Research on Cross-platform Data Interaction and Information Fusion Mechanism of Public Security Intelligence for National Security
and
Mar 17, 2025
About this article
Published Online: Mar 17, 2025
Received: Oct 22, 2024
Accepted: Feb 02, 2025
DOI: https://doi.org/10.2478/amns-2025-0309
Keywords
© 2025 Haohang Ye et al., published by Sciendo
This work is licensed under the Creative Commons Attribution 4.0 International License.
Figure 1.

Figure 2.

Figure 3.

Figure 4.

Figure 5.

Figure 6.

Figure 7.

Figure 8.

Figure 9.

Figure 10.

Figure 11.

Privacy risk analysis
| Node Num | Movielen Dataset | Amazon Dataset | ||
|---|---|---|---|---|
| Max | Mean | Max | Mean | |
| 100 | 0.152 | 0.056 | 0.04 | 0.016 |
| 1000 | 0.162 | 0.053 | 0.009 | 0.0065 |
| 10000 | 0.114 | 0.038 | 0.0059 | 0.00455 |
The comments are illustrated
| Commentary set | Explanation |
|---|---|
| c1 (good) | The criteria and requirements of the index are fully met |
| c2 (better) | In conformity with most indicators, only individuals can’t meet the requirements |
| c3 (general) | Basic compliance criteria, less projects that can’t meet the requirements |
| c4 (worse) | The basic discrepancies are not able to meet the requirements of the project |
| c5 (Very bad) | The vast majority of the indicators are inconsistent with the criteria, and only individuals can meet the requirements |
Security comparison
| Scheme | The Test Phase Examines The Validity Of The Information | Safety | Difficulty |
|---|---|---|---|
| Bh | N | Ow-Id-Cca | Bdh |
| Rll | N | Ow-Id-Cca&Ow-Cca | Dlp |
| Dcd | N | Ow-Id-Cca&Ind-Id-Cca | Cdh&Ddh |
| Ours | Y | Ow-Id-Cca&Ind-Id-Cca | Cdh&Ddh |
Index weight
| Factor Layer | Weighting | Index Layer | Weighting |
|---|---|---|---|
| (W1) | 0.36 | (W11) | 0.26 |
| (W12) | 0.15 | ||
| (W13) | 0.22 | ||
| (W14) | 0.2 | ||
| (W15) | 0.17 | ||
| (W2) | 0.15 | (W21) | 0.47 |
| (W22) | 0.53 | ||
| (W3) | 0.23 | (W31) | 0.39 |
| (W32) | 0.32 | ||
| (W33) | 0.29 | ||
| (W4) | 0.26 | (W41) | 0.22 |
| (W42) | 0.18 | ||
| (W43) | 0.36 | ||
| (W44) | 0.24 |
Effectiveness evaluation system
| Target Layer | Factor Layer | Index Layer |
|---|---|---|
| Public Security Intelligence Evaluation (W) | Intelligence Effect(W1) | Veracity(W11) |
| Comprehensiveness(W12) | ||
| Timeliness(W13) | ||
| Novelty(W14) | ||
| Applicability(W15) | ||
| Organization(W2) | Reasonableness(W21) | |
| Coordination(W22) | ||
| Intelligence Officer(W3) | Intelligence Sensitivity(W31) | |
| Intelligence Level(W32) | ||
| Intelligence Ability(W33) | ||
| Information Platform(W4) | Technical Advance(W41) | |
| Software Quality(W42) | ||
| Economy(W43) | ||
| Ease Of Use(W44) |
Intelligent contract registration message specification
| Parameter | Remark |
|---|---|
| Appchainid | Application Chain Id |
| Chaincodeld | Service Id |
| Type | Service Type |
| Policy | <Privacy Type>:<Chainld+Chaincodeld> |
| Extra | Other Information |
Application chain registration message specification
| Parameter | Remark |
|---|---|
| App ChainID | Application chain id |
| Type | Application chain type |
| Certificate | The letter of the endorsement node is the letter of the letter |
| CBP | The CBP contract address deployed on the application chain |
| Extra | Other information |
Specific evaluation grade
| Index layer | c1 | c2 | c3 | c4 | c5 |
|---|---|---|---|---|---|
| (W11) | 0.5 | 0.3 | 0.1 | 0.1 | 0 |
| (W12) | 0.4 | 0.2 | 0.2 | 0.1 | 0.1 |
| (W13) | 0.4 | 0.3 | 0.2 | 0.1 | 0 |
| (W14) | 0.4 | 0.3 | 0.3 | 0 | 0 |
| (W15) | 0.3 | 0.4 | 0.1 | 0.1 | 0.1 |
| (W21) | 0.5 | 0.1 | 0.2 | 0.2 | 0 |
| (W22) | 0.3 | 0.2 | 0.2 | 0.1 | 0.2 |
| (W31) | 0.6 | 0.3 | 0.1 | 0 | 0 |
| (W32) | 0.4 | 0.5 | 0.1 | 0 | 0 |
| (W33) | 0.5 | 0.3 | 0.1 | 0.1 | 0 |
| (W41) | 0.4 | 0.3 | 0.2 | 0.1 | 0 |
| (W42) | 0.6 | 0.1 | 0.2 | 0.1 | 0 |
| (W43) | 0.5 | 0.3 | 0.2 | 0 | 0 |
| (W44) | 0.3 | 0.2 | 0.4 | 0.1 | 0 |
