Criminal suspect mining association method and system based on social network analysis

A social network and suspect technology, applied in the field of public security crime network analysis, can solve problems such as no good solutions, and achieve good scalability, tight integration, and fast system operation

Active Publication Date: 2015-03-11
WEIHAI BEIYANG ELECTRIC GRP CO LTD BEIJING BRANCH
View PDF6 Cites 61 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, there is no good solution for how to output and display the community

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Criminal suspect mining association method and system based on social network analysis
  • Criminal suspect mining association method and system based on social network analysis
  • Criminal suspect mining association method and system based on social network analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0025] The technical solutions provided by the present invention will be described below in conjunction with the accompanying drawings and specific examples, using telephone communication records as input data.

[0026] The system involved in the present invention mainly includes four modules: a data analysis and extraction module, a social network building module, a community discovery module, and a result output module. When the system is working, each module performs the following work:

[0027] The data analysis and extraction module is mainly responsible for the extraction of key information. For telephone communication records, it is necessary to analyze the caller, receiver, call duration, total number of calls, call frequency and other data. After calculation and conversion, the output is structured Data, for any two people in the phone communication record, all call records between them will be converted into a piece of structured data, a piece of structured data conta...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a criminal suspect mining association method and a system based on social network analysis and is characterized in that the method comprises the following steps: pre-processing the user input data, extracting the key information from the input data; establishing the social network graph model; setting the parameter; executing the community discovery algorithm; outputting the discovery result and listing the criminal suspects; compared with the prior art, the method and the system have the beneficial effects as follows: the potential associated criminal suspect can be found from the social circle of the given criminal suspect, the method is good in performance and fast in system operation, by considering the requirement of the real scenes, good expansibility can be achieved for analyzing in the range appointed by the user.

Description

technical field [0001] The invention relates to the technical field of public security crime network analysis, in particular to a social network analysis-based method and system for mining associated criminal suspects based on social network data of known criminals. Background technique [0002] Humans are naturally social creatures, so human behavior is naturally social. Human behaviors such as choice and action are rooted in a huge social environment. Therefore, studying the role of social networks in criminal behavior has also become an important topic in the field of criminology. Existing studies have shown that social networks play an important auxiliary role in gang crimes. Furthermore, criminal social networks are not disjointed but are interwoven into a series of associations. For policy makers in public security departments, mining criminal information from social networks is becoming more and more important. [0003] As the demand for criminal network analysis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
CPCG06F16/95
Inventor 孙圣鹏张玉超高明张友春向俊敏夏俊玲
Owner WEIHAI BEIYANG ELECTRIC GRP CO LTD BEIJING BRANCH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products