Criminal suspect comprehensive influence evaluation method based on social network analysis

A technology of criminal suspects and social networks, applied in the field of public security, can solve problems such as one-sidedness and single influence evaluation, and achieve a reasonable effect of the model

Pending Publication Date: 2020-05-29
NEW TECH APPL INST BEIJING CITY
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Among them, the comprehensive consideration of three centrality indicators and the addition of two time-influencing factors of criminal networks can solve the problem of single and one-sided evaluation of the influence of social network single centrality indicators on network nodes, making criminal suspects in criminal networks The evaluation of human influence is more comprehensive, reasonable and scientific

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Criminal suspect comprehensive influence evaluation method based on social network analysis
  • Criminal suspect comprehensive influence evaluation method based on social network analysis
  • Criminal suspect comprehensive influence evaluation method based on social network analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It can be understood that the specific implementation manners described here are only used to explain relevant content, rather than to limit the present invention. In addition, it should be noted that, for the convenience of description, only the parts related to the present invention are shown in the drawings.

[0072] It should be noted that, in the case of no conflict, the embodiments and features in the embodiments of the present invention can be combined with each other. The present invention will be described in detail below with reference to the drawings and in combination with embodiments.

[0073] The technical scheme adopted by the present invention to solve the technical problem is: construct a criminal network based on social network analysis, extract the point-degree centrality, betweenness centrality and proximity centrality index...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a criminal suspect comprehensive influence evaluation method based on social network analysis. The method includes: firstly, constructing a crime network based on social network analysis; secondly, extracting a criminal suspect influence primary evaluation index in the crime network; then, determining the weight of the centrality index by adopting an entropy method; finally, determining the weight of the criminal suspect intermediate centrality evaluation index and the weight of the criminal suspect influence intermediate time factor evaluation index through an entropyevaluation method, obtaining a criminal suspect comprehensive influence evaluation index, and ranking the comprehensive influence of the criminal suspect comprehensive influence evaluation index. According to the method, the problem that the influence evaluation of a single centrality index of an existing social network on network nodes is single and one-sided is solved, three centrality indexes are more comprehensively considered, and two time influence factors of a crime network are innovatively added, so that the influence evaluation of criminal suspects in the crime network is more comprehensive, reasonable and scientific.

Description

technical field [0001] The invention relates to the field of public security, in particular to a method for evaluating the influence of a criminal suspect, in particular to a method for evaluating the comprehensive influence of a criminal suspect based on social network analysis. Background technique [0002] In the field of public security research, multiple property crimes such as theft, fraud, snatching, and robbery have a large number of cases and a wide range of harm, and are closely related to the lives of the masses; become one of the important threats to social stability. The academic community has also paid great attention to the characteristic analysis and prevention of such crimes. [0003] According to the number of criminal members and their behavioral relationship, there are various forms of criminal organization, such as individual crime, joint crime, gang crime and criminal group. Among them, in gang crimes, criminal suspects are mostly gathered by blood, f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/06G06Q50/26G06F16/9536
CPCG06Q10/06393G06Q50/26G06F16/9536
Inventor 纪学玲曲寒冰王加强张艳芳
Owner NEW TECH APPL INST BEIJING CITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products