The Application of Crime Network Conspirator Finding Model

Article Preview

Abstract:

This paper discusses how to find out conspirators when only know the topics of messages they sent and received. In order to determine the weight of every topic, we establish AHP model and CNC (Crime Network conspirator finding) model to define possibility, which includes three parameters: the relative connection degreeC(h) , the relative intermediate degree I and the I(h)relative tightness degreeT(h). After that, obtaining scores by synthesizing these three degrees and get a prior list. Through analyzing the list, we can determine the suspected conspirators.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

420-423

Citation:

Online since:

February 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] The introduction of AHP: http: /rfptemplates. technologyevaluation. com/analytical-hierarchy -process- (ahp). html.

Google Scholar

[2] Liu Wei, Tang Chang-Jie, Qiao Shao-Jie, Wen Fen-Lian , Zuo Jie. A new method for crime data mining based on conceptual e-mail system. Computer Science, 2007, 34 (2): 2132215 (in Chinese).

Google Scholar

[3] Berkowitz S D. An introduction to structural analysis: The network approach to social research. Toronto : Butterworth, (1982).

Google Scholar

[4] 2012 MCM: http: /www. comap. com/undergraduate/contests/mcm/contests/2012/problems.

Google Scholar

[5] Adamic, L.A., Buyukkokten, O., Adar, E., 2003. A social network caught in the web. First Monday (6) 8.

DOI: 10.5210/fm.v8i6.1057

Google Scholar

[6] Mike O'Leary. Determining the Optimal Search Area for a Serial Criminal,. Joint Mathematics Meetings Washington DC, (2009).

Google Scholar