Operator data-based public security case time-space analysis method and apparatus

A spatiotemporal analysis, operator technology, applied in data processing applications, electrical digital data processing, special data processing applications, etc., can solve problems such as coverage blind spots, achieve small blind spots, wide coverage, and improve the efficiency and quality of case solving. Effect

Inactive Publication Date: 2018-09-28
GUANGDONG ESHORE TECH
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the electronic fence system is mainly deployed in urban hotspots, the deployment scenarios include entrances and exits such as airports and railway stations, entertainment venues such as bars, KTVs, and Internet cafes, and entrances and exits of banks, hotels, government agencies, and residential quarters. areas with coverage blind spots

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operator data-based public security case time-space analysis method and apparatus
  • Operator data-based public security case time-space analysis method and apparatus
  • Operator data-based public security case time-space analysis method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] In a specific embodiment, the time-space analysis method for public security cases based on operator data further includes the steps,

[0052] S40: Verify the similarity between the suspect's action trajectory and the case's action trajectory, and if the similarity meets a certain threshold, list him as the final suspect and obtain a final list of suspects.

[0053] In this embodiment, the location information of the suspect at the time of the crime will be obtained based on the operator data, and the location information will be used to generate an action trajectory, which will then be compared with the case action trajectory. If the two trajectories have a high degree of similarity, their Listed as the final suspect, the similarity threshold here is 90% similarity.

Embodiment 2

[0055] In a specific embodiment, the step S30 specifically includes,

[0056] S31: Screen out the operator customers who appear within the error range of the crime location within the error range of the time of the crime;

[0057] S32: Screen out the operator customers who match the action track of the case within the time error range of the case, and obtain a list of suspects.

[0058] In this embodiment, the crime location is a fixed location value, including longitude and latitude information. The error range of the crime location is to make up for the error of the positioning accuracy of the base station, and the error range of the crime time is to make up for the difference between the time of the crime and the time of committing the crime. error.

Embodiment 3

[0060] see figure 2 , in a specific embodiment, the step S40 specifically includes,

[0061] S41: Obtain the location information of the suspect within the error range of the incident time;

[0062] S42: Form the suspect's action track according to the suspect's location information;

[0063] S43: Compare the similarity between the action trajectory of the suspect and the action trajectory of the case, list the suspects whose similarity is greater than a certain threshold as the final suspects, and obtain a list of final suspects.

[0064] In this embodiment, the latitude and longitude information of the suspect is obtained, and the latitude and longitude information is connected on the map according to the time sequence of the crime, and the action trajectory of the suspect is sequentially connected, and the action trajectory of the suspect is compared with the action trajectory of the case, which is satisfied. Suspects with similarity requirements are listed as final susp...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an operator data-based public security case time-space analysis method and apparatus. The method comprises the steps of obtaining occurrence information of serial cases, whereinthe occurrence information comprises occurrence time, occurrence places, occurrence time error ranges and occurrence place error ranges of the cases; according to a sequence of the occurrence time ofthe serial cases, sequentially connecting the occurrence places into a case action track on a map; and screening out operator clients occurring on the case action track in the occurrence time, and classifying the operator clients as suspects, thereby obtaining a suspect list. The method is based on operator data, so that the coverage range is wide and the blind area is small; the operator clientssatisfying the case action track are screened and classified as the suspects, so that the suspect check range is effectively narrowed, the case solving time is shortened, and the case solving efficiency and quality of public security organs are improved.

Description

technical field [0001] The invention relates to a method and device for time-space analysis of public security cases, in particular to a method and device for time-space analysis of public security cases based on operator data. Background technique [0002] With the trend of professionalization, teamwork, and migration of crimes becoming more and more obvious, among all kinds of criminal cases, the series of cases of property infringement account for a considerable proportion. The frequent occurrence of this series of cases has the most extensive impact on social security and the people The impact of the masses is the most specific and direct, and has become a prominent issue affecting social security across the country. How to quickly detect such cases has become the focus of social attention. [0003] The traditional means of detecting public security cases is to conduct on-site investigations, obtain video recordings, and interrogate witnesses, etc. The disadvantages are ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30G06Q50/26
CPCG06Q50/265
Inventor 倪峥余虎王亮孔祥凤余超杰赖守义
Owner GUANGDONG ESHORE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products