|本期目录/Table of Contents|

[1]沈兵,胡啸峰,吴建松.社区治安高危人员异常轨迹识别与预警方法研究*[J].中国安全生产科学技术,2021,17(4):171-177.[doi:10.11731/j.issn.1673-193x.2021.04.028]
 SHEN Bing,HU Xiaofeng,WU Jiansong.Research on identification and early-warning method of abnormal trajectories for high-risk community security personnel[J].JOURNAL OF SAFETY SCIENCE AND TECHNOLOGY,2021,17(4):171-177.[doi:10.11731/j.issn.1673-193x.2021.04.028]
点击复制

社区治安高危人员异常轨迹识别与预警方法研究*
分享到:

《中国安全生产科学技术》[ISSN:1673-193X/CN:11-5335/TB]

卷:
17
期数:
2021年4期
页码:
171-177
栏目:
职业安全卫生管理与技术
出版日期:
2021-04-30

文章信息/Info

Title:
Research on identification and early-warning method of abnormal trajectories for high-risk community security personnel
文章编号:
1673-193X(2021)-04-0171-07
作者:
沈兵胡啸峰吴建松
(1.中国人民公安大学 信息网络安全学院,北京 100076;
2.安全防范技术与风险评估公安部重点实验室,北京 100076;
3.中国人民公安大学 公共安全行为科学实验室,北京 100038;
4.中国矿业大学(北京) 应急管理与安全工程学院,北京 100083)
Author(s):
SHEN Bing HU Xiaofeng WU Jiansong
(1.School of Information and Network Security,People's Public Security University of China,Beijing 100076,China;
2.Key Laboratory of Security Prevention and Risk Assessment,Ministry of Public Security,Beijing 100076,China;
3.Public Security Behavioral Science Lab,People’s Public Security University of China,Beijing 100038,China;
4.School of Emergency Management and Safety Engineering,China University of Mining and Technology (Beijing),Beijing 100083,China)
关键词:
社区治安高危人员异常轨迹识别行为链轨迹标定序列化建模
Keywords:
high-risk community security personnel abnormal trajectory identification behavior chain trajectory calibration sequential modeling
分类号:
X956;X913.4
DOI:
10.11731/j.issn.1673-193x.2021.04.028
文献标志码:
A
摘要:
为解决社区治安高危人员异常轨迹难以实时感知、精确识别、及时预警的问题,对社区治安高危人员动态轨迹进行标定,并建立动态轨迹序列化模型,通过序列化模型构建动态行为链;根据静态身份属性与动态轨迹时空特征信息,建立异常轨迹分析模型。结果表明:动态轨迹标定可实现对GPS轨迹数据高效、准确标定;异常轨迹分析模型可实现异常轨迹识别与预警。研究结果适用于社区高危人群管控,可为社区治安防控提供技术支持。
Abstract:
In order to solve the problem that the abnormal trajectories of high-risk community security personnel are difficult to perceive in real-time,identify accurately and conduct early-warning timely,the calibration and sequential modeling on the dynamic trajectories of high-risk community security personnel were conducted,and based on the static identity attribute information and the temporal and spatial characteristic information of dynamic trajectory of the high-risk community security personnel,an analysis model of abnormal trajectory was established.Finally,a case study was conducted based on the Geolife dynamic trajectory dataset.The results showed that the proposed dynamic trajectory calibration method could achieve the efficient and accurate trajectory calibration of GPS trajectory data.The sequential modeling method of dynamic trajectory could construct a dynamic behavior chain based on the calibration results of dynamic trajectory.The analysis model of abnormal trajectory could realize the identification and early-warning of the abnormal trajectories of personnel.The results can be applied in the fields such as the management and control of high-risk community security personnel,and are expected to provide technical support for the community security prevention and control work.

参考文献/References:

[1]张远煌,操宏均.恶性暴力犯罪的发生机理与防控对策反思——以周克华系列持枪抢劫案为视角[J].法治研究,2013(8):117-124 ZHANG Yuanhuang,CAO Hongjun.The occurring mechanism of vicious violent crimes and reflections on prevention and control countermeasures,from the prospective of Zhou Kehua’s Series of robbery with guns[J].Research on Rule of Law,2013(8):117-124.
[2]王占军.重点人口动态管控服务体系建构研究[J].中国刑警学院学报,2018(2):55-60. WANG Zhanjun.Study on service system construction of dynamic control of monitored population[J].Journal of Criminal Investigation Police University of China,2018(2):55-60.
[3]中华人民共和国公安部.2018年中国毒品形势报告[R/OL].(2019-06-18)[2019-06-18].http://www.gov.cn/xinwen/2019-06/18/content_5401230.htm.
[4]OZER M,KELES I,TOROSLU I H,et al.Predicting the change of location of mobile phone users[C]//Proceedings of the Second ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems.2013:43-50.
[5]YU Z G.Trajectory data mining:an overview[J].Acm Transactions on Intelligent Systems & Technology,2015,6(3):1-41.
[6]LEE J G,HAN J,LI X.Trajectory outlier detection:a partition-and-detect framework[C]//2008 IEEE 24th International Conference on Data Engineering.IEEE,2008:140-149.
[7]张宇迪.基于WiFi的异常轨迹预警系统设计与实现[D].贵阳:贵州大学,2017.
[8]吉根林,赵斌.时空轨迹大数据模式挖掘研究进展[J].数据采集与处理,2015,30(1):47-58 JI Genlin,ZHAO Bin.Research process in pattern mining for big spatio-temporal trajectories[J].Journal of Data Acquisition and Processing,2015,30(1):47-58.
[9]仇功达,何明,杨杰,等.异常轨迹数据预警与预测关键技术综述[J].系统仿真学报,2017,29(11):2608-2617. CHOU Gongda,HE Ming,YANG Jie,et al.Key technologies of precaution and prediction of abnormal spatial-temporal trajectory:areview of recent advances[J].Journal of System Simulation,2017,29(11):2608-2617.
[10]YU Y,CAO L,RUNDENSTEINER E A,et al.Detecting moving object outliers in massive-scale trajectory streams[C]//Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining.2014:422-431.
[11]OMPRAKASH K,ABDUl H A,YUE C,et al.Internet of vehicles:motivation,layered architecture network model challenges and future aspects[J].IEEE Access,2016,9:5356-5373.
[12]WANG Q,LYU W,DU B.Spatio-temporal anomaly detection in traffic data[C]//Proceedings of the 2nd International Symposium on Computer Science and Intelligent Control.2018:1-5.
[13]WANG Y H.GONALO HAC,BARTVAN A,et al.Understanding travellers’ preferences for different types of trip destination based on mobile internet usage data[J].Transportation Research Part C:Emerging Technologies,2018,90:247-259.
[14]林强,张淋均,谢艾伶,等.不安全越界行为的个性化实时检测[J].计算机科学与探索,2020,6(14):1017-1027. LIN Qiang,ZHANG Linjun,XIE Ailing,et al.Personalized real-time detection of unsafe boundary transgression[J].Journal of Frontiers of Computer Science and Technology,2020,6(14):1017-1027.
[15]董观利,宋春林.基于视频的矿井行人越界检测系统[J].工矿自动化,2017(2):29-34. DONG Guanli,SONG Chunlin.Underground pedestrian crosing detection system based on video[J].Industry and Mine Automation,2017(2):29-34.
[16]顾国强.基于智能识别的人员密集场所安防预警系统[J].港口科技,2019(8):19-23. GU Guoqiang.Early warning system for crowded places based on intelligent recognition[J].Journal of Port Science and Technology,2019(8):19-23.
[17]ESTER M,KRIEGEL H P,SABDER J,et al.A density-based algorithm for discovering clusters in large spatial databases with noise[J].AAAI Press,1996(37):226-231.
[18]司鹄,贾文梅.城市公共安全风险评估指标敏感性分析[J].中国安全生产科学技术,2014,10(11):71-76. SI Hu,JIA Wenmei.Analysis on sensitivity of indexes for risk assessment on urban public safety[J].Journal of Safety Science and Technology,2014,10 (11):71-76.
[19]孙华丽,项美康,薛耀锋.超大城市公共安全风险评估、归因与防范[J].中国安全生产科学技术,2018,14(8):74-79. SUN Huali,XIANG Meikang,XUE Yaofeng.Assessment,attribution and prevention of public safety risk in megacity[J].Journal of Safety Science and Technology,2018,14 (8):74-79.
[20]YU Z,YU K C,XING X,et al.GeoLife 2.0:a location-based social networking service[A]:IEEE,2009:357-358.
[21]ZHENG Y,ZHANG L,XIE X,et al.Mining interesting locations and travel sequences from GPS trajectories[C]//Proceedings of the 18th International Conference on World Wide Web.2009:791-800.

相似文献/References:

备注/Memo

备注/Memo:
收稿日期: 2020-07-29
* 基金项目: 国家重点研发计划项目( 2018YFC0809700);公安部科技强警基础工作专项项目( 2018GABJC01)
作者简介: 沈兵,硕士研究生,主要研究方向为机器学习与社会安全风险评估。
通信作者: 胡啸峰,博士,副教授,主要研究方向为风险评估与预测预警技术。
更新日期/Last Update: 2021-05-09