QQ登录

只需要一步,快速开始

 注册地址  找回密码
查看: 1928|回复: 8
打印 上一主题 下一主题

[美赛经验] 2012年二等奖论文

[复制链接]
字体大小: 正常 放大
刘李     中国数模人才认证   

20

主题

8

听众

141

积分

升级  20.5%

  • TA的每日心情
    开心
    2013-2-5 00:49
  • 签到天数: 11 天

    [LV.3]偶尔看看II

    跳转到指定楼层
    1#
    发表于 2013-1-27 19:08 |只看该作者 |正序浏览
    |招呼Ta 关注Ta
    2012 Mathematical Contest in Modeling (MCM) Summary Sheet6 O, |1 v$ w& n# Z
    Locating the conspirators in the company; _, w5 l; X6 w, I1 ?
    The mathematical model built in this paper can analyze the complex crime reasonably. According3 W: Q7 Y5 h' ]. m& g! o) K2 o
    to a part of known arrested suspects and their social relationship, the model can discover the
    8 x* f- l, }$ |  a! D4 {7 Wconspirator with the maximum possibility, which can accelerate the process of investigating cases
    3 [6 {. A9 o* W9 h$ d1 _With the the suspicious information, known conspirators and innocents, a model of finding" Z( g3 }. E2 M# Z) U% F' G
    internal crime suspects in the company is established. For a person in the company, if he has( }$ m8 o: `% X4 O7 x& X. H
    closer contact with other members he will has more possibility to commit a crime, which is called, v1 W8 {$ A4 X+ {
    core degree. Making use of Matrix replacement method and Hierarchical clustering method, we
    ( @9 L9 W; U# F* I" _0 Xcan find the group of higher core degree and sort them with descending. Next, we deem that a7 e+ Q  v: D/ z7 C- a  O
    member who has closer contact with a conspirator will be more possibilily a conspirator . Because5 q- k9 v0 a. [5 ^* ]. C
    of the known conspirators in the company, to find the other suspects in the network sturcture, A
    : `$ y$ V0 |! Ilist of association degree is ordered with ascending. At last, on the basis of the computational
    ! b1 a1 Z( A0 e2 z# a2 Fmodel, taking transmission information among members into acount, we stratified these message& p2 c! s6 K# Y* ]# U5 Z6 S, X
    topics and given the different layers of different topics of suspicious degrees. According to the
    , `3 p, }9 m1 ], [different topics among these members, we can calculate their suspicious degrees accurately and
    7 J9 L9 {* g3 o2 Zordered them descending. Analysis by synthesis the result of three sort, using a computer merge% m1 c  E( f" b/ B
    the result of three sort, thereby all of the suspects is obtained accurately.
    ( F3 h2 j* A* Q' a( C  p( MComputers is the efficient and accurate tools to handle and analyze large-scale data. Using  R+ O+ t5 F& f2 l2 K
    computers to deal with original data can reduce the error of the value of topics. We can make full
    2 F. h9 {! g$ ?! q* `. h; luse of semantic network analysis, artificial intelligence and text analysis, and calculate the
    % x. N6 Q8 }* e/ d+ ?- \4 S+ ^frequency of words in original data . There are some less important but greater frequent words. n0 i3 j- d6 I) X; \+ U9 o. A
    among those data, such as copula and personal pronouns. Deleting this type of words and merge
    1 W$ k4 Q/ I7 u' \  \7 @1 O) ^them with similar semantic words, a language bank is then built with these similar words, and the
    , E2 b4 _) G% ?* }6 Ffrequency of every words is computed. Sometimes words collocation in the bank are also
    - w. |; g  F+ X* osuspicious. therefore when these suspicious words appear and the frequency of them is high, thus
    8 l* s2 u- N4 x- ~the person who transmit the type of information must be suspicious characters. It suffice to find& {) Y- [4 s5 p4 {# w' z/ k* I
    all of suspects accurately by this method., x7 e+ q8 ^  f* T' T7 k5 P7 F
    The crime busting model we built can also apply to many other practical cases. For example, it
    4 A; U% p7 W4 t5 mcan be used on detecting difficult network-crime cases and applied to the problem of the spread of
    % t" u% s( u' h: u% s+ Bthe virus between cells in the biological network. The method can also deal with these difficulties
    ! L+ p% ~) b& q! |* Cwith high accuracy.
    ) ~3 |: ~! d* e! l, }1 B0 ^& DLocating the conspirators in the company Abstract The mathematical model built in this paper can analyze the complex crime reasonably. According to a part of known arrested suspects and their social relationship, the model can discover the conspirator with the maximum possibility, which can accelerate the process of investigating cases With the the suspicious information, known conspirators and innocents, a model of finding internal crime suspects in the company is established. For a person in the company, if he has closer contact with other members he will has more possibility to commit a crime, which is called core degree. Making use of Matrix replacement method and Hierarchical clustering method, we can find the group of higher core degree and sort them with descending. Next, we deem that a member who has closer contact with a conspirator will be more possibilily a conspirator . Because of the known conspirators in the company, to find the other suspects in the network sturcture, A list of association degree is ordered with ascending. At last, on the basis of the computational model, taking transmission information among members into acount, we stratified these message topics and given the different layers of different topics of suspicious degrees. According to the different topics among these members, we can calculate their suspicious degrees accurately and ordered them descending. Analysis by synthesis the result of three sort, using a computer merge the result of three sort, thereby all of the suspects is obtained accurately. Computers is the efficient and accurate tools to handle and analyze large-scale data. Using computers to deal with original data can reduce the error of the value of topics. We can make full use of semantic network analysis, artificial intelligence and text analysis, and calculate the frequency of words in original data . There are some less important but greater frequent words among those data, such as copula and personal pronouns. Deleting this type of words and merge them with similar semantic words, a language bank is then built with these similar words, and the frequency of every words is computed. Sometimes words collocation in the bank are also suspicious. therefore when these suspicious words appear and the frequency of them is high, thus the person who transmit the type of information must be suspicious characters. It suffice to find all of suspects accurately by this method. The crime busting model we built can also apply to many other practical cases. For example, it can be used on detecting difficult network-crime cases and applied to the problem of the spread of the virus between cells in the biological network. The method can also deal with these difficulties with high accuracy. Keywords: core degrees, suspicious degrees, association degrees, text analysis, crime busting5 b, Q$ l5 X& b0 s# \8 W
    Team#15783 page 2 of 15- x$ c0 n3 g- W5 |, w6 j+ d
    Contents
    / K+ x( T7 l- [- Y' E: y1 Introduction ............................................................................................................... 3) U1 j& Q; T5 T- S
    2 Analysis of the Problem ............................................................................................ 3/ q% o2 k0 E6 }/ J: i4 w
    3 Crime busting ............................................................................................................ 4' e- L0 G6 Z1 R/ F* g
    3.1 Analysis ............................................................................................................ 4
    ' q& C8 b! ?/ E8 k+ z) y* c2 B9 l3.2 Symbols ............................................................................................................ 4
    ( ^; i* n2 a8 A4 g- {5 u0 {3.3 Assumption ...................................................................................................... 54 e; [+ g# `5 g% p$ I- V
    3.4 Modeling .......................................................................................................... 5
    ! j) e8 y) r& H- S1 `3.4.1 Solving of the core degree ..................................................................... 5! u# v: p; r; w. P
    3.4.2 Solving of absolutely close degree ........................................................ 6
      l1 ^7 n  p" d3.4.3 Using suspected information to find criminal suspects ..................... 73 D$ B. X* H! W
    3.5 Consider the additional datas ........................................................................ 9
    3 F6 A; E' z* G8 w1 t- v4 Computer processing .............................................................................................. 10
    " V) }! x: m* G7 ]: E3 w& A4.1 Analysis .......................................................................................................... 10
    $ x5 {* b. X# P4.2 Definition ....................................................................................................... 11, o8 p) U2 [4 X. `- I& F; Z
    4.3 Computer processing Method ...................................................................... 11
    - [* [* C. H- E( P& Q5 Model promotion ..................................................................................................... 13
    , D9 s* N& ~0 e: Z$ v( h5 x8 [5.1 Analysis of model .......................................................................................... 137 w: K) \' A  L# |8 Q
    5.2 Model application.......................................................................................... 139 H( e9 m& ]# H/ f# w
    6 Weaknesses and Strengths of the Model ............................................................... 149 B( z7 z2 ^8 o+ h8 M" g5 H8 q/ U
    6.1 Strengths ........................................................................................................ 14
    + }+ N/ D' n2 V  a" b# K4 ]6.2 Weaknesses .................................................................................................... 14
    , l7 O8 v4 l* w8 B' v7 Conclusion ............................................................................................................... 15
    5 k  N; A$ g9 ]8 References ................................................................................................................ 15" y  I+ F: [, Q" v- p6 n  T
    Team#15783 page 3 of 15# M: s5 \1 W3 H; |
    1 Introduction+ K! F8 u+ ^/ y1 ^
    In recent years, the group frauds and economic crime problems have been very common in our daily life. Since the number of suspects is great, then it is difficult to detect the cases for the public security organs. Once the criminals escape, they will be a threat to more people and property, and even to personal security . The links between criminals posed by criminal networks is complex , and the mistake of judgment will falsely accuse innocent people and let the criminals get off . Here the problem arises: how to locate all the suspicion without a mistake? We learned many of the existing methods find that none give us a definite answer. Then we found the model of crime busting is similar to the model of social networks in the BBS in a way. What we need to do is identify the core characters and important figures in this matter. If we do the above, then we can basically determine the degree of suspicion for each person in this group combined with all kinds of the message topics, and arrange the guesswork out of suspects. It narrow the scope of criminal elements and reduce the workload of the public security organs so that they can break cases faster.( q4 R% ~! f9 K
    2 Analysis of the Problem$ _' x, }& n- Q1 x
     First, we should gain a clear idea of the characteristics of internal crime. There is a wide range of the criminal subjects: the senior managers of the company can be the conspirator, and each of the staffs can be also the conspirator. So it is difficult to capture criminals. But if we use the key features of economic crime, then we can easily find the mastermind of their accomplices.* H9 X* M, I* w5 v
     According to the characteristics of crime and the offender's psychological, we believe that the possibility that those persons who keep close contact with criminals are the conspirators is very large. Then, by known criminals and suspicious messages, we can accurately determine criminal conspirators.- V4 d7 c7 S1 J% \4 M- j
     Based on the known contacts between persons inside the company, we use the matrix displacement method and the hierarchical clustering method to identify the company's central figures who keep close contact with other employees. Then combining with these figures with the types of message topics, we can make a further judgment to identify the other suspects. In addition, using given already certain schemers and certain not schemers, we can further discuss the group which have close relationship with those persons, and so we can increase the veracity of the result. With the help of our model, we can identify the maximum possible accomplices and confidently point out the conspirators and accomplices within the company.
    . h8 e" e$ [& r+ M6 u7 ATeam#15783 page 4 of 15
    , H5 x3 C. ]2 p& W- f! }4 y9 I3 Crime busting1 J" i9 Y6 ?8 N) T
    3.1 Analysis
    9 V' A% z/ Q) H( z: ^% u" ?Although criminals choose randomly the modality of crime information and the route$ c. ~, U7 v- V( }  l4 v
    transmission of crime information, but their crime form still has a certain rule. Their
    5 ~& z8 C/ h" j, B4 U: emodus operandi in this company transmits mainly by the information transfer form, so
    + e5 J( o% B& [$ F3 |5 ^: wcriminal gangs should form a network connection model. Questions have given. J- x& F, M3 Z7 k, c* ^3 Q4 u1 V
    several already certain criminals and crime information types, then according to these
    8 v9 Z) r4 [  }) X6 m9 v$ x6 Lcriminals' close relationship and the suspected degrees of total numbers of message
    3 n5 M5 G" w' \receive and message issued, we can judge the scope of the criminals.
    " ]8 u6 }# j9 U. _. F& x8 l3.2 Symbols
    ; b% e' W( Z0 K+ M- s+ j3 ^Table1 symbols
    ) r, P- u4 t" O4 P( \k A The number of the company group members8 Y6 I' R# Z# P) [
    ai, k  if member i and member k have directly connected
    6 h2 j- C+ n; ?& |' Z  D C k Connection degree of each member k A( r& L% }+ ]: h" M3 A5 d
      ij g k if means of member i A and member j A pass by k A .2 T3 d+ J/ F8 u) {' [* W: l6 ?
    C k B k A ’s absolute agent degree
    % Y" q. S4 `" O& w6 n1 h0 x. V! f' |) Vli, k the most short-circuit path length of member i A and member j A
    9 B) ~! g% M. {; W% P) T. y  C C k the absolutely tight density- |: Q! F. e- g7 I
    D C the average value of the absolute agent degree: m3 _9 m/ @7 p6 H! r2 _
    B C the average value of the absolute agent degree
      m2 d0 x1 @% I# i" IC C the average value of the closely degree0 b& T' s  d4 v+ G. N. Q" r8 j
      D Dev C the smooth coefficient of connection degree1 l: n, d: A1 k  e
      B Dev C the smooth coefficient of absolute agent) f* Z8 u& y0 j8 k- r+ j, H
      C Dev C the smooth coefficient of absolutely tight density
    : W1 B$ L4 Q' U& f2 @Team#15783 page 5 of 15
    8 z) {2 e/ R) G. g3.3 Assumption9 P, r+ y5 H6 z% O1 Q$ H: x
     There is no message exchange without the message in the problem;
    * w: {6 l" h$ x4 G! ]9 } Assume that all the criminals in the group is given;  n& o$ _) q, q4 Z( u; v5 {
     To measure the possibility of a crime, we define suspect degree of message which/ q$ P- n. G( R6 B! G* g9 \
    is divided into four layers. Suspect degree of the information within each layer is* Y! S2 Y7 Y4 b* ^
    the same. The messages from the same layer have the same suspects degree.) L8 z: V3 x- s& D' D* l
    3.4 Modeling* f0 G  _- `7 l. v% U0 h( M
    3.4.1 Solving of the core degree
    7 i% P: Y, @# u" TIn this article, we need to study the company group consisted of 83 members. There
    1 b2 `+ Y$ x0 l. g  P, }are different degrees of interaction among people, and we can obtain the extent of this
    + Y6 k: g9 c: p& |interaction via information passing between different people. The person who has the
    % ^; y' A8 s7 r6 V1 ]largest amount of messages has the greatest influence without considering message% M! }% G5 K7 M: l% W! m4 F. ?; j
    topics, then we call this person as the central figure. His position is far above the other0 y5 o* h: B+ K
    opinion leaders because he has the most members of the exchange relationships. We4 i0 h- L- [0 L2 k1 A3 h
    call the person as a loner due to the fewest numbers of information received and5 i" V' v, q4 y, l2 T1 m( F
    information issued. This person does not influence the others, then those loners are; ]6 D9 N0 n! s7 j; }, g1 P' a
    not criminals in our case. The central figure and important figures have a great
    6 m9 M+ }" x" gpossibility to commit a crime.
    # y: P5 g( x0 c% Z5 V* ^Relationship analysis focuses on the relationship between members and interactive( [, C2 U3 f" O/ w" V
    behavior, and it is often used to identify the central figure of groups[4]. Let the symbol
    + v2 d) Z6 r0 I5 K  1 2 , , , n V  A A  A stand for the members of this group, and define as follows:4 Q1 u3 }* B0 L
        
    : w& t- R5 S4 K; D9 g7 U9 b; i* }' z8 P1 p. V* p
    n7 s& O0 q" H0 a5 L; b3 y  B. `6 H% b
    i, R# m+ J0 O( W
    D C k a i k
    : Y" I, x+ Q! g) u9 Q6 L1
    ; ?1 o* N/ `9 P/ O1 ~, (1)3 x& q2 W" P1 H8 [1 @7 a
    Equation (1) stands for Connection Degree of each member k A , and Connection
    # F1 w+ ]% O( I& A5 T9 [7 i) dDegree reflects the level of activity of the group members. Let n be the number of8 @, Q- O: B5 d6 t/ H1 t! d2 R5 b
    members of groups and n equals 83 in this problem. If ai,k 1, then member i0 L2 K* \; E; b, j
    and member k have direct connection, that is, member i and member k have3 a1 i$ N$ H9 |4 y5 x
    information exchanges. If ai,k  0 , then both have no directly connection with
    0 r! F# l; x+ Reach other, and so have no information exchanges.8 V% |0 x- F( z- _  x, _
        
      ], y; h0 t8 s) n% c  R! x, P; vn
    8 R- e- |5 |$ j& z) bi' Y/ ~, v/ n- ~' Z4 }) X% c
    n
    ) H* \! S: H# f# mj
    8 C' \1 \! H  P" z7 e. ~B ij C k g k (2)$ q. Y9 s0 s, k
    Team#15783 page 6 of 156 t3 d9 f4 [! ?9 K9 \
    The shortest circuit path number that passes member k A is called k A ’s absolute
    ( h0 n3 Z# G* _agent degree, denoted byC k B . It describes the ability of members contacting other5 l' Y( M& N' H/ [8 |. f, m
    members as an intermediary. If g k 1 ij , then member i A and member j A pass9 i6 n% p, q! V9 D/ \/ t  U
    by member k A .$ q5 y+ T0 }, z! x  X
        
    ; c+ k, k1 M' D: O2 V. u7 \6 e& }: a! [) t$ ~8 @, K
    n5 L$ b8 i/ Z# {& S2 a0 o
    i4 e+ w6 c# X/ k3 F4 ?( z
    C C k l i k* x$ L3 c# P" o" U4 P
    14 B  P! |% ~! V5 P7 N  J8 C. m: X
    , (3)
    / x/ i' m% F: u* O& |( q4 rThe shortest circuit path length of member k A with all other members in the6 ~, x0 C+ ]& D8 n3 a& _
    network called absolutely tight density, denoted by C k C . The li, k means the
    ( o' I1 V/ m: ^9 Zshortest circuit path length of member i A and member j A . What Equation (3)( z9 i4 e4 I* f
    describes is the close degree of a member of the small group with himself as center.* w/ R7 M  M( b! m
              D eCvD 
    ) P& u: }' I' ~4 Z$ t$ w3 k* i5 C& ZC C  U3 R* |- c1 g$ v
    D e CvB$ `$ T6 _+ O# n5 T. \8 ~5 c
    B B
    / A2 M& R/ V4 o& I4 GD e CvD+ V4 N+ `; m3 A2 D3 }' b! |
    D D C C C C C C c o r e e e' {- u$ u& z9 O
    2 / 2 / 2 /
    4 \6 A) P0 P2 M. m$ J# D       (4)( |2 Q0 I7 p' u) n
    Equation (1) generally considers the importance of connection degree, absolute agent" I# ]1 c" Z1 L: w
    degree and absolutely tight density. Using this we can measure the core degree of. [/ G5 M" F1 D( G% q
    character member. Given D C represent the average value of member contacts degree.
    ' |/ M. E9 ^, S9 J3 ~    8 [1 E% [+ z8 W  w6 J+ z4 H. E- h
     
    1 O0 m* o3 }0 c* e1 X! N, i, }n
    + A, s. c/ m5 V: N: c4 I0 ci* {$ L9 {$ t" d
    D D D Dev C C i C. A. X+ V$ h0 @- Y5 }; L- [5 l
    1+ }+ B' h: n% A2 E5 G
    2 means the smooth coefficient of connection degree.
    3 N- A; ]& {4 L" W: z    
    9 V& I$ O) f2 S8 L1 j% p 
    + r" J9 i0 c6 R! q- Vn
    7 s# R3 C' y! w( N. p0 j/ di
    * y: R/ d' [6 h" e- T  GB B B Dev C C i C
    9 n  O4 ?7 [$ B9 @1
    - ]7 A9 D* s$ l7 ?2 S2 means the smooth coefficient of absolute agent degree.! |5 Z& a4 p, k, k4 O) K
        + M" K( a, f& s* j; i4 q0 @9 |$ U
     9 k3 C8 k! F# w  W  o5 h$ M
    n9 |) M4 W( |+ d5 R" h0 r, S7 v
    i& k' k$ J. _" q4 X% d, D6 x9 B& `
    C C C Dev C C i C' {8 V5 k" T; a, t  l
    1& ]1 ]/ n# D" L; G; ]+ z) z1 w9 w
    2 means the smooth coefficient of absolutely tight density.1 |) u! t3 h" K0 O9 K
    Thus, we can obtain the core degree of all members by using computer program, and
    : b* D* l0 W# s8 ~  F0 nthen rank the core degree with decreasing order.; S2 |9 q/ w0 F' `' n/ i1 J5 [- Z- \
    3.4.2 Solving of absolutely close degree
    0 ^- y% B+ S; ~# X: p. ]Common sense shows that an accomplice may have frequent contact with criminals," [( ~$ y9 q+ E4 A' u  J
    so they will have a larger absolutely close degree. We can regard the kown! V: [4 z! Y) z+ t' d1 z. d
    conpirators as a group. Calculate the absolutely close degree of each members to this
    ( V. X- _; v5 Y. ]8 [% @group.9 v) H  ?' P  Q; \
    Using the expression (3) to find the absolutely close degree with criminal suspects of
    ( ^1 b1 k  `5 Eeverybody in the company. Regarding all of these criminal suspects as a group,
    0 }* p  [+ H. @& X% s+ Dcalculate the sum of the compactness between crime groups and every individual
    " N0 V& I3 j, E1 FTeam#15783 page 7 of 15
      ^3 L* N6 T: o; sperson, that is the value of number means the degree of close contact with each, }5 O: N8 h5 Z# W0 K& B
    individual and criminal groups. Calculate the result using computer programming.% q8 o- i7 C- d6 b; A& \
    Size down the absolutely close degree, we can find people who have closer contact7 r3 m& S0 r0 \6 ^3 T
    with this crime group.
    2 i" ]% d; [. X3.4.3 Using suspected information to find criminal suspects8 q. m7 ^; S3 p. R1 p5 J
    Step1: Suspected to information stratification$ _* y% V: P' B: R: p
    Except for certain suspected information, according to the characteristics of the) s/ o) e; o% h: g, q% ]8 W
    corporate crime, we confirm that remaining information has relationship with the) p2 c# r) }5 \; U) I6 s
    budget and economic, internal personnel dispatch and daily life. In daily life, for the6 d4 g: Z0 B% L- U' a3 {1 {2 Q
    standard of stratification, we roughly divide it into the following levels:) q; ?4 x& p% c3 P$ N
    A. 7, 11, 13 is defined certain suspected information, and set the value of suspected3 w: t, A. C+ T: L1 G0 O, m
    degree information at 1;
    $ D4 q' i5 e1 S  {2 I% dB. 1, 14, 2 is defined as the larger suspected degrees information, and set the value of
      s& j) P! L1 _5 H6 w$ hsuspected degree information at 0.75;9 f. e6 x+ p" N* X
    C. 5, 6, 10, 15 is defined as the smaller suspected degrees information, and set the/ \1 N0 z/ \$ f" m4 M
    value of suspected degree information at 0.5;
    3 g: o6 T  [" dD. 3, 4, 8, 9, 12 is defined as the smallest suspected degrees information, and set the
    3 F+ Z! F  G& Zvalue of suspected degree information at 0.25;
    8 `: W# \9 S6 k" [- ^( c. v' RStep2: Building matrix
      Y2 G: J, v. h3 N5 cAccording to the types of information received and information sent, we draw out the- n4 L; U7 a* A$ e7 g
    matrix, and the row and column of the matrix mean individual numbers. 1 ij z 8 m* v0 e$ S  e+ W
    means the individual staff received or sent out the information type is A, 0.75 ij z ( ?$ u) ^" G) v
    means the individual staff received or sent out the information type is B, 0.5 ij z ) x, A9 p2 _7 w! y) ^# g9 E
    means the individual staff received or sent out the information type is C, 0.25 ij z 
      b: M/ a% b! l( mmeans the individual staff received or sent out the information type is D. As a result,  B5 t7 e: G) D  s" u' b
    we get a matrix of 8383.
    3 }0 h* z0 R0 ~/ d, j; ?" [% d4 Y3 nTeam#15783 page 8 of 15
    - ^) l! N8 R& L; w8 i- F" _0 0 1 . 2 5 0 0 0
    1 M- y" z# b7 H9 I! W0 0
    4 t) `1 ~# f, L4 i/ o& W: q3 ?! j2.25 0
    0 l7 E' v% L! f/ b/ j. {0 0
    , J9 b& R* V" m, v5 c2 H0 0
    0 i5 z0 {6 l8 Z  z7 [! X2 x; n5 t0 0 0 0 0 0
    " i( e% _+ V" I8 r, l 
    4 g( \5 s2 [& |9 p 3 e, d5 v. o* e' u
     
    & `& I4 l& @3 G* L# h4 w  ? 
    / c! p% \6 T7 m. M" ? 9 K0 ^) [% G7 B, O8 R3 U$ i* e
     
    & n5 s  Q2 \3 K" j& l2 K  ?( B, ?  R ) O" U) |3 V5 w1 g% ?" v) c
     ' G. R' X( [. T9 N  S) v
     
    # A. M7 ~: k9 ^- V4 \- _% u% K 
    * i  w) `, c% n% [ 
    2 I6 `9 A* s' w* U; g# F# K) P3 {- x7 y+ x2 [; T. @. f
    ) P/ @4 l0 n0 \: N; G& `: r
    " T2 E2 V: B* v" R' p
      " v0 s# h/ b# y6 Q; h
    : [' C* ^3 ]* o& e$ V0 n) ~) b
    ! R; ]( [) k; f

    0 a4 Z4 m$ n- R- u" k# B7 W9 ^(5)
    5 l* O1 Q& |! X5 p* i3 r$ fStep3: Evaluating the suspected degrees
    % F- {3 b8 a0 A1 z- s" BAccording to the expression:3 `; j, z. Y  O7 l- O
     
    , g/ R7 m6 F' G2 a" |: R  T7 b0 T, G5 G" f6 i, g3 p3 K! p
    2 [4 y0 B0 y% X* N, B# Z6 T
    ) r& c) i9 p5 z' y4 k: B: K  P) G
      836 Y' S- {# f1 |1 J
    15 h+ q3 V' r5 L( z* N& X* x6 F0 [
    83$ N! a) X4 f2 Q! L( f
    11 w8 l  O6 ~2 \' }6 W- D
    i
    ; E6 u) I7 z- K! h- R4 j" _/ r8 Nij0 c3 k2 z( ^- {2 g2 r' ^
    i! n* B1 y9 X; ]. X% b
    ij7 {2 N; Z( s# J" _5 l5 t
    A6 _+ g  g0 M, c( `  z7 }
    a, M* x, k2 q  T/ k# }/ B. l- j
    B k (6), @% t" c& _7 e- X# N% d- v
    Note: Bk  stands for the k th's information of suspected degrees, ij a stands for3 c) h$ n+ u" c  @
    the value of the i th row and the j th colunm in the matrix,- q6 X& W3 k) j+ }1 B
    1 0& u$ G/ Z/ O: A' b1 k, t( D3 R
    0 0, ^7 r' H  j6 N2 m* @% X
    ij
    0 {: `. p8 n! m# R; c( Gij
    ' |; Z. c  i" q+ gij
    ( X4 l* s4 y% P5 X3 Aif a; @6 X7 a6 j  J' C8 S
    A& P5 |* o6 ?: M: r3 [
    if a
    # T) A4 {, S  l 9 c$ s; I3 D1 n. D3 B( b8 V( I
     7 a+ f2 A% d* r6 w  W2 g* D; P6 ]; G1 X
     0 M3 H) ?4 W- s
    (7)
    ! y5 P6 j9 A: d% h) T* C& BFigure out the suspected degrees of the individual staff received or sent out the- X$ X- g/ S% q: A1 M
    information, and then rank the suspected degree with decreasing order.0 g! n, G: \, [
    We can size down the degree of suspicion through the above three steps. The results$ J. O6 O0 a: Y% H, r/ ^
    as follows:9 a) {/ [* W1 \& E' S
    Table 2 Suspect sort
    $ R, B( `+ `7 I2 a/ {Rank No. Name
    6 j: W( S# [! W" m2 h# g4 _" T1 54 Ulf
    - i  J" Y/ {$ V4 F2 81 Seeni
    - h- |4 w) I9 n% ^: ?+ E3 73 Carina
    . i% ~( h! s+ I; C( I  H( q4 21 Alex: u+ C1 v: f" S1 V. \) \7 L6 N
    5 67 Yao# V" k- _9 I- Q  L
    6 33 Kim5 l' \8 A$ d7 T0 o* K- R7 W$ A
    7 49 Harvey" z) I3 \7 ~( d/ ?7 L) T  I5 I
    8 7 Elsie
    ( d0 @# V5 c1 R1 q; K* U9 60 Lars
    : i* w* C0 c2 B) ?10 51 Dayi/ {( r+ M. @3 X( I, [. G$ T
    Team#15783 page 9 of 15
    0 S; ]3 \. c$ a/ @8 A  Y+ o. Pcontinued, ~7 q! R% v; L2 q( b/ s
    3.5 Consider the additional datas  Z& t/ n2 ], x+ T3 M) P  s
    According to the meaning of the question, the second question and the first question bring out the best in each other, their model are similar. Just on the basis of the original condition to put more conducive to survey the conditions, so in this question we just improve and tidy the model in the first question. The process of finding core people is similar to the first question. According to the meaning of the question, we put Chris into this crime group, and then calculate respectively the degree of correlation of the new crime group with the company internal group. After that sort them to find out more suspected of personnel. In addition to cofirming suspected information , we according to the characteristics of the corporate crime remaining information confirm that has relationship with the budget and economic , internal personnel dispatch and daily life. In daily life for the standard for stratification, roughly divided into the following levels: A.1,7,11,13 as being suspected uncertainty information, and set the value of suspected degree information at one; B. 14, 2 is definition as the larger suspected degrees information, and set the value of suspected degree information at 0.75; C.5,6,10,15 is definition as the smaller suspected degrees information, and set the value of suspected degree information at 0.5;. _  ~+ L: J# n' Z& @
    D. 3,4,8,9,12 is definition as the smallest suspected degrees information ,and set the value of suspected degree information at 0.25; This can create a correlation matrix as follows:& O7 b  W3 j$ ?9 r, e
    Rank: X8 v* V; P7 ]& w/ P" U
    No.( {1 G- z6 Z# |& m6 ^
    Name
    6 x2 u$ L5 ~) L; Q8 G5 B9 j+ @11  a( Z* p2 w* M9 s  X) @
    66
    . D4 w- O9 N& _Melia
    ; r  \; F8 Y6 ]& \124 o8 ]2 r$ G9 g6 I' i+ a
    57
    5 v; [# \; }) g( G0 z3 z7 |2 @Sheng
    : n0 h. K% o6 n, I% S  Y6 c1 X: t" b. V13+ ^& @- o/ ^' W8 R& Y0 k& G3 K
    18
    % e# N- w1 L/ V. g: l0 X- ?Jean
    & r. f# ?" G& G& {0 j) i. c14
    5 F( s9 Y$ A1 H6 ?4 J5 `43# D% `( K, @7 t
    Paul
    , R2 _5 a7 t9 A4 _( S1 u" d  \% l15
    # @& _2 j/ c2 I6 \- g* V16
    7 f4 A2 q0 H$ ]! g. ^( e! ?Jerome
    0 J% O, E$ `6 m7 J' c8 A, A16
    3 r+ F9 l0 ?4 |! U56
    2 d6 W' l) }3 r  k% z0 l: KCha
    3 i- W$ K: E* p1 _17
    " ^" S9 Z- Z  c$ x' T6 e46
    9 R! R. S& t: p3 q  M( aLouis* i1 ~# `/ ^9 D, D4 }! y3 ~& v
    18
    " [) n* w7 }4 C  l5 n+ Z20& h% j4 V9 e( n+ c( a4 C& U
    Crystal- z* j4 L; J" h1 I$ N  V( g3 K$ U
    Team#15783 page 10 of 15
    + d6 V, N' l" b+ R, |- r* U6 [0 0 1.25 0
    * U7 p4 o$ Q1 y9 c$ s0
    , @8 @" m& y2 c3 ]* t2.25
    * q/ l' c) `1 w0.5; K: r2 e* ?6 i, q0 p+ F3 ?2 `( ]
    0 05 m2 v* n' C$ H
    0 0* o' j+ }3 [8 S$ V: M! ]/ |
     
      P5 [1 O/ o% h2 X  `% g/ [, @4 f' s3 J 
    8 a; C. I3 g9 t' N- @; C: k9 {" E & d% d) ~' I% p! s
     
    + a$ \5 L, }2 f% D3 C4 g 
    - I0 P2 _  c5 q& s" E 
    % X/ |# T, c# B: R 
    # K3 c3 ?, h. D) B! [7 ? : P2 o9 c+ c; k
     ' [; y2 s8 }9 x! z  B3 {2 S
     * {6 Y3 ?/ P& Y4 z# W* w5 }1 K
       W; `9 D- a( a5 e6 ~& V8 Y& I
    2 m9 I7 @* O; b1 w+ U
       * U% d7 C% K2 _+ o
       : l3 P1 {4 Y& u% B
     3 z" M. q; `& Q
    (8)
    , _% N/ E- ]! d' T/ k; vOperator again with the previous methods, we can get the suspected degree of all
    ! h, Y( M0 w; S1 A0 h" _7 Fmembers . Prioritize on the results obtained above, the suspected persons are as
    + ^, v7 r# F  [following table
    : M& `6 X- }6 rTable 3 Suspect sort
    9 W+ J2 |5 Y( m- |' o4 Computer processing* @" O1 W- t7 w
    4.1 Analysis
    5 q' @  ]( B- L6 Q) D+ ? The criminal process often involves a lot of people. In the detection process,. i* u# N1 Q0 A1 x9 [' @- c
    manual processing of criminal information is a very complex,and this can easily
    7 G3 l4 V  w9 t% v% I+ h, J5 gcase errors. So we need to find some other ways to reduce errors.' N" i' `! J' x
     With the development of computer technology , computer process data can be
    . E& ~$ t% ~. \7 t0 JRank No. Name3 c9 i/ O) _* D! d
    1 54 Ulf
    2 @$ c+ P! t; O+ n: t- U2 81 Seeni- I; Y" |* R+ s- a% z2 u7 x
    3 21 Alex9 r  d% ?1 n$ g; G4 h& C7 J
    4 73 Carina
    . ?$ Z+ n  S, f4 t5 67 Yao
    3 d" o7 G8 u4 Q/ `% l5 z6 33 Kim
    ' M9 H6 h& \" @2 n; F5 K7 49 Harvey  N: w: \" l4 o7 w1 G7 W
    8 66 Melia
    . Z. a" F/ n' c; U1 G  J3 C/ k9 7 Elsie. k0 i/ \  x, `  N. _2 _
    10 2 Paige
    . p1 E6 S; f* A' g- Q8 @11 60 Lars
    1 r9 A1 y5 @6 g# F, y* {12 51 Dayi) |3 G: e% S9 v4 e5 @$ v
    13 56 Cha- _* i0 F4 |" m& i8 Z1 j# ]: [, V5 w
    14 57 Sheng  L+ A9 p# d: z8 v% ]
    15 43 Paul
    : A2 f: v; K& u9 {! H16 16 Jerome
    - h% U3 c; I3 W$ Y17 18 Jean$ ]6 w+ e2 G3 l: E9 N
    18 0 Chris
    3 A4 Q. y7 J$ @! L- F& KTeam#15783 page 11 of 15
    # t8 V- M8 f! u8 t# Q, q" Vboth
    zan
    转播转播0 分享淘帖0 分享分享0 收藏收藏0 支持支持0 反对反对0 微信微信

    1

    主题

    9

    听众

    1747

    积分

  • TA的每日心情
    开心
    2016-7-26 21:58
  • 签到天数: 182 天

    [LV.7]常住居民III

    社区QQ达人

    群组2014年美赛冲刺培训

    群组数学建模培训课堂1

    群组物联网工程师培训

    群组2014年网络挑战赛交流

    回复

    使用道具 举报

    3

    主题

    10

    听众

    253

    积分

    升级  76.5%

  • TA的每日心情
    无聊
    2014-12-12 17:50
  • 签到天数: 24 天

    [LV.4]偶尔看看III

    新人进步奖

    群组各种优秀论文集锦

    群组2014美赛ICMC题备战群

    群组2014美赛MCMB题备战群

    群组2014美赛MCMA题备战群

    回复

    使用道具 举报

    buptwayne        

    0

    主题

    8

    听众

    19

    积分

    升级  14.74%

  • TA的每日心情
    开心
    2014-2-9 11:43
  • 签到天数: 9 天

    [LV.3]偶尔看看II

    回复

    使用道具 举报

    刘李     中国数模人才认证   

    20

    主题

    8

    听众

    141

    积分

    升级  20.5%

  • TA的每日心情
    开心
    2013-2-5 00:49
  • 签到天数: 11 天

    [LV.3]偶尔看看II

    回复

    使用道具 举报

    王jy        

    0

    主题

    7

    听众

    11

    积分

    升级  6.32%

  • TA的每日心情
    开心
    2013-2-2 19:00
  • 签到天数: 2 天

    [LV.1]初来乍到

    自我介绍
    haoren
    回复

    使用道具 举报

    刘李     中国数模人才认证   

    20

    主题

    8

    听众

    141

    积分

    升级  20.5%

  • TA的每日心情
    开心
    2013-2-5 00:49
  • 签到天数: 11 天

    [LV.3]偶尔看看II

    回复

    使用道具 举报

    果粒        

    1

    主题

    7

    听众

    23

    积分

    升级  18.95%

  • TA的每日心情
    奋斗
    2014-2-21 16:27
  • 签到天数: 7 天

    [LV.3]偶尔看看II

    自我介绍
    加油
    好难懂啊~~现在看到英语就头疼了!但是现在只有硬着头皮看了!!加油加油!!!
    回复

    使用道具 举报

    刘李     中国数模人才认证   

    20

    主题

    8

    听众

    141

    积分

    升级  20.5%

  • TA的每日心情
    开心
    2013-2-5 00:49
  • 签到天数: 11 天

    [LV.3]偶尔看看II

    回复

    使用道具 举报

    您需要登录后才可以回帖 登录 | 注册地址

    qq
    收缩
    • 电话咨询

    • 04714969085
    fastpost

    关于我们| 联系我们| 诚征英才| 对外合作| 产品服务| QQ

    手机版|Archiver| |繁體中文 手机客户端  

    蒙公网安备 15010502000194号

    Powered by Discuz! X2.5   © 2001-2013 数学建模网-数学中国 ( 蒙ICP备14002410号-3 蒙BBS备-0002号 )     论坛法律顾问:王兆丰

    GMT+8, 2026-4-15 05:04 , Processed in 0.810027 second(s), 101 queries .

    回顶部