Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Judgment and identification method and system for suspicious violent and horrific person based on ontology identity features

A technology of identity characteristics and identification methods, which is applied in the identification method and system field of personnel suspected of violence and terrorism, can solve the problem of not considering the correlation of characteristic variables, and has not yet proposed a research and assessment model (classification and discrimination model) for personnel related to violence and terrorism

Inactive Publication Date: 2018-04-13
CHINESE PEOPLE'S PUBLIC SECURITY UNIVERSITY
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] From the current point of view, the analysis and judgment methods of the intelligence departments of the public security organs are still mainly focused on the analysis of the seven types of routine attention groups in the public security organs, and no research and judgment model (categorical discrimination model ), and the characteristic variables analyzed by the existing research and judgment model only consider the region, criminal record, age, gender, etc. of the object of interest. Possible correlation problems between

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Judgment and identification method and system for suspicious violent and horrific person based on ontology identity features
  • Judgment and identification method and system for suspicious violent and horrific person based on ontology identity features
  • Judgment and identification method and system for suspicious violent and horrific person based on ontology identity features

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The present invention will be further described in detail below in conjunction with the drawings and specific implementations of the specification.

[0060] figure 1 Shows the flow chart of the method for investigating and identifying persons suspected of violent terrorists based on ontology identity features provided in the specific embodiments of the present invention. The method mainly includes:

[0061] (1) For each object of interest, collect several ontology identity feature information, and define them as a corresponding ontology feature variable. The ontology feature variable is called feature variable for short;

[0062] According to research findings, if the identity feature information of the ontology is too little, when the identity feature information of the ontology is converted into feature variables by the dummy variable method, it is not conducive to the analysis and judgment of the possible correlation between the feature variables. However, if the ontology T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a judgment and identification method and system for a suspicious violent and horrific person based on ontology identity features. The method includes the following steps of: (1) collecting a plurality of ontology identity feature information for each object of interest and defining it as a corresponding ontology feature variable; (2) assigning the ontology feature variablesbased on the ontology identity feature information, and using a discretized variable assignment method; (3) building a training data set; and (4) using at least one data classification method for classification training of the training data set to construct a non-linear classifier. The method and system considers and analyzes the possible correlation between the feature variables of the object ofinterest, performs the discretized assignment of the feature variables, forms the training data and constructs a non-linear classifier accordingly, and accurately and efficiently discriminates the risk of persons involved in terrorism through the non-linear classifier.

Description

Technical field [0001] The present invention belongs to the field of public security intelligence technology. It is a method and system for researching and identifying key persons suspected of violent terrorism, and specifically relates to a method and system for researching, judging and identifying persons suspected of violent terrorism based on ontology identity characteristics. Based on the identity information of the object (the object of interest), it can be judged and identified whether it belongs to a person suspected of violent terrorism. Background technique [0002] In recent years, violent terrorist activities (violent terrorist activities) have become increasingly rampant, posing a great threat to social stability and public safety. For the intelligence departments of the public security organs, the use of intelligence analysis methods to find clues to violent and terrorist activities early, identify suspects of violent and terrorist activities, and deal with them in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06K9/62G06Q50/26
CPCG06Q50/26G06F18/2411G06F18/214
Inventor 陈鹏胡啸峰曾昭龙
Owner CHINESE PEOPLE'S PUBLIC SECURITY UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products