期刊文献+

对犯罪网络的模糊层次聚类分析 被引量:2

Criminal Network Analysis Based on Fuzzy Hierarchical Clustering
下载PDF
导出
摘要 将模糊处理技术与层次聚类算法相结合运用于犯罪网络分析,提出一种新的基于模糊层次聚类算法的犯罪网络分析方法.基于"9.11"事件数据集的实验结果表明,该方法在划分网络的同时,能够找到类属具有模糊性的成员,从而为打击犯罪提供有益的帮助. Criminal network analysis has aroused concern from many researchers with the increasing num- ber of gang crimes. At present, the study of criminal network analysis is based on the classical set theory, and which can not find members who have ambiguous class attribute in the criminal network. To this end, the authors propose a hierarchical clustering method based on fuzzy set theol;y through combination of fuzzy processing technology and hierarchical clustering method. The experimental results show that this new method can find the members who have ambiguous class attribute when partitioning the network.
作者 潘芳 张自力
出处 《西南师范大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第3期210-214,共5页 Journal of Southwest China Normal University(Natural Science Edition)
基金 教育部社科重大招标项目(05JZD0008)
关键词 犯罪网络 聚类 模糊层次聚类算法 criminal network clustering FHCM
  • 相关文献

参考文献7

  • 1唐常杰,刘威,温粉莲,乔少杰.社会网络分析和社团信息挖掘的三项探索——挖掘虚拟社团的结构、核心和通信行为[J].计算机应用,2006,26(9):2020-2023. 被引量:24
  • 2Xu Jennifer, Chen Hsinchun. CrimeNet Explorer: A Framework for Criminal Network Knowledge Discovery [J]. ACM Transactions on Information Systems, 2005, 23(2): 201- 226.
  • 3Stephen P. Borgatti. Identifying Sets of Key Players in a Network [C]//Proceedings of the Conference on Integration of Knowledge Intensive Multi--Agent Systems. NY: IEEE, 2003:127- 131.
  • 4Dombroski, M. J. & K. M. Carley. Netest: Estimating a Terrorist Network's Structure [J]. Computational & Mathematical Organization Theory, 2002, 8: 235- 241.
  • 5温粉莲,唐常杰,乔少杰,等.挖掘被监控社团核心的最短路径方法[EB/OL].中国科技论文在线(教育部)http://www.paper. edu. cn/process/download.jsp?file = 200607 -42.
  • 6Valdis E. Krebs. Mapping Networks of Terrorist Cells [J]. Connections, 2002, 24(3): 43 -52.
  • 7徐艺萍,邓辉文,李阳旭.一种新的最近邻聚类算法[J].西南师范大学学报(自然科学版),2006,31(6):114-116. 被引量:8

二级参考文献25

  • 1诸克军,苏顺华,黎金玲.模糊C-均值中的最优聚类与最佳聚类数[J].系统工程理论与实践,2005,25(3):52-61. 被引量:69
  • 2[8]Anderson E.The IRISes of the Gaspe Peninsula[J].Bulletin of the American IRIS Society,1935,59:2-5.
  • 3LIBEN-NOWELL D, KLEINBERG J. The Link Prediction Problem for Social Networks[A]. Proc. 12th International Conference on Information and Knowledge Management (CIKM) [ C], 2003.
  • 4DOMINGOS P, RICHARDSON M. Mining the Network Value of Customers[ A]. Proceedings of the Seventh International Conference on Knowledge Discovery and Data Mining[ C]. San Francisco, CA:ACM Press, 2001.57-66).
  • 5DOMINGOS P. Mining Social Networks for Viral Marketing[ J].IEEE Intelligent Systems, 2005.20(1).
  • 6CHAKRABARTI S, DOM B, GIBSON D, et al. Mining the link structure of the World Wide Web[ J]. IEEE Computer, 1999, 32(8).
  • 7XU JJ, CHEN HC. CfimeNet Explorer:. A Framework for Criminal Network Knowledge Discovery[ J]. ACM Transactions on Information Systems, 2005, 23(2).
  • 8BERKOWITZ SD . An Introduction to Structural Analysis : The Net work Approach to Social Research[ M]. Burrerworth, Toronto,1982.
  • 9BREIGER RL. The analysis of social networks[ A]. HARDY MA,BRYMAN A, eds. Handbook of Data Analysis. Sage Publications,London, UK, 2004. 505 - 526.
  • 10GARTON L, HAYTHORNTHWAITE C, WELLMAN B. Studyingon line social networks[ A]. JONES S, Ed. Doing Intemet Research[C]. Sage Publications, London, UK, 1999.75-105.

共引文献31

同被引文献26

  • 1Ranjan Bose(印),武传坤,李徽(译).信息论、编码与密码学(第2版).北京:机械工业出版社.
  • 2McCallum,Andrew,Corrada-Emmanuel,Andrés,Wang Xuerui,The Author-Recipient-Topic Model for Topic and Role Discovery inSocial Networks:Experiments with Enron and Academic Email(2005).Computer Science Department Faculty Publication Series.Paper 44.
  • 3Valdis E.Krebs,Mapping Networks of Terrorist Cell[s J].connec-tions,2002,24(3):43-52.
  • 4Criminal Network Analysis and Visualization(2005),COM-MU-NICATIONS OF THE ACM June 2005/Vol.48,No.6.
  • 5FREEMAN L. Centrality in social network: conceptual clarification [J]. Social Networks, 1979, 1:215-239.
  • 6LIU Xiaoming, BOLLEN J, ENSON M L. Co-authorship networks in the digital library research community [ J ]. Information Project & Management, 2005,41 : 1462 - 1480.
  • 7XU Jennifer, CHEN Hsinchun. CrimeNet Explorer: A framework for criminal network knowledge discovery [ J ]. ACM Transactions on Information Systems, 2005, 23 (2) :201 -226.
  • 8KREBS V. Mapping networks of terrorist cells [ J ]. Con- nections, 2002, 24(3): 43-52.
  • 9SPARROW M K. The application of network analysis to criminal intelligence: An assessment of the prospects [J]. Social Networks, 1991, 13(3) : 251 -274.
  • 10COLES N. It's not what you know- It's who you know that counts. Analyzing serious crime groups as social networks [J]. British Journal of Criminology, 2001, 41 (4) : 580 - 594.

引证文献2

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部