistically classified, and the classification results are shown in Table 5.
表5中,使用贝叶斯分类需计算P(LA=0|X)以及P(LA=1|X),然后分类概率的大小,将较大概率的类标记作为分类预测结果。其中,根据贝叶斯定理,比较P(LA=0|X)以及P(LA=1|X)的大小等价于比较P(X|LA=0)P(LA=0)和P(X|LA=1)P(LA=1)的大小。其中,P(X|LA=0)P(LA=0)和P(X|LA=1)P(LA=1)分别表示在环境变化向量X下,行为为0的概率和行为为1的概率。In Table 5, it is necessary to calculate P(LA=0|X) and P(LA=1|X) when using Bayesian classification, and then classify the probability, and use the class label with higher probability as the classification prediction result. Among them, according to Bayes' theorem, comparing P(LA=0|X) and P(LA=1|X) is equivalent to comparing P(X|LA=0)P(LA=0) and P(X |LA=1) the size of P(LA=1). Among them, P(X|LA=0)P(LA=0) and P(X|LA=1)P(LA=1) respectively represent the probability of the behavior being 0 and the behavior being 1 under the environment change vector X probability.
使用1步变化表预测的结果,即为预测恐怖组织1个时间周期之后的行为。例如,假设当前的背景变化为:{(0,0),(1,1),(0,1),(0,0),(1,0),(1,0),0},那么预测下一个时间周期的行为为1,即发生该类恐怖活动。The result of using the 1-step change table prediction is to predict the behavior of terrorist organizations after 1 time period. For example, suppose the current background change is: {(0,0),(1,1),(0,1),(0,0),(1,0),(1,0),0}, then The behavior of predicting the next time period is 1, that is, such terrorist activities occur.
(3)使用多步加权贝叶斯综合预测,假设给定的步数为2。(3) Using multi-step weighted Bayesian comprehensive forecasting, assuming that the given number of steps is 2.
①首先,如表2中所示方法,建立1步和2步变化表,结果如表4,表6所示。① Firstly, according to the method shown in Table 2, the 1-step and 2-step change tables are established, and the results are shown in Table 4 and Table 6.
②其次,根据贝叶斯方法,对1步和2步变化表进行统计分类,得到结果如表5、表7所示。②Secondly, according to the Bayesian method, the 1-step and 2-step change tables are statistically classified, and the results are shown in Table 5 and Table 7.
③然后,使用预测得到的行为序列分别和真实的行为序列,计算每一步的相关系数,完成归一化,作为该步变化表预测的权重,结果如表8所示。③ Then, use the predicted behavior sequence and the real behavior sequence to calculate the correlation coefficient of each step, complete the normalization, and use it as the weight of the step change table prediction. The results are shown in Table 8.
④预测时,假设当前的背景变化向量X为:{(0,0),(1,1),(0,1),(0,0),(1,0),(1,0),0},分别在每步变化表中计算P(LA=0|X)和P(LA=1|X),同样使用P(X|LA=0)P(LA=0)和P(X|LA=1)P(LA=1)进行替换,计算结果如表9所示。④ When predicting, assume that the current background change vector X is: {(0,0),(1,1),(0,1),(0,0),(1,0),(1,0), 0}, calculate P(LA=0|X) and P(LA=1|X) in each step change table, and use P(X|LA=0)P(LA=0) and P(X| LA=1)P(LA=1) to replace, the calculation results are shown in Table 9.
当LA=0时,Σh(wh*Ph(Ci|X)/ΣkPh(Ck|X))=0.027*0.5+0.0610*0.5=0.044;When LA=0, Σ h (w h *P h (C i |X)/Σ k P h (C k |X))=0.027*0.5+0.0610*0.5=0.044;
当LA=1时,Σh(wh*Ph(Ci|X)/ΣkPh(Ck|X))=0.9730*0.5+0.9390*0.5=0.956;When LA=1, Σ h (w h *P h (C i |X)/Σ k P h (C k |X))=0.9730*0.5+0.9390*0.5=0.956;
因为0.044小于0.956,预测结果为LA=1,即发生恐怖活动。Because 0.044 is less than 0.956, the predicted result is LA=1, that is, terrorist activities occur.
上文所列出的一系列的详细说明仅仅是针对本发明的可行性实施方式的具体说明,它们并非用以限制本发明的保护范围,凡未脱离本发明技艺精神所作的等效实施方式或变更均应包含在本发明的保护范围之内。The series of detailed descriptions listed above are only specific descriptions for feasible implementations of the present invention, and they are not intended to limit the protection scope of the present invention. Any equivalent implementation or implementation that does not depart from the technical spirit of the present invention All changes should be included within the protection scope of the present invention.
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610300731.7A CN105956982A (en) | 2016-05-04 | 2016-05-04 | Method of predicting act of terror based on background change |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610300731.7A CN105956982A (en) | 2016-05-04 | 2016-05-04 | Method of predicting act of terror based on background change |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105956982A true CN105956982A (en) | 2016-09-21 |
Family
ID=56914087
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610300731.7A Pending CN105956982A (en) | 2016-05-04 | 2016-05-04 | Method of predicting act of terror based on background change |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105956982A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106776884A (en) * | 2016-11-30 | 2017-05-31 | 江苏大学 | A kind of act of terrorism Forecasting Methodology that multi-categorizer is combined based on multi-tag |
CN108776817A (en) * | 2018-06-04 | 2018-11-09 | 孟玺 | The type prediction method and system of the attack of terrorism |
CN109685321A (en) * | 2018-11-26 | 2019-04-26 | 山东师范大学 | Event risk method for early warning, electronic equipment and medium based on data mining |
CN110009022A (en) * | 2019-03-26 | 2019-07-12 | 第四范式(北京)技术有限公司 | Prediction technique, device and the calculating equipment of drug addict's information |
-
2016
- 2016-05-04 CN CN201610300731.7A patent/CN105956982A/en active Pending
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106776884A (en) * | 2016-11-30 | 2017-05-31 | 江苏大学 | A kind of act of terrorism Forecasting Methodology that multi-categorizer is combined based on multi-tag |
CN106776884B (en) * | 2016-11-30 | 2021-04-20 | 江苏大学 | Terrorism prediction method based on multi-label combination and multi-classifier |
CN108776817A (en) * | 2018-06-04 | 2018-11-09 | 孟玺 | The type prediction method and system of the attack of terrorism |
CN109685321A (en) * | 2018-11-26 | 2019-04-26 | 山东师范大学 | Event risk method for early warning, electronic equipment and medium based on data mining |
CN110009022A (en) * | 2019-03-26 | 2019-07-12 | 第四范式(北京)技术有限公司 | Prediction technique, device and the calculating equipment of drug addict's information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dash et al. | An outliers detection and elimination framework in classification task of data mining | |
CN106776884A (en) | A kind of act of terrorism Forecasting Methodology that multi-categorizer is combined based on multi-tag | |
Alvari et al. | Detection of violent extremists in social media | |
Kim et al. | Ordinal classification of imbalanced data with application in emergency and disaster information services | |
Tian et al. | MANE: Model-agnostic non-linear explanations for deep learning model | |
CN113806564B (en) | Multi-mode informative text detection method and system | |
Molaei et al. | An analytical review for event prediction system on time series | |
Song et al. | Tridirectional transfer learning for predicting gastric cancer morbidity | |
CN105956982A (en) | Method of predicting act of terror based on background change | |
Mohd et al. | A comparative study to evaluate filtering methods for crime data feature selection | |
CN104899430A (en) | Multisource example transfer learning-based terror act prediction method | |
Ahmed et al. | Recognizing a spatial extreme dependence structure: A deep learning approach | |
Lai et al. | Neural network metalearning for credit scoring | |
Gao et al. | Suspects prediction towards terrorist attacks based on machine learning | |
Alsayadi et al. | Improving the regression of communities and crime using ensemble of machine learning models | |
Hossain et al. | Predicting the success of suicide terrorist attacks using different machine learning algorithms | |
Jiang et al. | Multi-feature deep learning for face gender recognition | |
Dutta et al. | Better prediction of humidity using artificial neural network | |
Yang et al. | Credit risk assessment in commercial banks based on SVM using PCA | |
CN116245645A (en) | Financial crime partner detection method based on graph neural network | |
Zahera et al. | DICE@ TREC-IS 2018: Combining Knowledge Graphs and Deep Learning to Identify Crisis-Relevant Tweets. | |
Nguyen et al. | Detection of ransomware attacks using federated learning based on the CNN model | |
Lima Junior et al. | An experimental study of fitness function and time series forecasting using artificial neural networks | |
Chen et al. | Hybrid genetic algorithm and learning vector quantization modeling for cost-sensitive bankruptcy prediction | |
Alsulaimawi et al. | Sequential game network (segane) with application to online data sanitization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160921 |