- 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
- 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
In addition, we make the assumption that sending and receiving messages have same effect when we evaluate the likelihood of one’s being conspirator; 另外我们在确定一个人是同谋者的可能性的大小时,假定发送和接受信息是等效的。 Based on psychology analysis above, we can state that all conspirators have at least one message communication with other conspirators, whether suspicious or unsuspicious message. 基于上面的分析,我们认为所有的同谋者至少有一次与其他同谋者的信息交流,不论是否是可疑信息的交流。 Model 1 Establishment of model (简单统计建模) To evaluate the likelihood of one’s being conspirators, we use the following equation which combines two quantity indexes:某人是同案犯的可能性度量 用下面的公式计算: Where is the suspicious message number that office worker i sent or received and is message number that office worker i sent to or received by known conspirators. 这里 是办公室人员i 发送或接受可疑信息的数目。 是办公室人员 i 与已知的同谋者之间的发送或接受的信息数目。 Figure. 1 Result and analysis Figure 1 shows all the values of and . Using equation (1) we have put forward, we can easily calculate all the values of and make a priority list as Table 1 (note that is not a probability but a metric to evaluate the likelihood, though it value is between 0 and 1) 图1 给出了所有的 和 ,用方程(1)可以计算出 . 不是概率,是一种度量) As shown in Table 1, all the known conspirators (heavy tape and red mark) are ranked in the very front of the list, which indicates the model is effective to some extent that it can recognize some workers who is most likely to be conspirators. However, some non-conspirators (green mark and Italic type) are also up at the front, like node 48 and node 2, which shows that the model has a certain limitation and some wrong recognition. 表1中所有已知的同谋者(红色粗体)都在表的最前面,说明了模型的有效性。它能识别最可疑的同谋者。但是一些确定的非同谋者也在表的前列,例如48和2,这说明这个模型的局限性和存在错误的识别。 Model 2 网络—概率模型 more assumptions: Except for the known conspirators and non-conspirators, one’s probability of being conspirator is relate to those who have direct message contact with him/her. And the probability is both affected by the probability o
您可能关注的文档
最近下载
- 销售提成结算单.docx VIP
- 2022年江苏徐州海关缉私分局警务辅助人员招聘5人考试备考试题及答案解析.docx VIP
- 理解马克思(南京大学)中国大学MOOC 慕课 章节测验 答案.pdf VIP
- 2023年中央财经大学公共课《思想道德基础与法律修养》科目期末试卷B(有答案).docx VIP
- 《公路技术状况评定标准》.pdf VIP
- 操作系统原理与Linux实践教程(申丰山)课后习题答案解析.docx VIP
- 公司收购股权转让法律尽职调查报告律师专业版.pdf
- 国家人民卫生出版社有限公司招聘笔试题库2025.pdf
- 下载仪表设备维护检修规程汇编.doc VIP
- 负压封闭引流技术(VSD)护理PPT课件.pptx VIP
原创力文档


文档评论(0)