如果您无法下载资料,请参考说明:
1、部分资料下载需要金币,请确保您的账户上有足够的金币
2、已购买过的文档,再次下载不重复扣费
3、资料包下载后请先用软件解压,在使用对应软件打开
Team#12387whoareconspirators?1.Introduction1.1.DescriptionandanalysisoftheproblemsTherearesomeconspiratorsinacompanycommitingacriminalact.Thegoalforusistofindthemostlikelycandidatesfortheunidentifiedco‐conspiratorsandunknownleadersthroughanalysingasmallsetofmessagesfromagroupof83workersinthecompany.1.2.Theanalysisoftherequirements:1.2.1.Requirement1Requirement1needsustoprioritizethe83nodesbylikelihoodofbeingpartoftheconspiracyaccordingtotheknowninformationthat7conspirators,8nonconspiratorsandthreesuspicioustopics.Aftergettingtheprioritylistwecannominatetheconspiracyleaders.1.2.2.Requirement2Asforrequirement2,weshouldconsiderhowwouldtheprioritylistchangeifnewinformationcomestolight.Forexample,increasingsuspicioustopicsandtheknownconspirators..1.2.3.Requirement3Requirement3asksustoanalysehowthesemanticnetworkanalysisandthetextanalysiscanbeappliedtothisproblem,.1.2.4.Requiremen4However,AnalyticHierarchyProcessisonlyapplicabletosmallamountofdata,whenitcomestolargedatabases,themethodcanbeverytedious.Thus,themethodshouldbeimprovedbeforeitcanbeappliedwidely.Whatismore,theapplicationofthemethodshouldalsobeextendedtootherfield,suchasbiology.2.Models2.1.Assumption1.Tosimplifytheproblem,wesupposethatallthegiveninformationisreliable.2.Webelievethattheconspiratorswillnotavoidtalkingsuspicioustopics.Whatismore,themorefrequentlyapeopletalkingsuspicioustopic,themorepossibleheisaconspirator.3.Weassumethattheleaderintheconspiracyhasonlyone,andtheleaderisamongthethreeseniormanagers(Jerome,Delores,andGretchen).4.Theinformationprovidedintheappendicescanreflectthesituationinreallife.5.Forfearofexposing,thenumberoftheconspiratorsisnottoolarge.Team#123872.2.DataProcessing1.Tomaketheaccountmoreconvenient,weregulatethatthenameofthepeopleisrepresentedbythecodeintheNames.xls2.ElsiehastwocodesintheNames.xls.Oneisseven,andtheotheristhirty-seven.Weshouldmakesurethatwhichcodeistherealcodeoftheperson,thejudgingmethodiscriminalreasoningmethodandSem