ICM优秀论文Word文档下载推荐.docx

上传人:b****2 文档编号:6122560 上传时间:2023-05-06 格式:DOCX 页数:21 大小:435.22KB
下载 相关 举报
ICM优秀论文Word文档下载推荐.docx_第1页
第1页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第2页
第2页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第3页
第3页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第4页
第4页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第5页
第5页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第6页
第6页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第7页
第7页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第8页
第8页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第9页
第9页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第10页
第10页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第11页
第11页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第12页
第12页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第13页
第13页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第14页
第14页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第15页
第15页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第16页
第16页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第17页
第17页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第18页
第18页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第19页
第19页 / 共21页
ICM优秀论文Word文档下载推荐.docx_第20页
第20页 / 共21页
亲,该文档总共21页,到这儿已超出免费预览范围,如果喜欢就下载吧!
下载资源
资源描述

ICM优秀论文Word文档下载推荐.docx

《ICM优秀论文Word文档下载推荐.docx》由会员分享,可在线阅读,更多相关《ICM优秀论文Word文档下载推荐.docx(21页珍藏版)》请在冰点文库上搜索。

ICM优秀论文Word文档下载推荐.docx

we 

establish 

model 

identifyingsuspects 

leader 

based 

on 

theory 

of 

centricity. 

We 

take 

three 

factors 

into 

consideration 

which 

are 

degree 

centrality, 

betweenness 

centrality 

and 

closeness 

to 

evaluate 

every 

possible 

suspect. 

And 

introduce 

comprehensive 

index 

ultimately 

crime 

group 

Gretchen.

Forproblemtwo,thispaperappliesthefuzzyevaluationmodeloftheproblemone.Itcomesoutthatthemostlikelyconspiratorsare16,81,51,56,33,57,60,28,10,79,69,13,17,15.Thecompleteprioritylistandotherdetailsofrequirement2areshowedinthepaper.

Forproblemthree,thispaperbuildsaweightedsocialnetwork---semanticnetworkonthebasisofthedemandtooptimizationthemodelwhichhasbeenestablished.Weusetherelationshipbetweenconceptsandpropertiestodefineaapplicablesemanticnetworktothecurrentcase.Thenfixingweightvaluestoeachtopicaccordingtothespecificcontentofnewsanditscontext.Finally,usingtextanalysistolearnthetopicfurthertoovercomethedefectscausedbythedataelementsinthemodel.

Atlast,thestrengthandweaknessofourmodelarediscussedandthefutureworkispointedaswell.

 

Keywords:

fuzzyevaluationmodel;

socialnetworkanalysis(SNA);

semanticnetwork;

textanalysis;

theory 

centricity

1.Introduction

1.1Problembackground

Yourorganization,theIntergalacticCrimeModelers(ICM),isinvestigatingaconspiracytocommitacriminalact.Theinvestigatorsarehighlyconfidenttheyknowseveralmembersoftheconspiracy,buthopetoidentifytheothermembersandtheleadersbeforetheymakearrests.Theconspiratorsandthepossiblesuspectedconspiratorsallworkforthesamecompanyinalargeofficecomplex.Thecompanyhasbeengrowingfastandmakinganameforitselfindevelopingandmarketingcomputersoftwareforbanksandcreditcardcompanies.ICMhasrecentlyfoundasmallsetofmessagesfromagroupof82workersinthecompanythattheybelievewillhelpthemfindthemostlikelycandidatesfortheunidentifiedco‐conspiratorsandunknownleaders.Sincethemessagetrafficisforalltheofficeworkersinthecompany,itisverylikelythatsome(maybemany)oftheidentifiedcommunicatorsinthemessagetrafficarenotinvolvedintheconspiracy.Infact,theyarecertainthattheyknowsomepeoplewhoarenotintheconspiracy.Thegoalofthemodelingeffortwillbetoidentifypeopleintheofficecomplexwhoarethemostlikelyconspirators.AprioritylistwouldbeidealsoICMcouldinvestigate,placeundersurveillance,and/orinterrogatethemostlikelycandidates.Adiscriminatelineseparatingconspiratorsfromnon‐conspiratorswouldalsobehelpfultodistinctlycategorizethepeopleineachgroup.ItwouldalsobehelpfultotheDA’sofficeifthemodelnominatedtheconspiracyleaders.

1.2Previousresearch

Werefertosomesocialnetworkrelationmodelsaboutcrimeorganizationstructureofthearticle.Suchasthepassage‘Enterprisehiddencrimedetectionbasedonsocialnetworkanalysisoffuzzyevaluationmodel’writtenbyZengYonginChinauniversityofPetroleum,and‘criminalorganizationstructureofsocialnetworkanalysis’writtenbyChenPenginTsinghuauniversity.Wehavelearnedaboutthebasicresearchonthefuzzyevaluationmethodandrelevantevaluationparametersofthemodel.

1.3Ourwork

Weapplynetworksciencetocrimebusting.Avariablenamedconspiracylikelihoodisdefinedtoquantifyhowlikelyonepersonisaconspirator.ThenweanalyzetheCriminalinformationnetworkbyestablishingseveralmodelsfromshallowtodeep.

2.Analysis

2.1Analysisforquestionone

Thispaperestablishedafuzzyevaluationmodelbasedonsocialnetworkanalysis(SNA).Throughthesocialnetworkanalysiswecreateanindextoreflectthecharacteristicsoftheenterpriseinternalstaffsocialactivities.Usingfuzzyanalytichierarchyprocess,wecomprehensivelythinkabouttheseindexestoevaluatethepersonnelsuspectedofdegreeandthenfindoutthepossibilityofeveryonethatmayparticipateincriminalgangquantitativelyandidentifypossibleaccompliceandsortaccordingtothevolumeofsuspectedtheirpossibility.Inthelast,basedonthemodelcentricitytheoryweestablishedamodeltoidentifythesuspectleaders,gettingthemostpossiblecriminalgroupleaders.

2.2Analysisforquestiontwo

Thesolutiontoproblemtwoisthesameasthatofproblemone.Bothofthemusesocialnetworkanalysismethodtoestablishfuzzyevaluationmodel.Inthesecondquestion,weknowextraconditions.TopiconeisrelatedtotheplotandChrisisoneoftheaccomplices.

2.3Analysisforquestionthree

Semanticwebisalsoakindofnetwork,andthroughtheuseofthenetworkstructureofmutuallyconnectednodes,wetakeedgestorepresentthesemanticsoftherelationshipbetweentheconcepts.Sowecanusethetheoryofsemanticwebandacrimetheconceptsthatcanreflecttherelationshipbetweenthemultiplediagrams.Weusesemanticnetworkanalysismethodtogetherwiththeabovementionedcenterdegreeanalysisinourmodel.

3.Symbols,DefinitionsandAssumptions

3.1SymbolsandDefinitions

symbols

Definitions

i

companyemployeenumber

thecommunicationdegreeofnodesiandthesuspect

thecommunicationdegreeofnodesiandnon-suspects

u

oneofthesuspects/non-suspectentifiedsuspectsthenumberofnon-suspects

d(i,u)

theshortestdistancefromitou

theseriesofstagesrelativeLANandnodei

themostremoteplacethatnodeicanaffect

themaximumvalueoftheenterpriseLANseriesofallpersonnel

therelativenodecentralityofnodei

thenumberofreceivedmessages

thenumberofmessagessentout

thenumberofreceivedmessageswithsuspectthings

thenumberofmessagessentoutwithsuspectthings

thecenterpointofthepotential

thenumberofmessagesreceivedbythenodei

themaximumnumberofreceivedmessagesintheenterprise

3.2Generalassumptions

●Problem1,2onlythinkthatthetheme7.13.15aresuspiciousandothersarenormalsubjects,namelynotconsideringtheeffectofsubjectspecificcontentofsuspiciousdegree.Problem3requiresustotaketheconcretecontentofthethemesintoconsiderationsoastooptimizethemodelshavenbeenbuilt.

●Assumingthattheemergenceofinformationhasnothingtodowiththetime.

●Assumingthatthedataistrueanderrorscanbeignored.

●Assumingthatallmembersparticipateinthecontactandthereisnoisolatepointinthenetwork.

4.Threemodelsfortheproblems

4.1Model1:

Socialnetworkmodel

4.1.1Modelintroduction

Socialnetworkanalysisisakindofsociologicalresearchmethodsandsocialnetworkmodelisestablishedbasedonthemethod.Sociologicaltheoryisthatsocietynotmadeupofindividualsbutbythenetwork,networknodesandcontainstherelationshipbetweenthesocialnetworkanalysismethodthroughtheanalysisabouttherelationbetweenthenetworktostudythestructureandpropertyfeatureofthenetwork,includingnetworkofindividualattributesandtheoverallproperties.Networkindividualattributesanalysisincludes:

pointcentrality,closenesscentralitydegree,etc.Networkanalysisoftheoverallpropertiesincludessmallworldeffect,smallgroupresearch,condensingsubgroup,andsoon.Thismodelismainlyusedincriminology,electionpolls.

4.1.2Theestablishmentofthecriminalnetworkmodel

Intheenterprisesocialnetworkstructure,anoderepresentsacompanyemployeeandalinebetweentwonodesrepresentstheircommunication.Soweusethecollectionsofnodesanddirectedconnectionoftwonodestoestablishthemodel.

Picture1:

thestructureofcriminalnetwork

Network=(V,L)

TheNetworkmeanstherelationshipbetweendifferentnodes.Vmeansnodecollectionsorallthestaffsinthecompany.

.

isasinglenodeandNisthecollectionofnaturalnumbers.EachnodehastwokindsofcommunicationdegreeCwhicharein-degreeandout-degree.In-degreeisthenumberofmessagesthatonenodereceivedandonthecontraryout-degreeisthenumberofmessagesthatonenodesentout.Lrepresentsdifferentcommunicationpathsbetweenthenodes.

andinthisformula,

meansthenumberofmessagesthat

sentto

.TakethemethodSNAintoconsideration,basedonthenodeanditsresponserelationship,webuildaresponserelationshipmatrixS.Thereforetheenterprisecommunicationnetworkcanbeturnedintoacomputablesocialscience.

Replyrelationshipmatrix:

4.2Model2:

fuzzyevaluationmodel

4.2.1Theestablishmentofthefuzzyevaluationmodel

Thepossibilityofeachmemberintheenterprisetoparticipateinthecriminalgangisinvo

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 总结汇报 > 学习总结

copyright@ 2008-2023 冰点文库 网站版权所有

经营许可证编号:鄂ICP备19020893号-2