CN108241910A - A kind of Crime Spreading complex network node analysis method, apparatus and user terminal - Google Patents

A kind of Crime Spreading complex network node analysis method, apparatus and user terminal Download PDF

Info

Publication number
CN108241910A
CN108241910A CN201810074340.7A CN201810074340A CN108241910A CN 108241910 A CN108241910 A CN 108241910A CN 201810074340 A CN201810074340 A CN 201810074340A CN 108241910 A CN108241910 A CN 108241910A
Authority
CN
China
Prior art keywords
network
suspect
crime
node
vector
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810074340.7A
Other languages
Chinese (zh)
Inventor
姚佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hui He Science And Technology Development Co Ltd
Original Assignee
Guangdong Hui He Science And Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hui He Science And Technology Development Co Ltd filed Critical Guangdong Hui He Science And Technology Development Co Ltd
Priority to CN201810074340.7A priority Critical patent/CN108241910A/en
Publication of CN108241910A publication Critical patent/CN108241910A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Educational Administration (AREA)
  • General Health & Medical Sciences (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides a kind of Crime Spreading complex network node analysis method, apparatus and user terminal, wherein the method includes:Dynamic criminal network corresponding with the suspect is built according to the personal perimeter data of suspect and with the relation data of the suspect related personnel;It extracts the corresponding destination node feature of the suspect in the dynamic criminal network and vector is established according to the destination node feature;According to the destination node feature and the vector structure classification analysis model;The state supervision to the destination node is carried out based on the classification analysis model.Present invention realization obtains the analysis result of suspect by what the network topology change of destination node was analyzed, and analysis result is accurate, is that further the analysis to the peripheral information of suspect and investigation bring great convenience to case investigator.

Description

A kind of Crime Spreading complex network node analysis method, apparatus and user terminal
Technical field
The present invention relates to Complex Networks Analysis technical field, more specifically to a kind of Crime Spreading complex network knot Point analysis method, apparatus and user terminal.
Background technology
Complex network (Complex Network), refers to self-organizing, self similarity, attractor, worldlet, uncalibrated visual servo In partly or entirely property network.At present in Complex Networks Analysis, it is in the signature analysis of analysis complex network mostly, The aspect of the high level such as kinetic model.For in the method for crime analysis, there is also much from theoretical and experimental viewpoint phase Research is closed, but is still rested on based on questionnaire survey mostly, in the case of being subject to supplemented by the method for statistical analysis.
Although there are the analysis methods of Various Complex network now, still most of to be in excessively macroscopical, mainly for The high-level feature of some of network is analyzed, such as some statistical natures of network:Whether small-world network, rule are met Network, network node number of types, average path length, cluster coefficients etc..And the analysis for single node is actually rare.
In short, the existing analysis for crime complex network, only rests on questionnaire survey or Basic Statistics and Tables method On, it can not accomplish the analysis for single node, so as to which the accurate analysis result for suspect can not be obtained, to case Further the analysis to the peripheral information of suspect and investigation bring great inconvenience to investigator.
Invention content
In view of this, the present invention provide a kind of Crime Spreading complex network node analysis method, apparatus and user terminal with Solve the deficiencies in the prior art.
To solve the above problems, the present invention provides a kind of Crime Spreading complex network node analysis method, including:
It is built and the suspicion according to the personal perimeter data of suspect and with the relation data of the suspect related personnel Doubt the corresponding dynamic criminal network of people;
Extract the corresponding destination node feature of the suspect in the dynamic criminal network and according to the target knot Point feature establishes vector;
According to the destination node feature and the vector structure classification analysis model;
The state supervision to the destination node is carried out based on the classification analysis model.
Preferably, described " according to the destination node and the vector structure classification analysis model ", including:
In the dynamic criminal network, according to the vector of the destination node before and after crime, the mesh is obtained Mark the dynamic change characterization vector of node;
The crime vector of the suspect is built based on the dynamic change characterization vector;
According to the crime vector, classification analysis model is established.
Preferably, it is described " in the dynamic criminal network, according to the destination node before and after crime it is described to Amount obtains the dynamic change characterization vector of the destination node ", including:
In the dynamic criminal network, primary vector is built for destination node described before crime, for institute after crime State destination node structure secondary vector;
The difference of the secondary vector and the primary vector is calculated, the dynamic change for obtaining the destination node is special Sign vector.
Preferably, the described " relation data according to the personal perimeter data of suspect and with the suspect related personnel Structure dynamic criminal network corresponding with the suspect ", including:
The network topological diagram of the different time node of the suspect is built according to the personal perimeter data;
In the network topological diagram, the suspect and suspect related personnel setting to different time node State relation label;
According to the network topological diagram for including the state relation label, the different time node of the suspect is built The dynamic criminal network.
Preferably, the destination node feature includes network statistics feature, network path feature, network Sub-Image Feature, spy Determine service feature and the state relation label;
It is described " to extract the corresponding destination node feature of the suspect in the dynamic criminal network and according to the mesh Mark node feature and establish vector ", including:
According to default node degree, the network statistics in the dynamic criminal network in the default node degree is extracted Feature, the network path feature, the network Sub-Image Feature, the certain service features and the state relation label;
The network statistics feature, the network path feature, network in the dynamic criminal network Figure feature, the certain service features and the state relation label establish the corresponding vector of the destination node.
Preferably, described " state supervision to the destination node is carried out based on the classification analysis model ", including:
The classification analysis model of the destination node and the vector are analyzed, obtains the different time of the suspect The analysis result of node;
State supervision to the destination node is carried out according to the analysis result.
Preferably, the described " relation data according to the personal perimeter data of suspect and with the suspect related personnel Before structure dynamic criminal network corresponding with the suspect ", further include:
Obtain the personal perimeter data of the suspect;Obtain the pass of relationship between the related personnel and the suspect Coefficient evidence.
In addition, to solve the above problems, the present invention also provides a kind of Crime Spreading network node analytical equipment, including:Structure Model block, extraction module and supervision module;
The structure module, for the personal perimeter data according to suspect and the relationship with the suspect related personnel Data build dynamic criminal network corresponding with the suspect;
The extraction module, for extracting the corresponding destination node feature of the suspect in the dynamic criminal network And vector is established according to the destination node feature;
The structure module is additionally operable to according to the destination node feature and the vector structure classification analysis model;
The supervision module, for carrying out the state supervision to the destination node based on the classification analysis model.
In addition, to solve the above problems, the present invention also provides a kind of user terminal, including memory and processor, institute Memory is stated for storing Crime Spreading network node analysis program, the processor runs the Crime Spreading network node point Program is analysed so that the user terminal performs Crime Spreading complex network node analysis method as described above.
In addition, to solve the above problems, the present invention also provides a kind of computer readable storage medium, it is described computer-readable Crime Spreading network node analysis program is stored on storage medium, the Crime Spreading network node analysis program is by processor Crime Spreading complex network node analysis method as described above is realized during execution.
A kind of Crime Spreading complex network node analysis method, apparatus provided by the invention and user terminal.Wherein, this hair Bright provided method is started with from destination node, the dynamic relationship network with reference to residing for the specific node, various dimensions structure network Feature so as to analyze network topology change of the destination node before and after crime, is opened up so as to fulfill by the network of destination node That flutters mutation analysis obtains the analysis result of suspect, and analysis result is accurate, be case investigator further to crime The analysis and investigation of the peripheral information of suspect bring great convenience.
Description of the drawings
Fig. 1 is the hardware running environment that Crime Spreading complex network node analysis embodiment of the method scheme of the present invention is related to Structure diagram;
Fig. 2 is the flow diagram of Crime Spreading complex network node analysis method first embodiment of the present invention;
Fig. 3 is the flow diagram of Crime Spreading complex network node analysis method second embodiment of the present invention;
Fig. 4 is the flow diagram of Crime Spreading complex network node analysis method 3rd embodiment of the present invention;
Fig. 5 is the flow diagram of Crime Spreading complex network node analysis method fourth embodiment of the present invention;
Fig. 6 is the flow diagram of the 5th embodiment of Crime Spreading complex network node analysis method of the present invention;
Fig. 7 is the flow diagram of Crime Spreading complex network node analysis method sixth embodiment of the present invention;
Fig. 8 is network of personal connections before the suspect of the 7th embodiment of Crime Spreading complex network node analysis method of the present invention takes drugs Schematic diagram;
Fig. 9 is network of personal connections after the suspect of the 7th embodiment of Crime Spreading complex network node analysis method of the present invention takes drugs Schematic diagram;
Figure 10 is the flow diagram of the 7th embodiment of Crime Spreading complex network node analysis method of the present invention;
Figure 11 is the high-level schematic functional block diagram of Crime Spreading network node analytical equipment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, wherein same or similar label represents same or like from beginning to end Element or with same or like function element.
In addition, term " first ", " second " are only used for description purpose, and it is not intended that instruction or hint relative importance Or the implicit quantity for indicating indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include one or more this feature.In the description of the present invention, " multiple " are meant that two or more, Unless otherwise specifically defined.
In the present invention unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " etc. Term should be interpreted broadly, for example, it may be being fixedly connected or being detachably connected or integral;Can be that machinery connects It connects or is electrically connected;It can be directly connected, can also be indirectly connected by intermediary, can be in two elements The connection in portion or the interaction relationship of two elements.It for the ordinary skill in the art, can be according to specific feelings Condition understands the concrete meaning of above-mentioned term in the present invention.
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
As shown in Figure 1, the structure diagram of the hardware running environment of terminal that Fig. 1, which is the embodiment of the present invention, to be related to.
Terminal of the embodiment of the present invention can be PC or smart mobile phone, tablet computer, E-book reader, MP3 are broadcast Putting device, MP4 players, pocket computer etc. has the packaged type terminal device of display function.
As shown in Figure 1, the terminal can include:Processor 1001, such as CPU, network interface 1004, user interface 1003, memory 1005, communication bus 1002.Wherein, communication bus 1002 is used to implement the connection communication between these components. User interface 1003 can include display screen, input unit such as keyboard, remote controler, and optional user interface 1003 can also include Standard wireline interface and wireless interface.Network interface 1004 can optionally include standard wireline interface and wireless interface (such as WI-FI interfaces).Memory 1005 can be high-speed RAM memory or the memory of stabilization, such as magnetic disk storage. Memory 1005 optionally can also be the storage device independently of aforementioned processor 1001.
Optionally, terminal can also include camera, RF (Radio Frequency, radio frequency) circuit, sensor, audio Circuit, WiFi module etc..In addition, mobile terminal can also configure gyroscope, barometer, hygrometer, thermometer, infrared ray sensing The other sensors such as device, details are not described herein.
It will be understood by those skilled in the art that the restriction of the terminal shown in Fig. 1 not structure paired terminal, can include than It illustrates more or fewer components and either combines certain components or different components arrangement.
As shown in Figure 1, as operating system, number can be included in a kind of memory 1005 of computer readable storage medium According to interface control program, network attachment procedure and Crime Spreading network node analysis program.
A kind of Crime Spreading complex network node analysis method, apparatus provided by the invention and user terminal.Wherein, it is described Method realization obtains the analysis result of suspect by what the network topology change of destination node was analyzed, and analysis result is accurate Really, for case investigator, further the analysis to the peripheral information of suspect and investigation bring great convenience.
Embodiment 1:
With reference to Fig. 2, first embodiment of the invention provides a kind of Crime Spreading complex network node analysis method, including:
Step S100 is built according to the personal perimeter data of suspect and with the relation data of the suspect related personnel Dynamic criminal network corresponding with the suspect.
Above-mentioned, the suspicion artificially needs to be analyzed the target that is retrieved of investigation, suspect or other with The related related personnel of this case.
It is above-mentioned, personal perimeter data, for can be collected on network with the relevant all data of suspect, can include It is related to the various aspects such as the clothing, food, lodging and transportion -- basic necessities of life of suspect, such as traffic data, personal information etc..
Above-mentioned, the suspect related personnel is and the relevant different crowd of suspect, such as relative, friend and suspicion People has the people of debt and credit relationship, the object clashed etc..
Above-mentioned, relation data can include relationship situation between related personnel and suspect, for example, relationship, borrowing Loan relationship, lovers' relationship, conjugal relation etc..
Above-mentioned, dynamic relationship network can include the suspect of different time and the relationship change of different related personnel, Such as suspect Xiao Ming is with small red for lovers' relationship before crime, after crime, Xiao Ming with it is small red for conjugal relation, can be closed in dynamic It is to be shown in network.
It is above-mentioned, different time section is built according to the relation data between the personal perimeter data of suspect and related personnel The dynamic criminal network of the suspect of point, by the dynamic criminal network would know that the different time node of the suspect from it is different Relationship and variation between related personnel.
Step S200 extracts the corresponding destination node feature of the suspect in the dynamic criminal network and according to institute It states destination node feature and establishes vector.
It is above-mentioned, after the dynamic criminal network is built, based on the dynamic criminal network, extract the corresponding mesh of suspect Node feature is marked, and a vector is formed to the particular network of destination node according to destination node feature.
Above-mentioned, destination node is specific people, can be the related personnel of suspect, or suspect is in itself.
It is above-mentioned, it is to be understood that in mathematics, vector (also referred to as Euclid's vector, geometric vector, vector) refers to Amount with size (magnitude) and direction.It is expressed as line segment with the arrow with can visualizing.Arrow is signified:It represents The direction of vector;Line segment length:The size of representation vector.
Step S300, according to the destination node feature and the vector structure classification analysis model.
It is above-mentioned, the destination node feature and vector of destination node are calculated, it, should so as to build classification analysis model Model can be LR models, Multiple regression model.
It is above-mentioned, it is to be understood that logistic, which is returned, is also known as logistic (logistic) regression analysis, is mainly flowing Row disease learn in using more, more commonly used situation is to explore the risk factor of certain disease, certain disease is predicted according to risk factor Probability of generation, etc..For example, wanting to inquire into the risk factor that gastric cancer occurs, two groups of crowds can be selected, one group is gastric cancer group, One group is non-gastric cancer group, and two groups of crowds have different signs and life style etc. certainly.Here dependent variable is just whether gastric cancer, That is "Yes" or "No", is two classified variables, and independent variable can be including it is enough, such as age, gender, eating habit, pylorus Pylori (Hp) infection etc..Independent variable is either continuous or classification.Pass through logistic regression analyses, it is possible to It is the risk factor of gastric cancer substantially to recognize which factor of bottom.In the present embodiment, it is mainly used for forecast analysis to judge and find Correlative factor.
Step S400 carries out the state supervision to the destination node based on the classification analysis model.
It is above-mentioned, the analysis result of the different time points of suspect is known according to classification analysis model, can according to the result into Row is to the real-time oversight of the node state of suspect.
The Crime Spreading complex network node analysis method that the present embodiment is provided is started with from destination node, specific with reference to this Dynamic relationship network residing for node, various dimensions structure network characterization, so as to analyze network of the destination node before and after crime Change in topology obtains the analysis result of suspect so as to fulfill what is analyzed by the network topology change of destination node, point It is accurate to analyse result, is that further the analysis to the peripheral information of suspect and investigation bring great side to case investigator Just.
Embodiment 2:
With reference to Fig. 3, second embodiment of the invention provides a kind of Crime Spreading complex network node analysis method, based on above-mentioned First embodiment shown in Fig. 2, the step S300 " according to the destination node and the vector structure classification analysis model ", Including:
Step S310 in the dynamic criminal network, according to the vector of the destination node before and after crime, is obtained To the dynamic change characterization vector of the destination node;
It is above-mentioned, the vector of the destination node before and after crime is calculated, so as to obtain variation characteristic vector.
Step S320 builds the crime vector of the suspect based on the dynamic change characterization vector;
It is above-mentioned, according to variation characteristic vector all crime node, that is, criminals are carried out with the structure of crime vector.
Step S330 according to the crime vector, establishes classification analysis model.
After the crime vector is constructed, this base of a fruit regression model of construction logic, wherein, the positive sample in model is from just The collection of illustrative plates variation of ordinary person's different time.In the present embodiment, it is moved by the vector according to node in dynamic criminal network State variation characteristic vector, and then crime vector is obtained, and classification analysis model is established according to crime vector, in order to according to this point The implementation that alanysis model carries out suspect node state is supervised.
Embodiment 3:
With reference to Fig. 4, third embodiment of the invention provides a kind of Crime Spreading complex network node analysis method, based on above-mentioned Second embodiment shown in Fig. 3, the step S310 is " in the dynamic criminal network, according to the target before and after crime The vector of node obtains the dynamic change characterization vector of the destination node ", including:
In the dynamic criminal network, primary vector is built for destination node described before crime by step S311, for The destination node structure secondary vector after crime;
Step S312 calculates the difference of the secondary vector and the primary vector, obtains the described of the destination node Dynamic change characterization vector.
It is above-mentioned, it is V1 for the destination node structure primary vector before crime, for the destination node structure the after crime Two vectors are V2.During calculating, pass through the dynamic change characterization vector V3 of V2-V1=V3, as criminal network.
Embodiment 4:
With reference to Fig. 5, fourth embodiment of the invention provides a kind of Crime Spreading complex network node analysis method, based on above-mentioned First embodiment shown in Fig. 2, the step S100 " according to the personal perimeter data of suspect and with suspect's relevant people The relation data of member builds dynamic criminal network corresponding with the suspect ", including:
Step S110 builds the network topology of the different time node of the suspect according to the personal perimeter data Figure;
It is above-mentioned, network topological diagram is built, wherein, the attribute comprising destination node and personal periphery in the network topological diagram Data, for example, can include but is not limited to fund, permanent residence, home background, cause situation, age, gender, educational background, disease letter Breath, previous conviction etc..
Step S120, in the network topological diagram, the suspect and suspect's phase to different time node Pass personnel set state relation label;
Above-mentioned, the personal perimeter data based on collection, carrying out labeling to the node in network topological diagram, (all labels are all It is built by personal perimeter data, concrete operation method is the presetting method of weight.For example, judge rich two generations Standard is:Father/mother's assets be more than 5,000 ten thousand, frequently borrow money, frequent Capital Flow, vagrant, Fu Erdai, teenager, family Front yard violence, single-parent family, cause baffle.
It is above-mentioned, carry out labeling to relationship, the content of labeling can include but is not limited to Capital Flow, kinship, Commensurate, same to house, same to historical background (commiting a crime together, same to school), position co-occurrence (co-occurrences such as hotel, Internet bar), telephonic communication etc. Deng.
Step S130 according to the network topological diagram for including the state relation label, builds the suspect not With the dynamic criminal network of timing node.
According to network topological diagram, the dynamic criminal network of suspect's different time node is built, constructs dynamic crime net Network, has also just built the association attributes of people, and then constructs interpersonal relationship, can be understood by correlativity, divided Analyse the situation of suspect or destination node.
Embodiment 5:
With reference to Fig. 6, fifth embodiment of the invention provides a kind of Crime Spreading complex network node analysis method, based on above-mentioned First embodiment shown in Fig. 2, it is special that the destination node feature includes network statistics feature, network path feature, network subgraph Sign, certain service features and the state relation label;
The step S200 " extracts the corresponding destination node feature of the suspect and root in the dynamic criminal network Vector is established according to the destination node feature ", including:
Step S210 according to default node degree, extracts the institute in the dynamic criminal network in the default node degree Network statistics feature, the network path feature, the network Sub-Image Feature, the certain service features and the state is stated to close It is label;
It is above-mentioned, it is to be understood that node degree is the subtree number that node possesses;For example, the degree of A is 3.Common data knot Structure includes linear list, queue, stack, tree etc..Tree is n (n>0) (in other words, tree is made of the finite aggregate of a node node ).It is known as empty tree as n=0.In any non-empty tree:1st, the node of one and only one root for being known as the tree;2nd, except root knot Remaining node except point can be divided into limited mutually incoherent set, and wherein each set is again in itself one tree, is claimed Subtree for root.This is a recursive definition, i.e., has used tree again in the definition of tree.The definition of tree shows the characteristic of tree, I.e. one tree is made of root node and several stalk trees, and subtree can be made of several smaller subtrees.In tree Each node is the root node of a certain stalk tree in the tree.
Above-mentioned, in the present embodiment, default node degree is set as more than 5 1-5 or, can according to specific operational data amount into Adjustment of the row to default node degree.
It is above-mentioned, in the dynamic criminal network, for default node degree (from 1 to 5, the maximum number of degrees can change) respectively Extract following network statistics feature:Network node number of types, cluster coefficients, average in-degree, averages out average path length Degree, degree cluster Relativity of Coefficients, matches together property, is different with property, node betweenness, side betweenness etc. at network resilience.
It is above-mentioned, in the dynamic criminal network, for default node degree (from 1 to 5, the maximum number of degrees can change) respectively Network path feature is extracted, path is built-up by the label on side.
It is above-mentioned, in the dynamic criminal network, for default node degree (from 1 to 5, the maximum number of degrees can change) respectively Network Sub-Image Feature is extracted, subgraph is built-up by mulitpath.
It is above-mentioned, in the dynamic criminal network, for default node degree (from 1 to 5, the maximum number of degrees can change), take out Take certain service features:For example, being vagrant's ratio in default node degree, crime ratio etc. in node degree is preset.
It is above-mentioned, in the dynamic criminal network in, extract state relation label as feature, such as age, fund etc..
Step S220, the network statistics feature, the network path feature in the dynamic criminal network, institute It states network Sub-Image Feature, the certain service features and the state relation label and establishes the corresponding vector of the destination node.
It is special by the network statistics feature, the network path feature, the network Sub-Image Feature, the specific transactions Seek peace the feature of state relation label structure, a vector formed to the particular network of destination node, as establish described in The corresponding vector of destination node.
Embodiment 6:
With reference to Fig. 7, fifth embodiment of the invention provides a kind of Crime Spreading complex network node analysis method, based on above-mentioned First embodiment shown in Fig. 2, the step S400 " carry out the state to the destination node based on the classification analysis model Supervision ", including:
Step S410 analyzes the classification analysis model of the destination node and the vector, obtains the suspect Different time node analysis result;
Step S420 carries out the state supervision to the destination node according to the analysis result.
It is above-mentioned, for the vector corresponding to the obtained classification analysis model and destination node, can be analyzed The analysis result of different time node is obtained afterwards, and the state supervision to the destination node is carried out according to the analysis result.
Step S100 " the relation datas according to the personal perimeter data of suspect and with the suspect related personnel Before structure dynamic criminal network corresponding with the suspect ", further include:
Step S500 obtains the personal perimeter data of the suspect;Obtain the related personnel and the suspect it Between relationship relation data.
Above-mentioned, it is personal multi-faceted data to obtain personal perimeter data, such as:Bank data information, is sent at account information Institute's information, archive information, information for hospital, cellphone information, mobile phone location information, hotel information, trip information, drugs flow-data Etc..
Embodiment 7:
With reference to Fig. 8-10, a kind of Crime Spreading complex network node analysis side provided in order to better understand the present invention Method provides the 7th embodiment and algorithm in method flow provided by the present invention and flow is illustrated:
Following situation can be seen that by Fig. 8 and Fig. 9:
Before drug abuse, Xiao Ming often occurs with lover inside family, also often strolls store together.Also ex-colleague can be invited to come Family is played.And after drug abuse, Xiao Ming and lover needless to say together, often meet with Li Si in hotel instead, but also pass through Often collect money from the audience to Li Si.It can be evident that the variation of network collection of illustrative plates before and after taking drugs in fact, and this is also effective differentiates generally Personnel are changed into the important feature of drug addict.
With reference to figure 10, the carry out latent structure and model construction method in Complex Networks Analysis are as follows:
1st, tectonic network statistical nature.It can include but is not limited to network node number of types, average path length, cluster system Number, average in-degree, average out-degree, network resilience, degree cluster Relativity of Coefficients, with property, different with property, node betweenness, side betweenness etc. Deng.In addition to conventional network characterization set forth above, the relevant network characterization of business is may be incorporated into, such as:Xiao Ming's is default Whether there are the malicious personnel of suction (dealer) inside the circle of node degree, whether be mostly vagrant inside the default node degree circle of Xiao Ming, Whether the default node degree circle of Xiao Ming is often with vagrant's co-occurrence etc..
2nd, tectonic network route characteristic.And during route characteristic is constructed, structure destination node is first attempted to figure It composes the path of arbitrary node, and then carries out certain association analysis (AP FP algorithms), analyze some most frequent paths, so After further assessed, select some most significant paths as feature.It is above-mentioned, it is described to be characterized as discretized features, i.e., Whether there is 0/1.
The process of path configuration can include following flow:
Step 1, all nodes are selected as starting point, select all nodes in the default node degree of starting point as knot Spot then looks for shortest path (path represents with relationship, more relationship separated by commas, per once using | separate).It takes drugs Before, once:Lover, Chang Gongxian is in market, and Chang Gongxian is in family;Old colleague, Chang Gongxian is in family;Two degree:Old colleague, Chang Gongxian In family;Same primary school, shallow bid stablize Capital Flow.After drug abuse, once:Lover;Old colleague, Chang Gongxian is in hotel, shallow bid fund Steady flow;Two degree:Old colleague, Chang Gongxian is in hotel, shallow bid fund steady flow;Same primary school, middle stock gold steady flow.
Step 2, since path is excessive, many relationships are useless relationship in fact on path, so needing for path Analysis is associated, finds some subpaths frequently occurred in path.In addition, it is different more to may be based on other methods searching Shortest path feature, for example, path vectorization the methods of.
Step 3, frequent subpath is screened, finally determines available route characteristic for experiment.
Step 4, step 2 and step 3 process is repeated, iterate path optimizing feature.
3rd, tectonic network Sub-Image Feature.Combination (be similar to route characteristic construct) of the subgraph for multipath.But due to more The combination in path may some search spaces it is excessive, can search space be reduced by experience, so as to reduce operand, such as Only look for common classic map:Y type figures, circular chart, Centered Graphs etc..
In addition, network characterization can also include other personal attribute's features, such as personal label and personal attribute etc..
4th, it after it can construct the feature vector of specific node, needs to before drug abuse, the feature vector after drug abuse carries out It is jointly processed by and (such as subtracting each other), as the last feature (dynamic change for representing feature) of sample, while labeled as positive sample.And For the construction of negative sample, the latent structure of negative sample is implemented as by the network of the different time span of normal person.
5th, after sample is got, correlated characteristic is as got, can further be learnt using disaggregated model, from And the information needed.
In addition, with reference to Figure 11, the present invention also provides a kind of Crime Spreading network node analytical equipment, including:Including:Structure Module 10, extraction module 20 and supervision module 30;
The structure module 10, for the personal perimeter data according to suspect and the pass with the suspect related personnel Coefficient is according to structure dynamic criminal network corresponding with the suspect;
The extraction module 20, it is special for extracting the corresponding destination node of the suspect in the dynamic criminal network It levies and vector is established according to the destination node feature;
The structure module 30 is additionally operable to according to the destination node feature and the vector structure classification analysis model;
The supervision module, for carrying out the state supervision to the destination node based on the classification analysis model.
In addition, the present invention also provides a kind of user terminal, including memory and processor, the memory is used to store Crime Spreading network node analysis program, the processor run the Crime Spreading network node analysis program so that the use Family terminal performs Crime Spreading complex network node analysis method as described above.
In addition, the present invention also provides a kind of computer readable storage medium, stored on the computer readable storage medium There is Crime Spreading network node analysis program, realized as above when the Crime Spreading network node analysis program is executed by processor State the Crime Spreading complex network node analysis method.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or system including a series of elements not only include those elements, and And it further includes other elements that are not explicitly listed or further includes intrinsic for this process, method, article or system institute Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this Also there are other identical elements in the process of element, method, article or system.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be embodied in the form of software product, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions use so that a station terminal equipment (can be mobile phone, Computer, server or network equipment etc.) perform method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow shift that bright specification and accompanying drawing content are made directly or indirectly is used in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

  1. A kind of 1. Crime Spreading complex network node analysis method, which is characterized in that including:
    It is built and the suspect according to the personal perimeter data of suspect and with the relation data of the suspect related personnel Corresponding dynamic criminal network;
    Extract the corresponding destination node feature of the suspect in the dynamic criminal network and according to destination node spy Sign establishes vector;
    According to the destination node feature and the vector structure classification analysis model;
    The state supervision to the destination node is carried out based on the classification analysis model.
  2. 2. Crime Spreading complex network node analysis method as described in claim 1, which is characterized in that described " according to the mesh Mark node and the vector structure classification analysis model ", including:
    In the dynamic criminal network, according to the vector of the destination node before and after crime, the target knot is obtained The dynamic change characterization vector of point;
    The crime vector of the suspect is built based on the dynamic change characterization vector;
    According to the crime vector, classification analysis model is established.
  3. 3. Crime Spreading complex network node analysis method as claimed in claim 2, which is characterized in that described " in the dynamic In criminal network, according to the vector of the destination node before and after crime, the dynamic change for obtaining the destination node is special Sign vector ", including:
    In the dynamic criminal network, primary vector is built for destination node described before crime, for mesh described after crime Mark node structure secondary vector;
    Calculate the difference of the secondary vector and the primary vector, obtain the dynamic change characterization of the destination node to Amount.
  4. 4. Crime Spreading complex network node analysis method as described in claim 1, which is characterized in that described " according to suspect Personal perimeter data and build dynamic crime corresponding with the suspect with the relation data of the suspect related personnel Network ", including:
    The network topological diagram of the different time node of the suspect is built according to the personal perimeter data;
    In the network topological diagram, the suspect and the suspect related personnel to different time node set state Relational tags;
    According to the network topological diagram for including the state relation label, the institute of the different time node of the suspect is built State dynamic criminal network.
  5. 5. Crime Spreading complex network node analysis method as claimed in claim 4, which is characterized in that
    The destination node feature include network statistics feature, network path feature, network Sub-Image Feature, certain service features and The state relation label;
    It is described " to extract the corresponding destination node feature of the suspect in the dynamic criminal network and according to the target knot Point feature establishes vector ", including:
    According to default node degree, the network statistics extracted in the dynamic criminal network in the default node degree is special Sign, the network path feature, the network Sub-Image Feature, the certain service features and the state relation label;
    The network statistics feature, the network path feature, the network subgraph in the dynamic criminal network is special Sign, the certain service features and the state relation label establish the corresponding vector of the destination node.
  6. 6. Crime Spreading complex network node analysis method as described in claim 1, which is characterized in that described " based on described point Alanysis model carries out the state supervision to the destination node ", including:
    The classification analysis model of the destination node and the vector are analyzed, obtains the different time node of the suspect Analysis result;
    State supervision to the destination node is carried out according to the analysis result.
  7. 7. the Crime Spreading complex network node analysis method as described in claim any one of the 1-6, which is characterized in that " root It is built according to the personal perimeter data of suspect and with the relation data of the suspect related personnel corresponding with the suspect Before dynamic criminal network ", further include:
    Obtain the personal perimeter data of the suspect;Obtain the relationship number of relationship between the related personnel and the suspect According to.
  8. 8. a kind of Crime Spreading network node analytical equipment, which is characterized in that including:Build module, extraction module and supervision mould Block;
    The structure module, for the personal perimeter data according to suspect and the relation data with the suspect related personnel Structure dynamic criminal network corresponding with the suspect;
    The extraction module, for extracting the corresponding destination node feature of the suspect in the dynamic criminal network and root Vector is established according to the destination node feature;
    The structure module is additionally operable to according to the destination node feature and the vector structure classification analysis model;
    The supervision module, for carrying out the state supervision to the destination node based on the classification analysis model.
  9. 9. a kind of user terminal, which is characterized in that including memory and processor, the memory is used to store Crime Spreading Network node analysis program, the processor run the Crime Spreading network node analysis program so that the user terminal is held Row Crime Spreading complex network node analysis method as described in any one of claim 1-7.
  10. 10. a kind of computer readable storage medium, which is characterized in that crime is stored on the computer readable storage medium and is passed Network node analysis program is broadcast, such as claim 1- is realized when the Crime Spreading network node analysis program is executed by processor Any one of 7 Crime Spreading complex network node analysis methods.
CN201810074340.7A 2018-01-25 2018-01-25 A kind of Crime Spreading complex network node analysis method, apparatus and user terminal Pending CN108241910A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810074340.7A CN108241910A (en) 2018-01-25 2018-01-25 A kind of Crime Spreading complex network node analysis method, apparatus and user terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810074340.7A CN108241910A (en) 2018-01-25 2018-01-25 A kind of Crime Spreading complex network node analysis method, apparatus and user terminal

Publications (1)

Publication Number Publication Date
CN108241910A true CN108241910A (en) 2018-07-03

Family

ID=62698584

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810074340.7A Pending CN108241910A (en) 2018-01-25 2018-01-25 A kind of Crime Spreading complex network node analysis method, apparatus and user terminal

Country Status (1)

Country Link
CN (1) CN108241910A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059912A (en) * 2019-02-20 2019-07-26 国网浙江省电力有限公司杭州供电公司 Honest risk hidden danger panorama management-control method and device based on wisdom map

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003052621A1 (en) * 2001-12-14 2003-06-26 The Primiter Group, Llc System for identifying data relationships
CN104408149A (en) * 2014-12-04 2015-03-11 威海北洋电气集团股份有限公司 Criminal suspect mining association method and system based on social network analysis
CN105678428A (en) * 2016-01-28 2016-06-15 温州职业技术学院 Criminal suspicion probability prediction method and system
CN106096623A (en) * 2016-05-25 2016-11-09 中山大学 A kind of crime identifies and Forecasting Methodology
CN107248054A (en) * 2017-06-02 2017-10-13 河北斯博思创新科技有限公司 A kind of complex relationship network data visual analysis method based on the malicious industry of easy system
CN107423434A (en) * 2017-08-03 2017-12-01 航天科工智慧产业发展有限公司 A kind of method for digging of the potential social relation network based on call bill data

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003052621A1 (en) * 2001-12-14 2003-06-26 The Primiter Group, Llc System for identifying data relationships
CN104408149A (en) * 2014-12-04 2015-03-11 威海北洋电气集团股份有限公司 Criminal suspect mining association method and system based on social network analysis
CN105678428A (en) * 2016-01-28 2016-06-15 温州职业技术学院 Criminal suspicion probability prediction method and system
CN106096623A (en) * 2016-05-25 2016-11-09 中山大学 A kind of crime identifies and Forecasting Methodology
CN107248054A (en) * 2017-06-02 2017-10-13 河北斯博思创新科技有限公司 A kind of complex relationship network data visual analysis method based on the malicious industry of easy system
CN107423434A (en) * 2017-08-03 2017-12-01 航天科工智慧产业发展有限公司 A kind of method for digging of the potential social relation network based on call bill data

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
杜益虹等: "基于logistics回归的犯罪概率预测研究", 《绍兴文理学院学报》 *
韦立华等: "犯罪预测动态回归分析方法", 《江苏警官学院学报》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059912A (en) * 2019-02-20 2019-07-26 国网浙江省电力有限公司杭州供电公司 Honest risk hidden danger panorama management-control method and device based on wisdom map

Similar Documents

Publication Publication Date Title
CN107688823B (en) A kind of characteristics of image acquisition methods and device, electronic equipment
CN103038777B (en) For the method and apparatus analyzing and detecting Malware
Davis et al. Multi-relational link prediction in heterogeneous information networks
CN110532451A (en) Search method and device for policy text, storage medium, electronic device
CN109145219A (en) Point of interest Effective judgement method and apparatus based on internet text mining
KR102177412B1 (en) System and Method for Matching Similarity between Image and Text
US11663282B2 (en) Taxonomy-based system for discovering and annotating geofences from geo-referenced data
US11687716B2 (en) Machine-learning techniques for augmenting electronic documents with data-verification indicators
JPWO2006087854A1 (en) Information classification device, information classification method, information classification program, information classification system
CN107273416B (en) Webpage hidden link detection method and device and computer readable storage medium
US20090063372A1 (en) Context inference system and method thereof
CN105531701A (en) Personalized trending image search suggestion
CN110580489B (en) Data object classification system, method and equipment
CN108171191A (en) For detecting the method and apparatus of face
CN106537387B (en) Retrieval/storage image associated with event
Yong et al. Discovery of small protein complexes from PPI networks with size-specific supervised weighting
WO2022152009A1 (en) Target detection method and apparatus, and device and storage medium
CN111400615A (en) Resource recommendation method, device, equipment and storage medium
CN107665232A (en) Detect the method for similar application and its electronic installation of adaptation
Edwine et al. Detecting the risk of customer churn in telecom sector: a comparative study
Namdarpour et al. Using genetic programming on GPS trajectories for travel mode detection
CN108241910A (en) A kind of Crime Spreading complex network node analysis method, apparatus and user terminal
Ichimura et al. A generation method of filtering rules of Twitter via smartphone based Participatory Sensing system for tourist by interactive GHSOM and C4. 5
WO2023143570A1 (en) Connection relationship prediction method and related device
Yu et al. Level set based coverage holes detection and holes healing scheme in hybrid sensor network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180703