Loading [MathJax]/jax/output/SVG/jax.js

Lyapunov stability analysis of networks of scalar conservation laws

  • Received: 01 June 2007 Revised: 01 August 2007
  • Primary: 34D20, 35L65.

  • It is shown how an entropy-based Lyapunov function can be used for the stability analysis of equilibria in networks of scalar conservation laws. The analysis gives a sufficient stability condition which is weaker than the condition which was previously known in the literature. Various extensions and generalisations are briefly discussed. The approach is illustrated with an application to ramp-metering control of road traffic networks.

    Citation: Georges Bastin, B. Haut, Jean-Michel Coron, Brigitte d'Andréa-Novel. Lyapunov stability analysis of networks of scalar conservation laws[J]. Networks and Heterogeneous Media, 2007, 2(4): 751-759. doi: 10.3934/nhm.2007.2.751

    Related Papers:

    [1] Shiyou Chen, Baohui Li, Lanlan Rui, Jiaxing Wang, Xingyu Chen . A blockchain-based creditable and distributed incentive mechanism for participant mobile crowdsensing in edge computing. Mathematical Biosciences and Engineering, 2022, 19(4): 3285-3312. doi: 10.3934/mbe.2022152
    [2] Xiang Gao, Yipeng Zhang . Advancing remote consultation through the integration of blockchain and ant colony algorithm. Mathematical Biosciences and Engineering, 2023, 20(9): 16886-16912. doi: 10.3934/mbe.2023753
    [3] Roman Gumzej . Intelligent logistics systems in E-commerce and transportation. Mathematical Biosciences and Engineering, 2023, 20(2): 2348-2363. doi: 10.3934/mbe.2023110
    [4] Xiwen Qin, Chunxiao Leng, Xiaogang Dong . A hybrid ensemble forecasting model of passenger flow based on improved variational mode decomposition and boosting. Mathematical Biosciences and Engineering, 2024, 21(1): 300-324. doi: 10.3934/mbe.2024014
    [5] Marco Roccetti . Predictive health intelligence: Potential, limitations and sense making. Mathematical Biosciences and Engineering, 2023, 20(6): 10459-10463. doi: 10.3934/mbe.2023460
    [6] Zhanying Tong, Yingying Zhou, Ke Xu . An intelligent scheduling control method for smart grid based on deep learning. Mathematical Biosciences and Engineering, 2023, 20(5): 7679-7695. doi: 10.3934/mbe.2023331
    [7] Dawei Li, Enzhun Zhang, Ming Lei, Chunxiao Song . Zero trust in edge computing environment: a blockchain based practical scheme. Mathematical Biosciences and Engineering, 2022, 19(4): 4196-4216. doi: 10.3934/mbe.2022194
    [8] Xiang Nan, Kayo kanato . Role of information security-based tourism management system in the intelligent recommendation of tourism resources. Mathematical Biosciences and Engineering, 2021, 18(6): 7955-7964. doi: 10.3934/mbe.2021394
    [9] Chengzhi Jiang, Hao Xu, Chuanfeng Huang, Yiyang Chen, Ruoqi Zou, Yixiu Wang . Research on knowledge dissemination in smart cities environment based on intelligent analysis algorithms: a case study on online platform. Mathematical Biosciences and Engineering, 2021, 18(3): 2632-2653. doi: 10.3934/mbe.2021134
    [10] Zhongxue Yang, Yiqin Bao, Yuan Liu, Qiang Zhao, Hao Zheng, Wenbin Xu . Lightweight blockchain fuzzy decision scheme through MQTT and Fibonacci for sustainable transport. Mathematical Biosciences and Engineering, 2022, 19(12): 11935-11956. doi: 10.3934/mbe.2022556
  • It is shown how an entropy-based Lyapunov function can be used for the stability analysis of equilibria in networks of scalar conservation laws. The analysis gives a sufficient stability condition which is weaker than the condition which was previously known in the literature. Various extensions and generalisations are briefly discussed. The approach is illustrated with an application to ramp-metering control of road traffic networks.


    Smart cities can make full use of remote sensing data to analyze and integrate various important pieces of information from the urban core system, so as to make intelligent responses to various services of public safety and transportation. However, some people seldom pay attention to their property when taking public transport in smart cities, which provides opportunities for pickpockets [1]. Although considerable manpower and material resources have been allocated, many pickpockets still do not get caught, which brings risks to the people's property safety. Therefore, it is very important to intelligently identify pickpockets and their groups in smart cities [2]. Smart cities use Internet of Things (IOT) to break down the data islands between devices and organizations, and combine technologies such as wireless sensor networks and cloud computing. It can provide various data for pickpocket detection [3,4], which is of great significance to understand the identity characteristics and travel mode of passengers. Considering the huge differences between pickpockets and normal passengers in travel time, visited stations and stay time, it is possible to find potential pickpockets and groups through exploration of ticketing data provided by the IOT [5,6]. However, it is difficult to accurately identify pickpocketing groups within massive data. Crowdsensing can solve this problem, through adopting the various real-time data collected by the IOT sensors, and then intelligently processing the data by machine learning methods running in the cloud to complete large-scale pickpocketing group identification [7,8].

    How can suspicious individuals be detected in a large amount of data to avoid false-positives? There are thousands of passengers traveling every day, and pickpockets are only a tiny part of them. To detect suspicious individuals in such large-scale data, we need to filter the passengers who have completely normal travel modes and are unlikely to be pickpockets [9]. Therefore, we use the collected ticketing data and geographic information data to extract the temporal, spatial and social features of passengers. Through the combined analysis of various features, the normal individuals are filtered out before pickpocketing individual detection, which greatly improves the performance of our algorithm.

    How to accurately identify pickpocketing groups among suspicious individuals is a key research topic of this paper [10]. Members of groups often show strong correlations in temporal, spatial, social and identity features. The correlations exist not only in the space-time domain, but also fellow villagers and fellow criminals who are active in the same area and are more likely to form groups to commit crimes together. However, existing studies rarely pay attention to multi-factor correlation combinations for pickpocketing group identification [11]. In this paper, we use the weighted combination similarity of multi-factor features to measure the correlation between members. Furthermore, the pickpocketing groups are mainly small groups composed of two to three people, while the traditional algorithms tend to combine small groups into unified large groups.

    The contributions of this paper are summarized as follows:

    (1) We propose an IForest-FD pickpocketing individual detection algorithm. The IForest algorithm is used to filter the abnormal individuals using temporal, spatial and social features. Through the filtered results, the FD algorithm learns the combination relationship between low-order and high-order features to improve the accuracy of identifying pickpockets, which is composed of FM [12] and DNN [13].

    (2) We propose a CRS-Louvain pickpocketing group identification algorithm. Based on the idea of crowdsensing, we measure the similarity of temporal, spatial, social and identity features among the pickpocketing individuals. We use the weighted combination similarity as an edge weight to construct the pickpocketing association graph. Furthermore, the CRS-Louvain algorithm improves the modularity of the Louvain algorithm [14] to overcome the limitation that small-scale communities cannot be identified.

    Based on massive sensing data, pickpocketing individuals and groups can be identified. It is mainly to be able to identify the behavioral characteristics differences between pickpocketing individuals and normal passengers and similar behavioral characteristics among members of the group. At present, relevant researches mainly include two aspects: pickpocketing individual detection and pickpocketing group identification.

    The purpose of pickpocketing individual detection is to use the crime related data and intelligent analysis technology to find individuals who are significantly different from most individuals, so as to assist law enforcement agencies in detecting for criminals. Ramachandran et al. [15] proposed an intelligent automatic system to detect behavior of the human in public places including such as fighting, pickpocketing and threatening. the behavior of humans was monitored using a convolution neural network (CNN), and multi-classifier support vector machines (MSVMs) were used on the various features scored to be able to predict activities. Tsiktsiris et al. [16] used deep learning and unsupervised approaches to detect abnormal events in autonomous vehicles including pickpocketing, bag snatching, fighting etc. Selvi et al. [17] introduced an enhanced convolutional neural network (ECNN)-based suspicious activity detection system to detect shooting and stealing. Pascale et al. [18] tested the performance of multiple federated devices encompassing drones, closed-circuit television, smart phone cameras and smart glasses to detect real-case scenarios of potentially malicious activities such as mosh pits and pickpocketing. All the above are based on the detection of abnormal individual behaviors in surveillance video data. For the detection of abnormal individuals in non-surveillance video data, the traditional methods are mainly based on statistical analysis to detect the criminals, which is seriously influenced by expert experience. To find pickpockets intelligently, the method based on machine learning has been widely used. Chen et al. [19] used the logistic regression (LR) algorithm to analyze the people with criminal records and found the individuals with the tendency of being repeat offenders. Du et al. [20] used the support vector machines (SVM) algorithm to detect potential pickpockets in the public transit systems. Ogunleye et al. [21] applied the XGBoost algorithm to detect abnormal individuals by using various features, and the algorithm has high performance. Gu et al. [22] analyzed the collected data of passengers entering the subway station and found the differences between pickpockets and normal passengers in terms of ride time, ride frequency, getting on and off the station, etc. Chun et al. [23] applied DNN to predict the influence of gender, age, race and previous record on whether individuals will commit crimes in the next few years and the severity of their crimes, and obtained good prediction results. Lu et al. [24] proposed a scheme combining principal component analysis (PCA) and gradient lifting tree (GBDT), which found out the crimes by analyzing the time of theft and the selected objects of theft cases in ShenZhen city in the past seven years.

    However, the pickpocketing individual detection algorithm based on machine learning is difficult to directly apply to practice because the experimental results tend to the negative ones with a larger proportion facing the imbalance of positive and negative samples. In order to overcome this problem, Xue et al. [25] pre-classified the data according to the features of common abnormal individuals "in-out in the same station". Pradhan et al. [26] undersampled a large negative sample and oversampled a small positive sample in the experiment. Du et al. [20] proposed an unsupervised LOF algorithm for anomaly detection to reduce data imbalance, and then used decision tree (DT), SVM and other algorithms for classification. This paper reduces data imbalance by using the IForest algorithm [27], which filters the abnormal individuals of each feature extracted from ticketing data because of its linear time complexity and the idea of integrated learning. From the filtered results, the FD algorithm learns the combination relationship between low-order and high-order features to improve the accuracy of identifying pickpockets.

    The key-point of pickpocketing group identification is how to explore the similarity between individuals in the group. The relationship between passengers can be quantified as the similarity in temporal, spatial, social and identity features. Previous studies in the field of crime have clearly pointed out that pickpocketing groups are mostly linked by geography or similar criminal experience. Zhang et al. [28] measured the temporal similarity of individuals by drawing individual time distribution histograms and calculating the earth mover's distances (EMD) between histograms. Liu et al. [29] developed a novel measure that simultaneously considers multiple dimensions of travel behavior to quantify intrapersonal variability. Zhao et al. [30] calculated the cumulative cosine similarity distance between sites based on probability. The study of Gravel et al. [31] shows that there is also convergence effect among individuals in criminal groups, and they tend to recruit people who share the same living space and social environment.

    To divide groups by the results of similarity measurement between individuals, an increasing number of scholars use machine learning. Wang et al. [32] proposed a density-based spatial clustering of applications with noise (DBSCAN) approach to recognize irregular travel groups based on cascade clustering, which divided the set of points with sufficiently high density into the same community. Troncoso et al. [33] considered the association between two criminal individuals, adopted the LiRAM algorithm based on the constrained shortest path length to classify criminal groups of social networks, and achieved certain results. Lim et al. [34] applied deep reinforcement learning (DRL) to process metadata such as wiretapping times, arrest warrants and judicial decisions, and constructed FDR-CNA algorithm. By taking the output result of DRL as the edge weight, the algorithm built a network to discover the relationship between criminals, and realized the effective identification of the internal membership relationship of criminal groups. Ma et al. [35] realized the community discovery of multi-layer networks by fusing nonnegative matrix factorization and topological structural information. Tayebi et al. [36] applied the Girvan-Newman algorithm based on a greedy strategy to detect offender groups as denser subgraphs of some co-offending network. Zhao et al. [37] applied the Louvain algorithm to find potential pickpocketing groups on buses, and achieved faster convergence speed and better division effect when there are more than five individuals. However, these are not ideal for identifying the small-scale groups. Considering that the small-scale groups of pickpockets account for a very high proportion, this paper proposes the CRS-Louvain algorithm to improve the modularity of the Louvain algorithm, which overcomes the limitation that small-scale groups cannot be identified.

    In this section, we introduce and describe the two algorithms proposed in this paper: IForest-FD pickpocketing individual detection algorithm and CRS-Louvain pickpocketing group identification algorithm. We mainly use the collected ticketing data, geographic information data and personnel identity data to analyze the ticket sales time, travel time, departure and arrival stations. Additionally, we extract the temporal, spatial, social features and passengers' identity features in the travel mode of passengers, and construct the model of pickpocketing individual detection and pickpocketing group identification.

    This paper includes two research aspects: pickpocketing individual detection and pickpocketing group identification. First, we propose an IForest-FD pickpocketing individual detection algorithm. The IForest algorithm is used to filter the abnormal individuals by temporal, spatial and social features. Through the filtered results and identity feature, the FD algorithm learns the combination relationship between low-order and high-order features to improve the accuracy of identifying pickpockets. Second, we propose a CRS-Louvain pickpocketing group identification algorithm. Based on the idea of crowdsensing, we measure the similarity of temporal, spatial, social and identity features among the pickpocketing individuals, and then use the weighted combination similarity as an edge weight to construct the pickpocketing association graph. Furthermore, the CRS-Louvain algorithm improves the modularity of the Louvain algorithm to overcome the limitation that small-scale communities cannot be identified. The overall flow of the model is shown in Figure 1.

    Figure 1.  The process of pickpocketing individual detection and group identification algorithms.

    The IForest-FD pickpocketing individual detection algorithm consists of two parts. First, the IForest algorithm is used to filter the abnormal individuals by analyzing the temporal, spatial and social features. Second, the FD algorithm is used for individual pickpocketing detection using the filtered individuals. The FD algorithm learns the combination relationship between low-order and high-order features to improve the accuracy of identifying pickpockets.

    The IForest algorithm [38] recursively divides the data space until only one tree in all subspaces reaches the upper limit height. Then, each tree is traversed from root to leaf, the average depth is calculated and the abnormal scores are estimated. The abnormal score of sample x is calculated by the following formula:

    s(x)=2E[h(x)]c(φ) (3.1)

    where h(x) is the height of sample x in the tree; E[.] represents the average of h(x) of all trees, and c(φ) is the average of path length when the number of samples φ is given. c(φ) is computed as follows:

    c(φ)={2H(φ1)2(φ1)/φ,φ>21,φ=20,φ<2 (3.2)

    where H(k)=ln(k)+ε, ε is Euler's constant. From the definition of an abnormal score, it can be seen that:

    s(x)={1,E[h(x)]00.5,E[h(x)]c(φ)0,E[h(x)]φ1 (3.3)

    If the value of s(x) is close to 1, the possibility of abnormal data is higher; otherwise the value of s(x) is close to 0, indicating that the possibility of abnormal data is lower.

    The FD algorithm is composed of two parts: Factorization Machines (FM) and DNN, as shown in Figure 2.

    Figure 2.  The architecture diagram of FD algorithm.

    The dense embedding layer compresses the input data into low-dimensional dense vectors to solve the problems of data sparsity and excessive dimension. The FM layer obtains the combination relations of first-order and second-order features, and the DNN layer determines the combination relations of high-order features. The FM layer and DNN layer both use vector features compressed by a dense embedding layer as input and are trained simultaneously. The final output result is shown:

    ˆy=Sigmoid(yFM+yDNN) (3.4)

    where ˆy(0,1) is the output of the whole algorithm, which is transformed into a binary identifier of the pickpocketing individual (0 or 1). yFM is the output of the FM layer, and yDNN is the output of the DNN layer.

    (1) FM algorithm. The FM algorithm solves the problem of feature combination of sparse data [39]. The algorithm can not only obtain the first-order features, but also capture the second-order features better through the inner product of vector features. The formula for this algorithm is shown below:

    yFM=wi,xi+di=1dj=i+1vi,vjxixj (3.5)

    where wiRd, viRk. d is the feature number and k is the vector dimension. wi,xi reflects the importance of first-order features, and di=1dj=i+1vi,vjxixj represents the second-order feature interactions.

    (2) DNN algorithm. The DNN algorithm is used to learn the interactions of high-order features. Before entering the hidden layer, the algorithm uses the dense embedding layer to compress the input vector into low-dimensional dense vectors for training [40]. The output of the dense embedding layer is:

    a(0)=[e1,e2,...,em] (3.6)
    ei=vfieldixfieldi (3.7)

    Then, input the value a(0) into the DNN algorithm, and its forward process can be expressed as:

    a(h+1)=σ(W(h)a(h)+b(h)) (3.8)

    where h is the number of layers and σ is the activation function. a(h) is the output of layer h. W(h) and b(h) are the weight and bias of the algorithm, respectively. After passing through H hidden layers, the output of the DNN algorithm is as follows:

    yDNN=σ(W|H|+1aH+b|H|+1) (3.9)

    Through the set of detected pickpocketing individuals, this paper proposes a CRS-Louvain pickpocketing group identification algorithm. Based on the idea of crowdsensing, we measure the similarity of temporal, spatial, social and identity features among the pickpocketing individuals. To represent the network relationships among individuals, we use the weighted combination similarity as the edge weight and the pickpocketing individuals as nodes to construct the pickpocketing association graph. Further, the CRS-Louvain algorithm improves the modularity of the Louvain algorithm to overcome the limitation that small-scale communities cannot be found.

    (1) Similarity of the temporal feature tSim(a,b). To reflect the difference between the probability of traveling between pickpockets a and b in a certain period of time, we constructed two histograms Ham and Hbm to represent the visited frequencies vai and vbj of pickpockets a and b in time periods tai and tbj.

    Ham={tai,vai}(0<in)Hbm={tbj,vbj}(0<jn) (3.10)

    Using the EMD distance of two frequency distribution histograms [41], we measure the difference between the two distributions and describe the temporal similarity tSim(a,b) between pickpockets a and b. The formula of tSim(a,b) is as follows:

    {i,jfij=min{ivai,jvbj},fij0dij=|taitbj|tSim(a,b)=ei,jfijdij (3.11)

    (2) Similarity of the spatial feature sSim(a,b). We use the weighted cosine similarity [42] to measure the spatial similarity of pickpockets a and b. The formula of sSim(a,b) is as follows:

    sSim(a,b)=niSaSbwaiwbiniSa(wai)2niSa(wbi)2 (3.12)

    where Sa and Sb are the sites visited by pickpocketing individuals a and b. wai and wbi are the frequencies of the site ni visited by individuals a and b. If the common visited site is empty, the value of sSim(a,b) is 0; otherwise the visited sites of a and b are the same, and the value of sSim(a,b) is 1.

    (3) Similarity of the social feature cSim(a,b). We construct the sequence ma and mb corresponding to the social features of pickpockets a and b. The negative exponent of the normalized Euclidean distance cDis(a,b) between two feature sequences is used to measure the similarity of individuals a and b in social features. The formulas of cDis(a,b) and cSim(a,b) are as follows:

    {cDis(a,b)=3n=1(mnamnn)2cSim(a,b)=eNor(cDis(a,b))σwhereσ=N(a,b)a,b=1cDis(a,b)2N(a,b) (3.13)

    where N(a,b) represents the number of pickpocketing individual pairs.

    (4) Similarity of the identity feature iSim(a,b). As pickpocketing groups are mostly organized as fellow villagers or criminals, this paper uses the Jaccard similarity coefficient [43] to measure the similarity between the household registration and criminal record. The calculation formula of iSim(a,b) is as follows:

    iSim(a,b)=|AB||AB|=|AB||A|+|B||AB| (3.14)

    where A={a1,a2}, a1 and a2 are the household registration and criminal record of pickpocketing individual a.

    (5) Weighted combination similarity WSim(a,b). WSim(a,b) is obtained by weighted combination of the similarity of tSim(a,b), sSim(a,b), cSim(a,b) and iSim(a,b). The calculation formula of WSim(a,b) is as follows:

    WSim(a,b)=I1×tSim(a,b)+I2×sSim(a,b)+I3×cSim(a,b)+I4×iSim(a,b) (3.15)

    where I1, I2, I3 and I4 are the weight coefficients of tSim(a,b), sSim(a,b), cSim(a,b), iSim(a,b), respectively.

    In=rPrnnrPrn (3.16)

    where Prn represents the value of pearson correlation coefficient [44] between the similarities r and n. rPrn represents the correlation between similarities n and other indicators. nrPrn is the correlation between any two similarities.

    In this paper, the association between pickpockets is regarded as an undirected weighted association graph G=(V,E), where V is the node set of undirected graph, which represents the set of pickpocketing individuals. E is the set of edges, which is the association of pickpockets a and b. The weighted combination similarity WSim(a,b) represents the edge weights of temporal, spatial, social and identity features.

    This paper proposes a CRS-Louvain algorithm for identifying pickpocketing groups. By improving the modularity used in the traditional Louvain algorithm [45], the CRS-Louvain algorithm effectively overcomes the limitation that small-scale communities cannot be identified. The formula of the traditional modularity Q is as follows:

    Q=12mi,j(AijkiKj2m)δ(Ci,Cj) (3.17)

    where Aij represents the edge weight between nodes i and j, m=12i,jAij. ki represents the degree of node i, ki=jAij. Ci represents the community of node i. If Ci is equal to Cj, then δ is 1; otherwise, δ is 0. This formula can be simplified as:

    Q=x(wxm(dx2m)2) (3.18)

    where wx represents the total edge weights in community x, and dx is the sum of edge weights of all nodes of community x.

    This paper introduces a new weighted modularity, which considers the CRS. The formula of CRS weighted modularity Qλ is as follows:

    Qλ=x(wxλXm(dx2m)2)whereλx=2lxnx(nx1) (3.19)

    where nx is the total number of nodes in community x. lx is the total number of edges in community x. λx is the community relationship strength, which represents the ratio of the actual number of edges in community x to the number of edges in the ideal community where all points are fully connected.

    The CRS-Louvain algorithm for pickpocketing group identification is as follows:

    Step 1: Consider each node in the pickpocketing association graph as a community. We traverse all nodes, find the neighbor that maximizes the CRS weighted modularity of each node, and merge each node with the neighbor. Until the communities of all nodes do not change, a layer of community division is formed.

    Step 2: We compress all nodes in each community into one node. The weight of nodes in the community is transformed into the self-weight of new node, and the weight between communities is transformed into the weight of new node edges. We iterate Step 1 to obtain a higher level of community division.

    Step 3: We iterate Step 2 until the algorithm is stable. G=(V,E) is divided into n disjoint communities Gx=(Vx,Ex),x=1,2,3...,n. Each community only contains individuals with similar temporal, spatial, social and identity features. Thus the pickpocketing groups are identified.

    In this section, we first preprocessed the data, then extracted the data features, and conducted experiments according to the proposed model and algorithm. The experiment includes two parts: pickpocketing individual detection and pickpocketing group identification. On the one hand, we compared IForest-FD pickpocketing individual detection algorithm proposed in this paper with LR, SVM, XGBoost, FD, IForest + LR, IForest + SVM, IForest + XGBoost. On the other hand, we compared CRS-Louvain pickpocketing group identification proposed in this paper with DBSCAN algorithm, the Girvan-Newman algorithm, the Louvain algorithm.

    (1) Ticketing data. The data used in this paper is based on real data in J province and construct the simulated data according to the ratio of the combination of various features. We simulate the ticketing data of passengers in J province from June 1, 2022 to July 5, 2022. The data set has approximately 6.5 million records, mainly includes name, ID number, ride time, number, etc. and the ID number is used as identification ID.

    (2) Geographic information data. This data mainly includes the network and running mileage between stations in J Province. Furthermore, the data of the network includes the routes, stations and location coordinates.

    (3) Personnel identity data. This data mainly includes gender, age, place of residence, education, current address and criminal record. Approximately 1% of the data are incomplete and have missing values, and we zeroed the missing values.

    (1) Temporal feature. The temporal feature mainly consists of four aspects: travel time, riding frequency, night travel ratio and travel regularity. We use entropy to calculate the travel regularity, and the formula is as follows:

    Ev=ni=1Pv(T=ti)logPv(T=ti) (4.1)

    where ti is the time interval in hours, and Pv(T=ti) represents the probability of each passenger riding within a given time interval tiT. Passengers who have a higher night travel ratio and a lower travel regularity are more likely to be pickpockets.

    (2) Spatial feature. The spatial feature represents the regularity of stations in passengers' travel behavior. The formula of the regularity of stations is as follows:

    Eu=lluPu(lu)logPu(lu) (4.2)

    where lu is all the stations visited by passenger u within a given time interval. Pu(l) is the probability of visiting a particular station. To reduce costs and avoid being caught, the proportion of key stations and short trips in the pickpocket's record is high.

    (3) Social feature. The social feature represents the average stay time of a passenger at one station.As shown in Figure 3, the normal passengers will stay for a long time to finish some work (such as school, travel, work, etc.) after arriving at a place, and the pickpockets desperately need to make his next trip. Therefore, the shorter the stay time is, the higher the abnormality of the passengers.

    Figure 3.  Description diagram of social feature.

    (4) Identity feature. The identity feature mainly consist of five aspects: gender, age, place of residence, education and criminal record. Pickpockets and normal passengers have significant differences in the above features, which can improve the accuracy of pickpocketing individual detection.

    After preprocessing the original data, we are left with 4, 729, 325 records of ticketing data that involve 748, 681 passengers. The passengers include 748, 513 normal passengers and 168 pickpockets.

    First, we extract temporal, spatial, social and identity features of each passenger, and filter the passengers by the IForest algorithm. Second, we use the LR algorithm [19], SVM algorithm [20], XGBoost algorithm [21] and FD algorithm to detect the pickpockets based on the filtered passengers by the IForest algorithm. We divide all datasets using the 5-fold cross-validation method, and take 10 times to calculate the average value as the results.

    (1) Evaluation indicators. To evaluate the performances of different methods, we introduce three evaluation indicators: Precision, Recall, F1score [46]. The calculation formulas are as follows:

    Precision=TPTP+FP (4.3)
    Recall=Sensitivity=TPTP+FN (4.4)
    Flscore=2PrecisionRecallPrecision+Recall (4.5)

    where TP and FP are defined as the sample number of pickpocketing individuals detected correctly and incorrectly, respectively. TN and FN are defined as the sample numbers of normal passengers detected correctly and incorrectly, respectively.

    (2) Result analysis. The experimental results of pickpocketing individual detection are shown in Table 1. We can see that the IForest algorithm can significantly improve the accuracy of the pickpocketing individual detection model. We compared the experimental results of LR, SVM, XGBoost and FD with or without the IForest algorithm. The Precision of IForest + LR, IForest + SVM, IForest + XGBoost and IForest + FD improved by 3.32, 7.41, 5.49 and 6.18%, respectively. The Recall improved by 1.82, 2.68, 6.13 and 5.13%, and the F1score improved by 3.62, 4.72, 5.79 and 5.40%, respectively.

    Table 1.  Experimental results of pickpocketing individual detection.
    Algorithm Precision (%) Recall (%) F1score (%)
    LR 81.32 84.34 83.56
    IForest + LR 84.64 86.16 87.18
    SVM 83.33 87.23 83.71
    IForest + SVM 90.74 89.91 88.43
    XGBoost 86.65 88.33 90.15
    IForest + XGBoost 92.14 94.46 95.94
    FD 92.38 93.72 92.97
    IForest + FD 98.56 98.85 98.37

     | Show Table
    DownLoad: CSV

    Furthermore, we compare the experimental results of four algorithms, which are IForest + LR, IForest + SVM, IForest + XGBoost and IForest + FD. The Precision of IForest + FD is 13.92, 7.82 and 6.42% higher than that of IForest + LR, IForest + SVM, IForest + XGBoost. The Recall improved by 12.69, 8.94 and 4.39%, and the F1score improved by 11.19, 9.94 and 2.43%, respectively. It can be seen that the FD algorithm can better capture the interactive information between temporal, spatial and social features, as well as the internal information of multiple classification features in identity features, so as to reduce the probability of individual pickpocket missing detection. We also note that the IForest + FD algorithm detected 166 pickpocketing individuals.

    (1) Weighted combination similarity. By analyzing the data of 168 pickpocketing individuals, we calculate the similarity of temporal feature tSim(a,b), spatial feature sSim(a,b), social featureand cSim(a,b) identity feature iSim(a,b) between any two pickpocketing individuals. The values of the four similarities and their correlations are shown in Figure 4.

    Figure 4.  The correlations of the four similarities using pearson correlation coefficient.

    According to the theory of pearson correlation coefficient, we calculate the weight values corresponding to tSim(a,b), sSim(a,b), cSim(a,b) and iSim(a,b) are 0.27, 0.31, 0.26 and 0.16 respectively. Then,

    WSim(a,b)=0.27tSim(a,b)+0.31sSim(a,b)+0.26cSim(a,b)+0.16iSim(a,b) (4.6)

    Furthermore, we delete the pickpocketing pairs with five similarity indices that are less than 0.1, because the probability of such pickpocketing pairs in the same group is low. Then, we identify 210 pickpocketing pairs and 126 pickpocketing individuals.

    (2) Pickpocketing group identification. First, we use the weighted combination similarity WSim(a,b) as the edge weight to construct a pickpocketing association graph, as shown in Figure 5.

    Figure 5.  Pickpocketing association graph with 126 nodes and 210 edges.

    The pickpocketing association graph consists of 126 nodes and 210 edges, and the aggregated points divide the association graph into multiple pickpocketing groups. Figures 6(a)(d) respectively show some part of the detection results of the association graph obtained by the DBSCAN algorithm [32], Girvan-Newman algorithm [36], Louvain algorithm [37] and our CRS-Louvain algorithm. Figures 6(a)(d) include a 10-person group, an 8-person group and two 3-person groups. The nodes of the detected same pickpocketing groups are marked with the same color and connected with solid lines, while the nodes of the detected different pickpocketing groups are marked with the different color and connected with dotted lines.

    Figure 6.  The detection results of each algorithm.

    To compare the CRS-Louvain pickpocketing group identification algorithm with other algorithms, we introduce normalized mutual information (NMI) as an evaluation indicator [47]. The definition of NMI is as follows:

    NMIx,y=2IX,YHX+HY (4.7)

    where X and Y represent the community labels of nodes in x and y respectively. IX,Y represents the mutual information between X and Y. HX and HY are the entropies of X and Y. The range of NMIX,Y is 0 to 1. The closer the value of NMIX,Y is to 1, the higher the accuracy of community division.

    We compare the CRS-Louvain pickpocketing group identification algorithm with the DBSCAN algorithm, Girvan-Newman algorithm and Louvain algorithm and the NMI results are shown in Figure 7.

    Figure 7.  NMI values of the four algorithms for group division.

    In the Figure 7, the abscissa is the number of members in each pickpocketing group. The ordinate is the NMI value, which represents the difference in distribution between the actual pickpocket group and the identification group. The greater the value of NMI, the more accurately pickpocketing groups are detected. When identifying large pickpocketing groups, the four algorithms have shown good performance. However, the Girvan-Newman algorithm and Louvain algorithm do not have strong abilities to identify small groups. When identifying the pickpocketing groups composed of 2 and 3 pickpockets, the NMI values of the CRS-Louvain algorithm are 0.67 and 0.71 respectively, which is better than the DBSCAN algorithm, the Girvan-Newman algorithm and the Louvain algorithm.

    In recent years, the application of informatization, digitalization and intelligence in smart cities has been continuously improved. IOT technology has become one of the core technologies for collecting, storing, managing, analyzing and sharing massive data, and has been widely used in various information systems. The further integration of the IOT with big data effectively solves the problem of accurately judging passenger information with wide coverage and massive historical data for law enforcement agencies. Through intelligent analysis and automatic perception, law enforcement agencies have realized the accurate identification of pickpocketing groups in areas, which has brought new opportunities for the establishment of a decision-making system dominated by information.

    This paper includes two research aspects: pickpocketing individual detection and pickpocketing group identification. First, we propose an IForest-FD pickpocketing individual detection algorithm. The IForest algorithm is used to filter the abnormal individuals of each feature extracted from ticketing data and geographic information data. Using the filtered results, the FD algorithm learns the combination relationship between low-order and high-order features to improve the accuracy of identifying pickpockets. Second, we propose a CRS-Louvain pickpocketing group identification algorithm. Based on the idea of crowdsensing, we measure the similarity of temporal, spatial, social and identity features among the pickpocketing individuals, and then use the weighted combination similarity as the edge weight to construct the pickpocketing association graph. Furthermore, the CRS-Louvain algorithm improves the modularity of the Louvain algorithm to overcome the limitation that small-scale communities cannot be identified.

    The method proposed in this paper is applicable to the identification of active pickpocketing individuals and their groups. However, there are many kinds of pickpockets operating in the city, and the realization of unified modeling and identification of various criminal behaviors will be a key direction in our future research. After law enforcement officers identify the groups through the designed algorithms, their feedback will help us to identify the groups more accurately. Reinforcement learning can then continuously improve the accuracy of the algorithms through "trial and error". Therefore, how to better combine supervised learning with reinforcement learning to imitate expert decision-making in the real world and realize the automatic adjustment of the model will be another future research direction.

    The authors have not used Artificial Intelligence (AI) tools in the creation of this article.

    This work was supported in part by the National Natural Science Foundation of China (Grant No.61902311, 51904226, 52274137, 62172330), in part by the Post doctoral Research Foundation of China (Grant No. 2019M663801), the Key R & D Foundation of Shaanxi Province(Grant No.2021SF- 479), and the Scientific Research Project of Shaanxi Provincial Education Department (No.22JK0459).

    The authors declare that they have no conflicts of interest.

  • Reader Comments
  • © 2007 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(4965) PDF downloads(213) Cited by(35)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog