Modeling for Criminal Case with Large Message Traffic

  • Jialin Lou
  • Jiaxin Zhao
  • Yang Song
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 217)


In order to solve the criminal case involved with large message traffic, an evaluate model and semantic analysis are used in this paper. By using analytical hierarchy process (AHP) method, information branching and iteration, the model can give the suspicious index of each person. Also, a semantic analyze model based on vector space is set up to empower the former model. For illustration, a certain criminal case is utilized to prove the feasibility of the model. The model has both great extensibility and very low complexity, thus not only it can be directly applied to huge network case, but also by trivial modifying, it can also be applied into the biology and medical field.


Criminal case Iteration AHP Semantic analysis Vector space 


  1. 1.
    Brams SJ, Mutlu H, Ramirez SL (2006) Influence in terrorist networks: from undirected to direct graphs. Stud Confl Terrorism 29(7):679–694CrossRefGoogle Scholar
  2. 2.
    Carley K, Palmquist M (1992) Extracting, representing, and analyzing mental models. Soc Forces 70(3):601–636Google Scholar
  3. 3.
    Perliger A, Pedahzur A (2011) Social network analysis in the study of terrorism and political violence. Polit Sci Politics 44(1):45–50Google Scholar
  4. 4.
    Saaty RW (1987) The analytic hierarchy process—what it is and how it is used. Math Model 9(5):161–176MathSciNetMATHCrossRefGoogle Scholar
  5. 5.
    Tanenbaum W, Brand J (2008) Using automap for social and texual network analysis, vol 23(14). United States, pp 39–44Google Scholar
  6. 6.
    Yang CC, Li KW (2007) An associate constraint network approach to extract multi-lingual information for crime analysis. Decis Support Syst 43(4):1348–1361CrossRefGoogle Scholar
  7. 7.
    Yongdan L, Haiquan Z, Ronglu Li, Yunfa Hu (2004) Polarity text filtering based on semantic analysis. J Chin Inst Commun 25(7):78–85Google Scholar

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  1. 1.Beijing Institute of TechnologyBeijingPeople’s Republic of China

Personalised recommendations