CN105956982A - Method of predicting act of terror based on background change - Google Patents

Method of predicting act of terror based on background change Download PDF

Info

Publication number
CN105956982A
CN105956982A CN201610300731.7A CN201610300731A CN105956982A CN 105956982 A CN105956982 A CN 105956982A CN 201610300731 A CN201610300731 A CN 201610300731A CN 105956982 A CN105956982 A CN 105956982A
Authority
CN
China
Prior art keywords
behavior
change
background
change table
prediction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610300731.7A
Other languages
Chinese (zh)
Inventor
薛安荣
王孟頔
毛文渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu University
Original Assignee
Jiangsu University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu University filed Critical Jiangsu University
Priority to CN201610300731.7A priority Critical patent/CN105956982A/en
Publication of CN105956982A publication Critical patent/CN105956982A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Educational Administration (AREA)
  • General Health & Medical Sciences (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method of predicting an act of terror based on background change, mainly comprising the following steps: generating a change table, and predicting acts using a Bayesian method; during generation of an h- change table, combining the background change at the current time and the act change after h cycles to form a record in the change table; during prediction, under the premise of inputting a background change vector, using the Bayesian method to calculate a classification result of maximum probability from the change table so as to predict an act after h cycles; building a weighted Bayesian model in view of the fact that background change may have a lasting impact on the organizational act in time series; and using the model to calculate the probability of each act in different change tables under the condition that the time lag is 1 to H respectively, and finally, weighting the probability of all kinds of acts. Through the method, an act of terror can be predicted according to any background change. By using the Bayesian method, the problem of high-dimensional small sample classification can be solved quickly and efficiently, and the precision of prediction is improved.

Description

One utilizes the terroristic method of background variation prediction
Technical field
The invention belongs to the organizational behavior Predicting Technique in data mining, be specifically related to a kind of on the change table improved, use Bayes method predicts terroristic algorithm.
Background technology
The act of terrorism refers to that unarmed personnel are in an organized way used force or try threat of violence by implementer, by by certain Object is placed among terror, reaches the purpose on religion, politics or ideology.The U.S. " 9 11 " event shocks The whole world so that terroristic organization becomes the focus in the whole world, becomes one of factor affecting world peace.Recently, Islam The state (ISIS) activity in the Middle East grows in intensity.This is organized in and starts vindictive bombing raid at Paris, FRA in November, 2014 Event, causes the injures and deaths of substantial amounts of innocent people, and the attack of terrorism has become to be primarily upon target again.How to utilize existing The behavior of information prediction terroristic organization, becomes an important problem.
Act of terrorism prediction is typical case's application of knowledge excavation, it utilize the correlation technique of data mining and machine learning to the past, The terroristic situation that terroristic organization's planning now is implemented carries out the statistical analysis of science, then predicts its development trend.Probably Fear prediction is not to confirm in the past, is not explanation reality, but Probe into Future, it was predicted that the development trend of terrorist's organization. Its object is to as taking effective preventive measure to provide decision support.The reason that the attack of terrorism occurs comprises politics, warp The factor of the aspects such as Ji and culture, various factors weave in, make act of terrorism prediction seem intricate.To terrified row The information such as time, place and influence degree that terrorist incident occurs can not be only considered for the research of prediction, and should be with all kinds of Based on section's (computer data digging technology and sociology, criminology etc.), consider include terroristic organization politics, Culture, economic dispatch contextual factor, and provide more effectively support by these data being analyzed the decision-making into authorities.Therefore, The relation between background knowledge and its behavior of terroristic organization of analyzing becomes the focus of research.
At present, predict that the basic ideas of terroristic Forecasting Methodology are essentially identical, i.e. according to background tissue based on background knowledge And the relation between behavior, builds the behavior prediction model of tissue.Specifically, these methods utilize between background vector The behavior vector that similarity prediction is corresponding, then the behavior vector of prediction is carried out certain calculating, obtain each behavior in behavior vector Probability, be then given according to the probability of happening of each behavior and predict the outcome.But, in reality, tissue typically has counter detecing Looking into ability, therefore the attribute such as time, place and intensity of performance that its terrorist activity occurs can change.Existing most models This change not accounting for tissue and the Behavioral change thus caused.And the change that take into account between background and behavior contacts Model, although attempt by learning organization change behavior condition, construct the rule change between background and behavior, but There is also many shortcomings.Such as, model can only be according to background variation prediction behavior present in change table, and predictablity rate Relatively low and time complexity is high.
The present invention gives a kind of act of terrorism prediction algorithm based on change table and bayes method, this algorithm both can be effective Extract terroristic background knowledge subspace, can ensure that again the effectiveness utilizing the background subspace extracted to be predicted.
Summary of the invention
The present invention may cause this thought of change of behavior according to the background change of tissue, utilizes the background knowledge of terrorist Predict its behavior.In order to predict organizational behavior under arbitrary background changes, for data set higher-dimension small sample feature, A kind of act of terrorism prediction algorithm based on bayes method with change table is proposed.The change table improved stores background and behavior Existing situation of change, makes bayes method can the most therefrom collect relevant change information.For new background change, Bayes method carries out comprehensive descision according to each element in input background change vector to the influence degree of different classification results, It is thus possible to realize the purpose of prediction behavior under arbitrary background changes.In addition, for higher-dimension Small Sample Database, shellfish This method of leaf can be predicted fast and effectively.Finally, it is contemplated that changing the impact of behavior of background is not instantaneous, but Within cycle regular hour, behavior can be produced long lasting effect.Therefore, the method considers under different time decalage comprehensive Prediction organizational behavior.
The present invention utilizes the background knowledge of terroristic organization to extract the Forecasting Methodology of subspace, comprises the following steps:
(1) pretreatment of raw data set;
Initial data is made up of the essential information of terroristic organization, background knowledge and behavioral activity, extracts background knowledge and behavior, The vector being marked as (CS (g), AS (g)) is right.Its CS (g)=(C1,C2,…,CM) represent the background attribute in data, AS (g) =(A1,A2,…,AN) represent the behavior property related in data.In order to obtain the background subspace of different behavior, need logarithm According to doing pretreatment, form (CS (g), Aj) N number of Sub Data Set.If terroristic organization, Tg represent group in data set to make g represent Knit behavior AjSub Data Set, then Tg=(x1,x2,...,xm)T, xi=(ci1,ci2,...,cin,aij), wherein ciBelong to background attribute collection CS (g), ajBelong to behavior property collection AS (g).
(2) for each behavior to be predicted in AS (g), the change table improved is generated;
Change table is that the behavior in time series of a kind of record organization, with the data store organisation of its background variation relation, represents the back of the body The change of the scape impact on Behavioral change.For integer h >=1, h-changes table CTh(g,AjIn), the record of time period i is belonged to by background Property change from time period i-h to i-h+1 and behavior property change from i to i+1 produce.Comprise background as shown in table 1 With behavior AjInitial data after treatment, generate behavior A as shown in table 2jH-change table CTh(g,Aj).Described Change table includes 1 step change table and multistep change table.
In table 2, PAjRepresent the behavior in last cycle, LAJRepresent the behavior of current time.
(3) utilize bayes method, the change table generated calculates and predicts the outcome;
(4) use multistep weighting Bayesian model, the change table of different step-lengths is predicted respectively, and provides integrated forecasting Result:
1) according to step number H, the change table CT of 1 to H step is builth(g,Aj), h=1 ..., H;;
2) table CT is changed with h-h(g,AjThe delta data of the every a line in) uses bayes method prediction, obtains the behavior of prediction Sequence PYh
3) according to formula rh=Cov (PYh,Yh)/(D(PYh)*D(Yh))1/2(wherein Cov (.) is covariance, and D (.) is variance) counts Calculate prediction behavior sequence PYhWith real behavior sequence YhCorrelation coefficient rh
4) judge whether to terminate?If it is not, jump to 2), calculate the correlation coefficient of next step-length;Otherwise, carry out Next step.
5) formula w is usedh=| rh|/Σ|ri| the correlation coefficient r that will obtain1,r2,...,rHNormalization, obtains predicting weight coefficient w1,w2,...,wH;Σ|ri| represent and correlation coefficient is sued for peace, i=1,2 ... H.
6) for every kind of behavior, each step change table uses Bayes's classification prediction, calculates its object function maxih (wh*Ph(Ci|X)/ΣkPh(Ck| X)) }, select to make the maximized behavior of result value as classification results.Wherein, CiRepresent every The behavior of kind;H=1 ..., H, represent the step number of change table.The relational expression of object function represents respectively on 1 to H step change table, Calculating behavior CiWeighting proportion in the probability of happening of all behaviors.
Forecasting Methodology in the present invention is divided into two steps: first generate corresponding change table according to the specific act of terrorism, Then a situation arises to predict this behavior in the change table generated.
In the present invention during the generation of change table affect decalage h represent background attribute change can h time cycle it Afterwards behavior property change is produced impact, and then uses the act of terrorism after bayes method prediction h step.And multistep pattra leaves This neutralizes prediction, considers the prediction case under the influence of 1 to h step decalage, makes final predicting the outcome.
The present invention mainly has a beneficial effect in terms of following two:
(1) in terms of prediction algorithm
The feature of higher-dimension small sample present in raw data set, causes the less effective of general forecast method.And Bayes side Method solves this problem and has natural advantage, it is possible to make a prediction fast and effectively.Finally, it is contemplated that the change of background is right The impact of behavior is not instantaneous, but within cycle regular hour, behavior can be produced long lasting effect.Therefore, algorithm Consider integrated forecasting organizational behavior under different time decalage.For every kind of behavior, calculate and use on each step change table Bayes's classification prediction obtains the probability of the behavior proportion sum in all classification results probability, selects to make result value The behavior of bigization is as classification results.
(2) in terms of change table generation
The change table improved stores background and the existing situation of change of behavior, makes bayes method can the most therefrom collect phase The change information closed.For new background change, bayes method uses certain method to calibrate, and becomes according to input background Change each element in vector and the influence degree of different classification results is carried out comprehensive descision such that it is able to change in arbitrary background The purpose of lower realization prediction behavior.And the decalage h that affects during changing the generation of table represents that the change of background attribute can be at h After the individual time cycle, behavior property change is produced impact, and then uses the act of terrorism after bayes method prediction h step.
Accompanying drawing explanation
Fig. 1 is the flow chart that in the present invention, the training module of multistep weighting Bayesian forecasting method calculates weight.
Fig. 2 is the flow chart using multistep weighting Bayesian forecasting method prediction module prediction organizational behavior in the present invention.
Detailed description of the invention
Below as a example by the background data subset shown in table 3, the multistep in conjunction with Fig. 1, Fig. 2 weights in bayes predictive model Weight calculation and behavior prediction flow process, describe the algorithm flow of the present invention in detail.
Table 3 is provided with eight fields altogether, is respectively labeled as Time, C1, C2, C3, C4, C5, C6 and A, wherein Time It is labeled as record time series in table, C1, C2, C3, C4, C5, C6}=CS (g) belong to background knowledge attribute, A belongs to behavior property.Whether purpose i.e. utilizes the generation of background knowledge prediction prediction act of terrorism A shown in table 3.
Specifically comprise the following steps that
(1) utilize the data genaration 1 step change table of table 3, obtain change table as shown in table 4.
(2) according to bayes method, change table is carried out statistical classification, obtains classification results as shown in table 5.
In table 5, use Bayes's classification need to calculate P (LA=0 | X) and P (LA=1 | X), the then size of class probability, will The class labelling of greater probability predicts the outcome as classification.Wherein, according to Bayes theorem, compare P (LA=0 | X) and The size of P (LA=1 | X) is equivalent to compare the size of P (X | LA=0) P (LA=0) and P (X | LA=1) P (LA=1).Wherein, P (X | LA=0) P (LA=0) and P (X | LA=1) P (LA=1) is illustrated respectively under environmental change vector X, and behavior is probability and the row of 0 For for 1 probability.
Use the result of 1 step change table prediction, be the behavior after prediction 1 time cycle of terroristic organization.For example, it is assumed that Current background is changed to: (0,0), (1,1), (0,1), (0,0), (1,0), (1,0), 0}, then the behavior of prediction next time cycle is 1, I.e. there is such terrorist activity.
(3) multistep weighting Bayes's integrated forecasting is used, it is assumed that given step number is 2.
First, method as shown in table 2, set up 1 step and 2 step change tables, result such as table 4, shown in table 6.
2. secondly, according to bayes method, 1 step and 2 step change tables are carried out statistical classification, obtain result such as table 5, table 7 Shown in.
The most then, use the behavior sequence that obtains of prediction respectively with real behavior sequence, calculate the correlation coefficient of each step, Completing normalization, as the weight of this step change table prediction, result is as shown in table 8.
When 4. predicting, it is assumed that current background change vector X is: { (0,0), (1,1), (0,1), (0,0), (1,0), (1,0), 0}, exist respectively Step change table often calculates P (LA=0 | X) and P (LA=1 | X), uses P (X | LA=0) P (LA=0) and P (X | LA=1) P (LA=1) equally Being replaced, result of calculation is as shown in table 9.
As LA=0, Σh(wh*Ph(Ci|X)/ΣkPh(Ck| X))=0.027*0.5+0.0610*0.5=0.044;
As LA=1, Σh(wh*Ph(Ci|X)/ΣkPh(Ck| X))=0.9730*0.5+0.9390*0.5=0.956;
Because 0.044 is less than 0.956, it was predicted that result is LA=1, and terrorist activity i.e. occurs.
The a series of detailed description of those listed above is only for illustrating of the feasibility embodiment of the present invention, it And be not used to limit the scope of the invention, all without departing from the skill of the present invention equivalent implementations made of spirit or change Should be included within the scope of the present invention.

Claims (4)

1. one kind utilizes the terroristic method of background variation prediction, it is characterised in that utilize the change between background and behavior Change contact prediction organizational behavior, comprise the steps:
(1) pretreatment of raw data set;Described initial data is by the essential information of terroristic organization, background knowledge and behavior Movable composition, extracts background knowledge and behavior, and the vector being marked as (CS (g), AS (g)) is right;Wherein CS (g)= (C1,C2,…,CM) represent the background attribute in data, AS (g)=(A1,A2,…,AN) represent the behavior property related in data;
In order to obtain the background subspace of different behavior, need initial data is done pretreatment, form (CS (g), Aj) N number of son Data set;
(2) for each behavior to be predicted in AS (g), the change table improved is generated;The change table of described improvement is a kind of Record organization behavior in time series, with the data store organisation of its background variation relation, represents that behavior is become by the change of background The impact changed, its storage content includes background and the existing situation of change of behavior;Described change table includes that 1 step change table is with many Step change table.
(3) utilize bayes method, 1 step generated or multistep change table calculate and predicts the outcome;
(4) use multistep weighting Bayesian model, the change table that 1 step to H walks is predicted respectively, and provides integrated forecasting Result.
One the most according to claim 1 utilizes the terroristic method of background variation prediction, it is characterised in that institute The method of generation change table in step (2) of stating includes: change table CT for integer h > 1, h-h(g,AjThe note of time period i in) Record the change from i to i+1 by background attribute change from time period i-h to i-h+1 and behavior property to produce.
One the most according to claim 1 utilizes the terroristic method of background variation prediction, it is characterised in that institute The realization stating step (3) includes: change table carries out statistical classification, calculates P (LAj| X), then according to behavior probability Size, using the class labelling of greater probability as classification results;Wherein X represents environmental change vector, and LA represents current time Behavior.
One the most according to claim 1 utilizes the terroristic method of background variation prediction, it is characterised in that step Suddenly the realization of (4) comprises the steps:
1) according to step number H, the change table CT of 1 to H step is builth(g,Aj), h=1 ..., H;
2) h-is used to change table CTh(g,AjThe delta data of the every a line in) uses bayes method prediction, obtains the row of prediction For sequence PYh
3) according to rh=Cov (PYh,Yh)/(D(PYh)*D(Yh))1/2;Wherein Cov (.) is covariance, and D (.) is variance, calculates pre- Survey behavior sequence PYhWith real behavior sequence YhCorrelation coefficient rh
4) judge whether to terminate, if it has not ended, then jump to 2), calculate the correlation coefficient of next step-length;Otherwise, Carry out next step.
5) formula w is usedh=| rh|/Σ|ri| the correlation coefficient r that will obtain1,r2,...,rHNormalization, obtains predicting weight coefficient w1,w2,...,wH
6) for every kind of behavior, each step change table uses Bayes's classification prediction, calculates its object function maxih (wh*Ph(Ci|X)/ΣkPh(Ck| X)) }, select to make the maximized behavior of result value as classification results;Wherein, CiRepresent every The behavior of kind;H=1 ..., H, represent the step number of change table;The relational expression of object function represents respectively on 1 to H step change table, Calculating behavior CiWeighting proportion in the probability of happening of all behaviors.
CN201610300731.7A 2016-05-04 2016-05-04 Method of predicting act of terror based on background change Pending CN105956982A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610300731.7A CN105956982A (en) 2016-05-04 2016-05-04 Method of predicting act of terror based on background change

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610300731.7A CN105956982A (en) 2016-05-04 2016-05-04 Method of predicting act of terror based on background change

Publications (1)

Publication Number Publication Date
CN105956982A true CN105956982A (en) 2016-09-21

Family

ID=56914087

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610300731.7A Pending CN105956982A (en) 2016-05-04 2016-05-04 Method of predicting act of terror based on background change

Country Status (1)

Country Link
CN (1) CN105956982A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106776884A (en) * 2016-11-30 2017-05-31 江苏大学 A kind of act of terrorism Forecasting Methodology that multi-categorizer is combined based on multi-tag
CN108776817A (en) * 2018-06-04 2018-11-09 孟玺 The type prediction method and system of the attack of terrorism
CN109685321A (en) * 2018-11-26 2019-04-26 山东师范大学 Event risk method for early warning, electronic equipment and medium based on data mining
CN110009022A (en) * 2019-03-26 2019-07-12 第四范式(北京)技术有限公司 Prediction technique, device and the calculating equipment of drug addict's information

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106776884A (en) * 2016-11-30 2017-05-31 江苏大学 A kind of act of terrorism Forecasting Methodology that multi-categorizer is combined based on multi-tag
CN106776884B (en) * 2016-11-30 2021-04-20 江苏大学 Terrorism prediction method based on multi-label combination and multi-classifier
CN108776817A (en) * 2018-06-04 2018-11-09 孟玺 The type prediction method and system of the attack of terrorism
CN109685321A (en) * 2018-11-26 2019-04-26 山东师范大学 Event risk method for early warning, electronic equipment and medium based on data mining
CN110009022A (en) * 2019-03-26 2019-07-12 第四范式(北京)技术有限公司 Prediction technique, device and the calculating equipment of drug addict's information

Similar Documents

Publication Publication Date Title
WO2022135265A1 (en) Failure warning and analysis method for reservoir dispatching rules under effects of climate change
Zhai et al. Doro: Distributional and outlier robust optimization
Li et al. Energy data generation with wasserstein deep convolutional generative adversarial networks
CN105956982A (en) Method of predicting act of terror based on background change
CN106776884A (en) A kind of act of terrorism Forecasting Methodology that multi-categorizer is combined based on multi-tag
Finke et al. Boosting mono-jet searches with model-agnostic machine learning
CN104899430A (en) Multisource example transfer learning-based terror act prediction method
Leigh et al. $\nu $-flows: Conditional neutrino regression
Leka et al. Solar flare forecasting: Present methods and challenges
Depeweg et al. Sensitivity analysis for predictive uncertainty in Bayesian neural networks
Ting et al. Mining of stock data: intra-and inter-stock pattern associative classification
Doostan et al. Predicting lightning-related outages in power distribution systems: A statistical approach
Riley et al. Surrogate forward models for population inference on compact binary mergers
Lima Junior et al. An experimental study of fitness function and time series forecasting using artificial neural networks
Graff et al. Modeling the swift bat trigger algorithm with machine learning
Hossain et al. Predicting the success of suicide terrorist attacks using different machine learning algorithms
Alshammari et al. Identifying Flare-indicative Photospheric Magnetic Field Parameters from Multivariate Time-series Data of Solar Active Regions
Li et al. Classify the Higgs decays with the PFN and ParticleNet at electron–positron colliders
Hou Time‐varying relationship between inflation and inflation uncertainty
CN103065047A (en) Terrorism behavior prediction method based on terrorist organization background knowledge subspace
Pasquato et al. Interpretable machine learning for finding intermediate-mass black holes
Gustian et al. Comparison data mining based on optimization algorithms in receiving electricity subsidies
Oltean et al. An econophysical approach of polynomial distribution applied to income and expenditure
Chierichini et al. CME Arrival Modeling with Machine Learning
Wang et al. Research on quantitative investment strategies based on deep learning algorithms in the context of the need for information management

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160921

RJ01 Rejection of invention patent application after publication