{"id":"https://openalex.org/W4224025773","doi":"https://doi.org/10.1145/3512850.3512865","title":"Research on Locking Suspect by Using Mathematical Model","display_name":"Research on Locking Suspect by Using Mathematical Model","publication_year":2022,"publication_date":"2022-01-11","ids":{"openalex":"https://openalex.org/W4224025773","doi":"https://doi.org/10.1145/3512850.3512865"},"language":"en","primary_location":{"id":"doi:10.1145/3512850.3512865","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3512850.3512865","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 The 8th International Conference on Computing and Data Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058557321","display_name":"Xianyu Meng","orcid":null},"institutions":[{"id":"https://openalex.org/I2800710378","display_name":"Naval University of Engineering","ror":"https://ror.org/056vyez31","country_code":"CN","type":"education","lineage":["https://openalex.org/I2800710378"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xianyu Meng","raw_affiliation_strings":["Naval University of Engineering, China"],"affiliations":[{"raw_affiliation_string":"Naval University of Engineering, China","institution_ids":["https://openalex.org/I2800710378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064164280","display_name":"Liangli Ma","orcid":null},"institutions":[{"id":"https://openalex.org/I2800710378","display_name":"Naval University of Engineering","ror":"https://ror.org/056vyez31","country_code":"CN","type":"education","lineage":["https://openalex.org/I2800710378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liangli Ma","raw_affiliation_strings":["Naval University of Engineering, China"],"affiliations":[{"raw_affiliation_string":"Naval University of Engineering, China","institution_ids":["https://openalex.org/I2800710378"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017947603","display_name":"Yingxue Zhou","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yingxue Zhou","raw_affiliation_strings":["Gedian Senior Middle School, China"],"affiliations":[{"raw_affiliation_string":"Gedian Senior Middle School, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5058557321"],"corresponding_institution_ids":["https://openalex.org/I2800710378"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.02853976,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"105","last_page":"110"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9700000286102295,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9700000286102295,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10574","display_name":"Crime Patterns and Interventions","score":0.9251000285148621,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9214000105857849,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.7169946432113647},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7140504121780396},{"id":"https://openalex.org/keywords/suspect","display_name":"Suspect","score":0.6882351636886597},{"id":"https://openalex.org/keywords/operability","display_name":"Operability","score":0.6077374815940857},{"id":"https://openalex.org/keywords/rationality","display_name":"Rationality","score":0.5218833088874817},{"id":"https://openalex.org/keywords/offender-profiling","display_name":"Offender profiling","score":0.4715326428413391},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4231053292751312},{"id":"https://openalex.org/keywords/criminology","display_name":"Criminology","score":0.17363771796226501},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.13638582825660706},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.09099230170249939},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.07723075151443481}],"concepts":[{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.7169946432113647},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7140504121780396},{"id":"https://openalex.org/C2778223634","wikidata":"https://www.wikidata.org/wiki/Q224952","display_name":"Suspect","level":2,"score":0.6882351636886597},{"id":"https://openalex.org/C126231374","wikidata":"https://www.wikidata.org/wiki/Q1061298","display_name":"Operability","level":2,"score":0.6077374815940857},{"id":"https://openalex.org/C201717286","wikidata":"https://www.wikidata.org/wiki/Q938185","display_name":"Rationality","level":2,"score":0.5218833088874817},{"id":"https://openalex.org/C552425265","wikidata":"https://www.wikidata.org/wiki/Q1191309","display_name":"Offender profiling","level":3,"score":0.4715326428413391},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4231053292751312},{"id":"https://openalex.org/C73484699","wikidata":"https://www.wikidata.org/wiki/Q161733","display_name":"Criminology","level":1,"score":0.17363771796226501},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.13638582825660706},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.09099230170249939},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.07723075151443481},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3512850.3512865","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3512850.3512865","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 The 8th International Conference on Computing and Data Engineering","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2892088466"],"related_works":["https://openalex.org/W2902539404","https://openalex.org/W2507647350","https://openalex.org/W2546153775","https://openalex.org/W2529294474","https://openalex.org/W2285395182","https://openalex.org/W190036819","https://openalex.org/W126188212","https://openalex.org/W2095212182","https://openalex.org/W3112907311","https://openalex.org/W2729849091"],"abstract_inverted_index":{"In":[0,138],"the":[1,6,15,18,23,31,37,40,47,58,67,88,92,103,111,117,131,136,139,148],"case":[2],"of":[3,8,17,22,33,39,43,49,61,72,91,106,135,150],"serial":[4,34,62,79],"crimes,":[5,73],"method":[7,84],"Geographic":[9,59],"Profiling":[10,60],"can":[11],"aid":[12],"us":[13],"in":[14],"prediction":[16,76,83,104],"most":[19],"probable":[20],"residence":[21],"offender.":[24],"It":[25],"provides":[26],"a":[27,126,143],"significant":[28],"guidance":[29],"for":[30,78],"investigation":[32],"crimes.":[35,63,80],"On":[36],"basis":[38],"decay":[41],"principle":[42],"Criminological":[44],"Psychology":[45],"and":[46,70,101,133],"phenomenon":[48],"buffer":[50],"zone,":[51],"we":[52,74,109,129,141],"develop":[53,75],"two":[54],"models":[55,77],"to":[56,115,125],"generate":[57],"Taking":[64],"into":[65],"consideration":[66],"available":[68],"time":[69],"sites":[71],"A":[81],"comprehensive":[82],"is":[85],"established":[86],"through":[87],"computer":[89],"simulation":[90],"model.":[93,137],"By":[94,121],"combining":[95],"Model":[96,99,107],"I":[97],"with":[98],"II":[100],"modifying":[102],"results":[105],"III,":[108],"obtain":[110],"Incorporated":[112],"Prediction":[113],"Method":[114],"predict":[116],"next":[118],"crime":[119],"site.":[120],"applying":[122],"Geographical":[123,152],"Profile":[124],"specific":[127],"case,":[128],"verify":[130],"rationality":[132],"operability":[134],"end,":[140],"present":[142],"non-technical":[144],"executive":[145],"summary":[146],"concerning":[147],"application":[149],"this":[151],"Profile.":[153]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
