下载此文档

最短路径算法。.pdf


文档分类:IT计算机 | 页数:约15页 举报非法文档有奖
1/15
下载提示
  • 1.该资料是网友上传的,本站提供全文预览,预览什么样,下载就什么样。
  • 2.下载该文档所得收入归上传者、原创者。
  • 3.下载的文档,不会出现我们的网址水印。
1/15 下载此文档
文档列表 文档介绍
: .
Drrorism, narcotics terrorist network may have shared religious beliefs or
violations, armed robbery, and kidnapping often attended terrorist training together previously so that
involve multiple offenders who are connected they trust each other and cooperatively plan and
through various relationships (., kinship, friend- commit terrorist attacks [20]. In a broader sense, a
ship, co-workers, or business associates) [16]. These criminal network may be composed of a variety of
criminals can be treated as a network in which they entities (., organizations, locations, vehicles,
interact and play different roles in illegal activities weapons, properties, bank accounts, etc.) in addition
[22]. For instance, a narcotics network may consist to persons. Learning associations between these
of interrelated criminals who are responsible for entities is a critical part of uncovering criminal
activities and fighting crimes. To achieve this goal,
crime investigators often employ a method called
* Corresponding author. Tel.: +1-520-626-9239. link analysis [8,16,24], which can help generate
E-mail addresses: ******@ (. Xu), investigative leads and uncover missing information
******@ (H. Chen). that may be buried in a criminal network. In a
0167-9236/$ - see front matter D 2003 Published by Elsevier .
doi:-9236(03)00117-9474 . Xu, H. Chen / Decision Support Systems 38 (2004) 473–487
narcotics network, for example, link analysis may 2. Literature review
reveal that a group of offenders actually belong to
the same drug supply chain. In a homicide crime, In this section, we review network construction
link analysis may find ‘‘hidden’’, in

最短路径算法。 来自淘豆网m.daumloan.com转载请标明出处.

相关文档 更多>>
非法内容举报中心
文档信息
  • 页数15
  • 收藏数0 收藏
  • 顶次数0
  • 上传人wxc6688
  • 文件大小973 KB
  • 时间2022-06-16