메뉴 건너뛰기




Volumn 140, Issue , 2014, Pages 121-127

Solution to gang crime based on Graph Theory and Analytical Hierarchy Process

Author keywords

AHP; Gang crime; Graph Theory; Network; Semantic analysis

Indexed keywords

CRIME; NETWORKS (CIRCUITS); SEMANTICS;

EID: 84901489387     PISSN: 09252312     EISSN: 18728286     Source Type: Journal    
DOI: 10.1016/j.neucom.2014.02.041     Document Type: Article
Times cited : (7)

References (32)
  • 1
    • 84901496136 scopus 로고    scopus 로고
    • http://www.comap.com/undergraduate/contests/mcm/contests/2012/problems/.
  • 2
    • 84856665372 scopus 로고    scopus 로고
    • The analytic hierarchy process method for integrate distribution issue of agricultural products logistics
    • 2011 International Conference of Information Technology, Computer Engineering and Management Sciences
    • W.J. Bao, Z.Y. Wu, The analytic hierarchy process method for integrate distribution issue of agricultural products logistics, in: 2011 International Conference of Information Technology, Computer Engineering and Management Sciences, 2011, pp. 342-344.
    • (2011) , pp. 342-344
    • Bao, W.J.1    Wu, Z.Y.2
  • 3
    • 78650610618 scopus 로고    scopus 로고
    • The research and application of vehicle comfortableness based on analytic hierarchy process method
    • 2010 IEEE 17Th International Conference on Industrial Engineering and Engineering Management
    • G. Cheng, Y. Li, J.Q. Chang, X.F. Sun, The research and application of vehicle comfortableness based on analytic hierarchy process method, in: 2010 IEEE 17Th International Conference on Industrial Engineering and Engineering Management, 2010, pp. 1124-1128.
    • (2010) , pp. 1124-1128
    • Cheng, G.1    Li, Y.2    Chang, J.Q.3    Sun, X.F.4
  • 4
    • 84868552057 scopus 로고    scopus 로고
    • Semantic network analysis of Islamist sources using time slices as Nodes and semantic similarity as link strengths: some Implications for propaganda analysis about Jihad
    • 2012 European Intelligence and Security Informatics Conference
    • J.A. Danowski, Semantic network analysis of Islamist sources using time slices as Nodes and semantic similarity as link strengths: some Implications for propaganda analysis about Jihad, in: 2012 European Intelligence and Security Informatics Conference, 2012, pp. 164-171.
    • (2012) , pp. 164-171
    • Danowski, J.A.1
  • 5
    • 84863334760 scopus 로고    scopus 로고
    • Traditional NLP: a distributed solution for optimizing chat processing automatic chat assessment using tagged latent semantic analysis.
    • 2011 10th International Symposium on Parallel and Distributed Computing
    • M. Dascǎlu, C. Dobre, S. Trǎuşan-Matu, V. CristeaBeyond, Traditional NLP: a distributed solution for optimizing chat processing automatic chat assessment using tagged latent semantic analysis. in: 2011 10th International Symposium on Parallel and Distributed Computing, 2011, pp. 133-138.
    • (2011) , pp. 133-138
    • Dascǎlu, M.1    Dobre, C.2    Trǎuşan-Matu, S.3    CristeaBeyond, V.4
  • 6
    • 77957932487 scopus 로고    scopus 로고
    • Assessing computer network security with fuzzy analytic hierarchy process
    • 2010 2nd International Conference on Advanced Computer Control
    • J. Fei, H. Xu, Assessing computer network security with fuzzy analytic hierarchy process, in: 2010 2nd International Conference on Advanced Computer Control, vol. 5, 2010, pp. 204-208.
    • (2010) , vol.5 , pp. 204-208
    • Fei, J.1    Xu, H.2
  • 7
    • 84865084163 scopus 로고    scopus 로고
    • Dijkstra's shortest path algorithm serial and parallel execution performance analysis
    • 2012 Proceedings of the 35th International Convention
    • N. Jasika, N. Alispahic, A. Elma, K. Ilvana, L. Elma, N. Nosovic, Dijkstra's shortest path algorithm serial and parallel execution performance analysis, in: 2012 Proceedings of the 35th International Convention, 2012, pp. 1811-1815.
    • (2012) , pp. 1811-1815
    • Jasika, N.1    Alispahic, N.2    Elma, A.3    Ilvana, K.4    Elma, L.5    Nosovic, N.6
  • 8
    • 78649239015 scopus 로고    scopus 로고
    • A hybrid-strategy method combining semantic analysis with rule-based MT for patent machine translation
    • 2010 International Conference on Natural Language Processing and Knowledge Engineering
    • Y.J. Jin, A hybrid-strategy method combining semantic analysis with rule-based MT for patent machine translation, in: 2010 International Conference on Natural Language Processing and Knowledge Engineering, 2010, pp. 1-4.
    • (2010) , pp. 1-4
    • Jin, Y.J.1
  • 9
    • 42549148785 scopus 로고    scopus 로고
    • Semantic analysis of web pages using web patterns
    • IEEE/WIC/ACM International Conference on Web Intelligence
    • M. Kudelka, V. Snasel, O. Lehecka, E. El-Qawasmeh, Semantic analysis of web pages using web patterns, in: IEEE/WIC/ACM International Conference on Web Intelligence, 2006, pp. 329-333.
    • (2006) , pp. 329-333
    • Kudelka, M.1    Snasel, V.2    Lehecka, O.3    El-Qawasmeh, E.4
  • 10
    • 80053162152 scopus 로고    scopus 로고
    • Toward a stability monitoring system of an asset-communications network exposed to malicious attacks
    • 2011 American Control Conference
    • N. Léchevin, C.A. Rabbath, P. Maupin, Toward a stability monitoring system of an asset-communications network exposed to malicious attacks, in: 2011 American Control Conference, 2011, pp. 2210-2215.
    • (2011) , pp. 2210-2215
    • Léchevin, N.1    Rabbath, C.A.2    Maupin, P.3
  • 11
    • 57649187240 scopus 로고    scopus 로고
    • Automatic object classification through semantic analysis
    • 2008 20th IEEE International Conference on Tools with Artificial Intelligence
    • X.K. Li, Z.G. Zhu, Automatic object classification through semantic analysis, in: 2008 20th IEEE International Conference on Tools with Artificial Intelligence, 2008, pp. 497-504.
    • (2008) , pp. 497-504
    • Li, X.K.1    Zhu, Z.G.2
  • 12
    • 84864198584 scopus 로고    scopus 로고
    • Finding conspirators in criminal network, 2012 International Conference on Systems and Informatics
    • J.Q. Liang, K. Zhang, F. Gao, Finding conspirators in criminal network, 2012 International Conference on Systems and Informatics, 2012, pp. 161-166.
    • (2012) , pp. 161-166
    • Liang, J.Q.1    Zhang, K.2    Gao, F.3
  • 13
    • 77949845426 scopus 로고    scopus 로고
    • IDR-SQE: combining semantic and statistical relations to refine documents
    • 2009 International Conference on Information and Multimedia Technology
    • Y.L. Liu, Y.X. Ouyang, Z. Xiong, IDR-SQE: combining semantic and statistical relations to refine documents, in: 2009 International Conference on Information and Multimedia Technology, 2009, pp. 139-143.
    • (2009) , pp. 139-143
    • Liu, Y.L.1    Ouyang, Y.X.2    Xiong, Z.3
  • 14
    • 84856872960 scopus 로고    scopus 로고
    • Computer crime investigation by means of fuzzy semantic maps
    • 2009 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies
    • V. Loia, M. Mattiucci, S. Senatore, M. Veniero, Computer crime investigation by means of fuzzy semantic maps, in: 2009 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies, vol. 3, 2009, pp. 183-186.
    • (2009) , vol.3 , pp. 183-186
    • Loia, V.1    Mattiucci, M.2    Senatore, S.3    Veniero, M.4
  • 15
    • 77955939244 scopus 로고    scopus 로고
    • Semantic inferentialist analyser: a semantic analyser for natural language sentences
    • 2009 Seventh Brazilian Symposium in Information and Human Language Technology
    • V. Pinheiro, T. Pequeno, V. Furtado, D. Nogueira, Semantic inferentialist analyser: a semantic analyser for natural language sentences, in: 2009 Seventh Brazilian Symposium in Information and Human Language Technology, 2009, pp. 89-97.
    • (2009) , pp. 89-97
    • Pinheiro, V.1    Pequeno, T.2    Furtado, V.3    Nogueira, D.4
  • 16
    • 50149099664 scopus 로고    scopus 로고
    • Analysis of web clustering based on genetic algorithm with latent semantic indexing technology
    • 2007 Sixth International Conference on Advanced Language Processing and Web Information Technology
    • W. Song, S.C. Park, Analysis of web clustering based on genetic algorithm with latent semantic indexing technology, in: 2007 Sixth International Conference on Advanced Language Processing and Web Information Technology, 2007, pp. 21-26.
    • (2007) , pp. 21-26
    • Song, W.1    Park, S.C.2
  • 17
    • 51749119301 scopus 로고    scopus 로고
    • A semantic multimedia analysis approach utilizing a region thesaurus and LSA
    • 2008 Ninth International Workshop on Image Analysis for Multimedia Interactive Services
    • E. Spyrou, G. Tolias, P. Mylonas, Y. Avrithis, A semantic multimedia analysis approach utilizing a region thesaurus and LSA, in: 2008 Ninth International Workshop on Image Analysis for Multimedia Interactive Services, 2008, pp. 8-11.
    • (2008) , pp. 8-11
    • Spyrou, E.1    Tolias, G.2    Mylonas, P.3    Avrithis, Y.4
  • 18
    • 84856118960 scopus 로고    scopus 로고
    • Organized crime structures in co-offending networks
    • 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing
    • M.A. Tayebi, U. Glasser, Organized crime structures in co-offending networks, in: 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, 2011, pp. 846-858.
    • (2011) , pp. 846-858
    • Tayebi, M.A.1    Glasser, U.2
  • 19
    • 73449138756 scopus 로고    scopus 로고
    • k-PathA: k-shortest path algorithm
    • 2009 International Workshop on High Performance Computational Systems Biology
    • A. Ullrich, C.V. Forst, k-PathA: k-shortest path algorithm, in: 2009 International Workshop on High Performance Computational Systems Biology, 2009, pp. 23-30.
    • (2009) , pp. 23-30
    • Ullrich, A.1    Forst, C.V.2
  • 20
    • 84901506262 scopus 로고    scopus 로고
    • The associative-semantic network for words and pictures: effective connectivity and graph analysis
    • Brain and Language. Available online 18th October
    • R. Vandenberghe, Y. Wang, N. Nelissen, M. Vandenbulcke, T. Dhollander, S. Sunaert, P. Dupont, The associative-semantic network for words and pictures: effective connectivity and graph analysis, in: Brain and Language. Available online 18th October 2012.
    • (2012)
    • Vandenberghe, R.1    Wang, Y.2    Nelissen, N.3    Vandenbulcke, M.4    Dhollander, T.5    Sunaert, S.6    Dupont, P.7
  • 21
    • 77954812374 scopus 로고    scopus 로고
    • Natural language processing based on semantic inferentialism for extracting crime information from text
    • 2010 IEEE International Conference on Intelligence and Security Informatics
    • P. Vladia, F. Vasco, P. Tarcisio, N. Douglas, Natural language processing based on semantic inferentialism for extracting crime information from text, in: 2010 IEEE International Conference on Intelligence and Security Informatics, 2010, pp. 19-24.
    • (2010) , pp. 19-24
    • Vladia, P.1    Vasco, F.2    Tarcisio, P.3    Douglas, N.4
  • 22
    • 28844474557 scopus 로고    scopus 로고
    • Semantic scheme to extract attack strategies for web service network security
    • 2004 Proceedings IEEE Workshop on IP Operations and Management
    • W. Yan, F. Liu, Semantic scheme to extract attack strategies for web service network security, in: 2004 Proceedings IEEE Workshop on IP Operations and Management, 2004, pp. 104-111.
    • (2004) , pp. 104-111
    • Yan, W.1    Liu, F.2
  • 23
    • 34548142607 scopus 로고    scopus 로고
    • Using associate constraint network with forward evaluation to overcome cross-lingual semantic interoperability challenge for crime information extraction
    • 2006 IEEE International Conference on Systems, Man, and Cybernetics
    • C.C. Yang, C.P. Wei, K.W. Li, Using associate constraint network with forward evaluation to overcome cross-lingual semantic interoperability challenge for crime information extraction, in: 2006 IEEE International Conference on Systems, Man, and Cybernetics, 2006, pp. 1125-1130.
    • (2006) , pp. 1125-1130
    • Yang, C.C.1    Wei, C.P.2    Li, K.W.3
  • 24
    • 34748814355 scopus 로고    scopus 로고
    • Terrorism and crime related weblog social network: link, content analysis and information visualization
    • 2007 IEEE Intelligence and Security Informatics
    • C.C. Yang, T.D. Ng, Terrorism and crime related weblog social network: link, content analysis and information visualization, in: 2007 IEEE Intelligence and Security Informatics, 2007, pp. 55-58.
    • (2007) , pp. 55-58
    • Yang, C.C.1    Ng, T.D.2
  • 25
    • 76549128510 scopus 로고    scopus 로고
    • An algorithm of shortest path based on Dijkstra for huge data
    • 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery
    • F.H. Zhang, J.P. Liu, An algorithm of shortest path based on Dijkstra for huge data, in: 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery, vol. 4, 2009, pp. 244-247.
    • (2009) , vol.4 , pp. 244-247
    • Zhang, F.H.1    Liu, J.P.2
  • 26
    • 80053432656 scopus 로고    scopus 로고
    • Application of analytic hierarchy process for intellectual property rights in high-tech public corporation
    • 2011 Seventh International Conference on Natural Computation
    • K. Zhang, Application of analytic hierarchy process for intellectual property rights in high-tech public corporation, in: 2011 Seventh International Conference on Natural Computation, 2011, pp. 1985-1988.
    • (2011) , pp. 1985-1988
    • Zhang, K.1
  • 27
    • 84859596015 scopus 로고    scopus 로고
    • Design of networked control systems with bounded arbitrary time delays
    • Tang X.M., Ding B.C. Design of networked control systems with bounded arbitrary time delays. Int. J. Autom. Comput. 2012, 9:182-190.
    • (2012) Int. J. Autom. Comput. , vol.9 , pp. 182-190
    • Tang, X.M.1    Ding, B.C.2
  • 29
    • 0001886332 scopus 로고
    • Using the analytic hierarchy process to structure the supplier selection procedure
    • Nydick R.L., Hill R.P. Using the analytic hierarchy process to structure the supplier selection procedure. Int. J. Purch. Mater. Manag. 1992, 33-38.
    • (1992) Int. J. Purch. Mater. Manag. , pp. 33-38
    • Nydick, R.L.1    Hill, R.P.2
  • 30
    • 84871788798 scopus 로고    scopus 로고
    • Network-induced constraints in networked control systems survey
    • Zhang L.X., Gao H.j., Kaynak O. Network-induced constraints in networked control systems survey. IEEE Trans. Ind. Informat. 2013, 9:403-416.
    • (2013) IEEE Trans. Ind. Informat. , vol.9 , pp. 403-416
    • Zhang, L.X.1    Gao, H.2    Kaynak, O.3
  • 31
    • 56649099174 scopus 로고    scopus 로고
    • ∞ Model reduction for switched LPV systems with average dwell time
    • ∞ Model reduction for switched LPV systems with average dwell time. IEEE Trans. Autom. Control 2008, 53:2443-2448.
    • (2008) IEEE Trans. Autom. Control , vol.53 , pp. 2443-2448
    • Zhang, L.X.1    Shi, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.