Method for digging related criminal suspect

A criminal suspect and related technology, which is applied to mine related criminal suspect fields in large-scale criminal networks, can solve the problems of strong randomness, lack of data accumulation, easy omission, etc., and achieve strong correlation and high accuracy Effect

Inactive Publication Date: 2013-01-30
ZHEJIANG UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Some of the existing mining systems and methods are too theoretical, or there are only methods but lack of certain data accumulation; some practical and high-performance methods can only deal with small and medium-sized criminal networks; and some for large-scale criminal networks tools and methods, only stay in the preliminary excavation or focus on the graphical display after manual processing, and only play an auxiliary role in excavation
These mining systems and mining methods are not efficient, rely on human analysis, are highly random, and are easy to miss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for digging related criminal suspect
  • Method for digging related criminal suspect
  • Method for digging related criminal suspect

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The system for mining related criminal suspects in the present invention mainly includes a related quantification module, a crime related function module and a node screening module.

[0034] 1. Associated quantization module

[0035] This module is responsible for the determination and quantification of association priorities. First of all, multiple public security business databases are integrated, and social personnel related information and criminals related information are combined to construct a criminal network; various related information between personnel are extracted from the network, such as: accomplices, hotel roommates, phone calls Call association, aircraft peer association, kinship association, colleague association, fellow country association, etc.; use the existing mature technology hierarchy analysis method (AHP) to determine the priority of each association in the network; map the priority to [0 , 1] space completes the quantification process; the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of network analysis for crime in public security, in particular to a system and a method thereof for identifying relevant criminal suspects. The system comprises a correlation quantification module, a criminal correlation function module and a node screening module. The invention further provides a method for identifying relevant criminal suspects: 1), finding a corresponding node of a main criminal suspect in a criminal network; 2), constructing a collection of correlative personnel; 3), expanding the correlation according to cross-correlation of personnel; 4), adding the expanded nodes with a criminal correlation coefficient value higher than a threshold value into the collection of the correlative personnel; 5), repeating step 3) and step 4) until no new node is added into the collection of correlative personnel or all nodes of the criminal network are expanded; and 6), selecting a quantitative node as a correlated suspect for investigation according to the ordering of the criminal correlation coefficient between each nodes and the main criminal suspect. The identifying system and the method thereof have the advantages that the efficiency is greatly improved, and the correlated criminals can be fully screened out.

Description

technical field [0001] The invention relates to the field of public security crime network analysis, in particular to a method for mining associated criminal suspects in a large-scale crime network. Background technique [0002] Since the 911 incident, the security departments of various countries have attached great importance to the collection of crime data and the construction of related databases, and have conducted a series of researches on data mining based on related databases. The analysis and mining of crime data starts with explicit data to find out some hidden and useful information. Extract relevant patterns from psychological, behavioral or other factors that may be hidden in the criminal network, so as to provide clues and assist in handling cases. At the same time, use the extracted feature patterns as much as possible in monitoring to achieve early warning. [0003] Data mining (Data Mining) aims to extract information and knowledge hidden in it, which peopl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F17/30G06F19/00
Inventor 吴朝晖夏超伦姜晓红
Owner ZHEJIANG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products