1. bookAHEAD OF PRINT
Detalles de la revista
License
Formato
Revista
eISSN
2444-8656
Primera edición
01 Jan 2016
Calendario de la edición
2 veces al año
Idiomas
Inglés
Acceso abierto

Criminal law imputation path for biometric information

Publicado en línea: 23 Dec 2022
Volumen & Edición: AHEAD OF PRINT
Páginas: -
Recibido: 08 Jul 2022
Aceptado: 07 Aug 2022
Detalles de la revista
License
Formato
Revista
eISSN
2444-8656
Primera edición
01 Jan 2016
Calendario de la edición
2 veces al año
Idiomas
Inglés
Introduction

With the rapid development of emerging information technology, biometric information has become an important part of today’s information society [1]. The acquisition, dissemination and utilisation of biometric information have become simpler and more convenient with the development of information technology, but this has also led to an increasing number of violations of biometric information [2]. At present, the crime of infringing biometric information in the criminal law is more reflected in the relevant provisions of Article 253 of the Criminal Law on the crime of infringing on citizens’ personal information. The current crime of infringing citizens’ personal information has relatively vague provisions on acts of infringing biometric information. Information is generally identified as general personal information [3]. As a result, it is difficult for the conviction and punishment of acts related to infringing citizens’ biometric information to be adapted to the culpability and punishment, and it is also not conducive to the protection of citizens’ information and the safety of life and property. At present, the theoretical circles have not yet reached a consensus on the number of crimes of infringing biometric information, mainly focussing on the legal interests protected by the crime of infringing on citizens’ personal information [4, 5]. The determination of the number of crimes for infringing biometric information needs to be combined with the analysis of specific behaviours. Based on two types of biometric information violations, this article discusses the criminal law imputation path under different types of behaviour patterns.

The development of biometric identification will bring new breakthroughs and changes to human life research. Its development has played a role in promoting related disciplines and will definitely have a huge impact on industries such as health, medicine and food, with huge economic benefits [6, 7]. Developed countries abroad started relatively early in this regard, and some institutions have already taken the lead in the field of biometric identification, and they all have developed relevant databases and systems. In the study mentioned in Popov et al. [8], it is proposed that the National Center for Biotechnology Information of the United States has developed the Entrez system, which includes a number of large databases, such as biological information databases. The European Bioinformatics Institute is proposed in the study mentioned in Yeo et al. [9], which provides a series of biometric identification databases and analysis tools. These institutions are not isolated; they have very close cooperation so that users can easily obtain information. There are also some major scientific research institutions on biometric identification in China. The ‘centrality–lethality’ rule proposed in the study mentioned in Zhang et al. [10] points out that the criticality of biological information is closely related to the topological structure of the biological information interaction network, which is manifested in the fact that the missing biological information nodes with more neighbours are more easily affected. network structure, resulting in a lethal effect on the body. Sabharwal [11], it is proposed that in the biological information network, there are many nodes with high betweenness but low degree that play a key role in the network. Based on this finding, the betweenness centrality (BC) is proposed. In the study mentioned in Zhang et al. [12], eigenvector centrality (EC) and subgraph centrality (SC) are proposed to consider the importance of biological information nodes from the global and local aspects of the network, respectively. It can be seen that researchers at home and abroad have conducted a lot of research on biometric identification, but they have never researched the integration of biometric identification technology with national criminal law.

This work studies the criminal law imputation path of biometric information. First, a minimum uncertainty neural network (MUNN) model is constructed. Through this model, the classification and identification of citizens’ biometric information can be realised. The resulting criminal law issues should find a suitable entry point, determine the path of criminal law attribution, and realise the judgement of criminal responsibility for the relevant subjects of infringing citizens’ biometric information so that the criminal law can effectively participate in the governance activities of biometric information.

The imputation path with the MUNN model as the entry point
Object of responsibility

The criminal principle of classifying and identifying biometric information through the MUNN model has been pointed out previously. What needs to be discussed next is what criminal law needs to use the MUNN model to identify biometric information. Such subjects should be held accountable, and what kind of entry point should be used to impute relevant subjects should be found.

In the discussion on infringing the criminal subject status of citizens’ biometric information, many views theoretically believe that the criminal subject qualification of units in criminal law of China is the result of the fiction of the criminal law. There are obstacles. However, the unit is essentially a collection of natural persons’ rights and obligations, and the discussion of the unit’s criminal responsibility is also carried out through the will and behaviour of specific natural persons in the unit [21]. Similarly, imposing a penalty on a unit actually deprives the specific natural person in the unit of the rights, thus having the effect of punishment to prevent crimes. Therefore, the fiction of the unit subject in the criminal law cannot be used to support the independent criminal subject status of citizens’ biometric information. Based on the tool attributes of the current biometric information, the damage caused by the infringement of citizens’ biometric information is in the final analysis the damage caused by the behaviour of the relevant subject. In order to realise the prevention of crimes through punishment, the technical tool of biometric information needs to be used to find the attributable subject behind it.

In the process of the use and development of modern technology, there is often a long causal chain, especially in biometric information technology. The complex software systems used by biometric information often have many developers involved in the development of various parts of the software at different stages. Even in the case of biometric information based on a self-learning algorithm, there is a process of data production, selection and processing. The process also requires the participation of multiple subjects and multiple stages [22]. Whether it is the person who provides the data, the person who collects and processes the data, the person who sells the data, the person who analyses the data, etc., it is possible to affect the process of self-learning of biometric information. At the same time, each participating subject only has knowledge of the specific stage in which the subject participates and cannot predict or control the influence of other subjects on the operation of biometric information in the previous stage or the next stage. The causal chain can also continue to extend to the application stage of the algorithm, and when the algorithm is dominated by the user, it can also produce corresponding damage results. In this causal chain, the damage caused by the violation of citizens’ biometric information may be caused by the superposition of causal relationships in multiple stages, or it may be caused by a certain stage independently, so theoretically, the violation of citizens’ biometric information will be. The characteristics of identification information responsibility judgement are summarised as a kind of ‘the problem of many hands’. How to accurately locate the causal behaviour in the causal chain is of critical significance to the determination of the responsibility of the relevant subjects of biometric information. Article 2 of the ‘Code of Ethics’ stipulates that the applicable subjects of the code include ‘natural persons, legal persons and other relevant institutions engaged in biometric information management, research and development, supply, use and other related activities’, and in Article 2, paragraph 1 to the definition of the relevant subject is clarified in paragraph 4 [23]. This regulation defines a specific scope for the relevant subjects of biometric information and conforms to the characteristics of ‘multi-subject responsibility’ of biometric information. It regulates the behaviour of subjects in ‘management, research and development, supply and use’, which can cover biometric information. Every link from design and development to final use: As far as criminal law is concerned, it is necessary to pay attention to the definition of the scope of relevant subjects of biometric information in the Code of Ethics because in the past, the discussion of biometric information product liability in criminal law theory circles often only focussed on the relationship between producers and users. Division of responsibilities: This division of responsibilities is in line with the requirements of the ‘Development Plan’ in 2017 to ‘implement a two-tier regulatory structure with equal emphasis on design accountability and application supervision’ for biometric information, thereby focussing on both design and application and effectively handling most cases of damage to biometric information products. However, the definition of the scope of relevant subjects in the ‘Code of Ethics’ brings inspiration to criminal law theory: sometimes the cause of biometric information damage does not originate from the producer or user, as well as problems in biometric information management or research and development. It is entirely possible to lead to the occurrence of damage results and then to the issue of criminal liability. If it is required to establish a corresponding artificial intelligence supervision mechanism, the staff of state organs who are legally obliged to supervise activities related to biometric information may constitute a crime of dereliction of duty or abuse of power due to dereliction of duty. This is the principle of negligence in supervision. Conclusion [24]: Another example is that the production activities of biometric information products belong to the supply chain of biometric information according to the definition in Article 2 of the ‘Code of Ethics’, and in the development process of biometric information technology, the producers and developers of biometric information may not the same subject. For example, in the case of superimposed use of disclosed algorithm technology in the production process, the producer cannot control the process of upstream algorithm development, and deviations in the upstream algorithm development process are often the root cause of defects in biometric information. The main body of biometric information ‘management, research and development, supply and use’ can control or intervene in biometric information at different stages, so they need to bear corresponding obligations. This is the conclusion that the principle of business negligence can produce.

Safety in a risk society is one of the basic value orientations that criminal law needs to adhere to, and under certain circumstances, the safety value of criminal law takes priority over other values, that is, sometimes only on the premise of realising safety value, criminal law can pursue other values. Therefore, if we only discuss from the perspective of producers and users, we will ignore the biometric information managers and developers who are also in the causal chain of ‘multi-subject responsibility’, and it is difficult to meet the needs of contemporary criminal law to defend against technological risks. Of course, the damage caused by the biometric information may also exist in which the relevant subjects cannot be held liable. For example, when the R&D, supply, management and use links all meet the requirements of the specification, the algorithm applied to the biometric information may also cause algorithm discrimination and algorithm bias. The reason may be that the algorithm has autonomously learned the discriminatory and prejudicial knowledge that is common on the Internet. This phenomenon is the reflection of the algorithm on the objective existence of the society. It can be said that the entire social group is responsible for this. For such phenomena, the criminal law needs to maintain due humility. Even in order to prevent risks, it cannot be held accountable only based on the results. Otherwise, it is easy to expand the scope of the attack, and the criminal responsibility will be transformed into a pure result responsibility, thus forcing the biometric information. Practitioners are trembling and timid, inappropriately inhibiting the progress of algorithms and the normal development of biometric information business.

The path of attribution of criminal law

After determining the scope of the subjects to be held accountable, we can further examine the specific path to confirm the criminal responsibility of the relevant subjects.

Obtaining biometric information for one’s own crime

Obtaining biometric information for the purpose of committing a crime for oneself should be punished as a crime by the absorption theory. Take the perpetrator’s conduct of extortion after stealing a large number of citizens’ biometric information as an example. Although individually, the perpetrator committed two acts, the first act constituted the crime of infringing on citizens’ personal information, and the second act constituted the crime of extortion, but between these two crimes, there is a relationship similar to dependence. It is precisely because of this special state that there is an absorption relationship between the crime of infringing on citizens’ personal information and the crime of extortion. In this relationship, the criminal act of infringing on citizens’ personal information does not have strong independence, and the act is absorbed by the more independent crime of extortion. On the whole, it should also take the initiative in the final conviction and punishment. Absorption of racketeering convictions and penalties, it seems that the crime of violating citizens’ personal information and the crime of extortion are two separate crimes, but there is an extremely close connection between these two crimes, and this connection also provides the possibility for the absorption of crimes.

Compared with the implicated crime theory, the absorption crime theory is more reasonable. The final result of the implicated offender and the absorbing offender is similar, that is, they are both punished as one crime, but the absorbing offence theory is more applicable to the case of illegally obtaining biometric information for their own crime in the connection between the subjective intention and the punishment result. Illegal acquisition of biometric information for one’s own crime involves both homogeneous and heterogeneous behaviours, and implicated offenders cannot be applied to implicated in heterogeneous acts. Absorbing offenders have a wider scope of application and are more suitable for infringing on biometric information in this case. Behavioural regulatory needs [25]: In summary, in the case of illegally obtaining biometric information for one’s own crime, the identification of infringing biometric information and other acts through the theory of absorption is more in line with the principle of adapting the crime and punishment. The complex and difficult-to-judgement situation provides a clearer judgement. Under this theory, whether the act of obtaining biometric information is legal or illegal can be reasonably explained if it is absorbed by subsequent crimes.

Obtaining biometric information for others to commit crimes

Obtaining biometric information for others to commit crimes should be punishable by multiple offences. The term ‘obtaining biometric information for others to commit a crime’ as mentioned here refers to the act of providing biometric information to others after knowing that another person uses the biometric information provided by him to commit a crime after obtaining the biometric information legally or illegally. Obtaining biometric information for others to commit crimes, from a stand-alone perspective, if the perpetrator first illegally obtains citizens’ biometric information or legally obtains citizens’ biometric information and then illegally provides it to others without consent, it shall be subject to the ‘Supreme People’s Court and Supreme People’s Procuratorate Regulations on Handling Infringement’. The relevant provisions of the interpretation on several issues concerning the application of law in criminal cases of citizens’ personal information (hereinafter referred to as ‘interpretation’) have constituted the crime of infringing upon citizens’ personal information. Secondly, if the perpetrator knowingly uses the citizen’s biometric information to commit other crimes and still intentionally provides the biometric information for him, he is a helper of other criminal acts and should also bear criminal responsibility. In this case, if the theory of absorbing crime is used, it is necessary to emphasise behaviour and absorb light behaviour, and which one is more important, whether it is the principal and the accomplice, or the sentencing result, the judgement standard is difficult to determine, and the result will be inconsistent. At the same time, it cannot be judged that there is a necessary implicated relationship between the two acts. To sum up, obtaining biometric information for other people’s crime-related behaviours and punishing them for multiple crimes conform to the principle of adapting guilt and punishment and also meet the needs of judicial practice.

Infringement of criminal tool-type biometric information is divided into obtaining biometric information for one’s own crime and obtaining biometric information for others to commit crimes, which are determined according to different situations, which avoid the traditional single-crime model or the combination of multiple crimes. There are flaws in the standards on which the penalty model is based. Specifically, the absorbing offender theory is used, instead of the implicated offender theory, in obtaining biometric information for the determination of one’s own crime. Although the final presentation results are all treated as one crime and have similarities, the theory of absorbing crime does not require that the perpetrator must have only one criminal intent, and it can also be applied to homogeneous acts objectively. Both subjective and objective aspects are more rational. In the determination of obtaining biometric information for others to commit crimes, different behaviours are identified separately, and finally, multiple crimes are punished. Compared with obtaining biometric information for oneself to commit crimes, obtaining biometric information for others to commit crimes involves more complex subjects. In addition, it is more difficult to determine when the criminal intent occurred subjectively. Obtaining biometric information for others to commit multiple crimes in a crime is reasonable in the determination of responsibility and punishment and the determination of criminal behaviour.

Minimum uncertainty neural network model

With more and more cases of crimes using biometric information, many scholars have begun to study how criminals obtain citizens’ biometric information. Neural networks are considered by many researchers to be the most common method for obtaining biometric information about citizens. Therefore, this article proposes a new MUNN model, which combines Bayesian probability and particle swarm optimisation (PSO) to train its parameters. Criminals use this model to complete the classification and identification of citizens’ biometric information so as to achieve criminal purposes.

Minimum uncertainty neural network

Inferring the uncertainty of various types of yj under a given X, we can further get πj=i=1N(1P(yi|xi))=P(yj)Ni=1N(1P(yj|xi)P(yj))

Taking the logarithm of both sides, we get logπj=NlogP(yj)+i=1Nlog(1P(yj|xi)P(yj))

Its form is similar to the general signal transmission equation of the neural network: sj=βj+iϖjioi . Let A be the observed value of X, and xii be the observed value of attribute xi, then the previous equation can be changed as follows: πj=P(yj)NxiiA(1P(yj|xii)P(yj))

Taking the logarithm of both sides, we get logπj=NlogP(yi)+xiiAlog(1P(yj|xii)P(yj))=NlogP(yj)+i=1Nlog(1P(yj|xii)P(yj))Oii

When xii′A, Oii′ = 1; otherwise, Oii′ = 0. Comparing with the previous equation, we can get sj=logπj

The equation for obtaining the threshold can be expressed as follows: βj=NlogP(yj)

The equation for obtaining the weights can be expressed as follows: ωji=log(1P(yj|xii)P(yj))

The uncertainty equation can be expressed as follows: πj=oj=f(sj)=expsj

Or normalising πj, we get πj=oj=f(sj)=expsj=expsjiexpsi

Based on the previous equation, the neural network structure can be determined, as shown in Figure 1.

Fig. 1

Minimum uncertainty neural network structure. [A] Layer: the sample input layer; A is the observed value, and Xii is the observed value of the attribute xi. [B] Layer: weight selection layer, when xii′A, Oii′ = 1; otherwise, Oii′ = 0. [C] Layer: weighted calculation layer; there is Eq. (8) to get sj. [D] Layer: Uncertainty output layer, and the πj output is obtained by using Eqs (11) and (12)

The secondary model is defined as the MUNN model. After obtaining the weight ωji and the threshold βj through the training method, the minimum uncertainty judgement can be used for classification and identification. At this point, the classification and identification of citizens’ biometric information have been completed.

Least uncertainty judgement

The speech rate usually refers to the pronunciation speed, which is a measure of the speaker’s pronunciation speed. It can be reflected by calculating the number N of syllables spoken in a unit time T, and it can be roughly measured by the total speech duration including pauses. Since different speakers have certain differences in speech speed, the pronunciation of the same sentence also has certain differences in the sentence duration of different people. In addition, the emotional state of the speaker also affects the speech rate. For example, in angry and happy states, the speech rate is generally slightly faster than in the calm state, while in sadness, the speech rate is generally slower.

With an N-dimensional input vector X = {x1, x2, ... , xN}, each attribute x1, x2, ... , xN is independent of each other; let P(k) be the probability of the occurrence of event k, then π = 1 – P(y|X) be the uncertainty of y under given X.

So, the equation can be expressed as follows: π=i=1N(1P(y|xi))

Assuming events Ai = {y occurs when xi occurs}, i ∈ [1, 2, … , N], obviously N events A1, A2, … , AN are independent in pairs:

Set event A = {y occurs when X occurs}, then there is P(A) = P(A1A2 ∪ … ∪ AN) from P(A)=1P(A)¯=1P(A1A2AN)¯=1P(A1A2AN¯) ; according to A1, A2, … , AN, we can get P(A)=1P(A1)¯P(A2)¯P(AN)¯=1(1P(A1))(1P(A2))(1P(AN))=1i=1N(1P(Ai))

If P(Ai) and P(A) are written in the form of conditional probability, then P(Ai) = P(y|xi) and P(A) = P(y|x), substituting them into the previous equation to get P(y|X)=1i=1N(1P(y|xi)) , so there is 1P(y|X)=i=1N(1P(y|xi)) .

π = 1 − P(y|X) is the uncertainty of y given X, we can get π=i=1N(1P(y|xi)) proof.

When the classification set Y = (y1, y2, … ,ym) and j ∈ [1, 2, … ,M], the uncertainty of each type of yj under the given X is as follows: πj=1P(yj|X)=i=1N(1P(yj|xi))

Therefore, when classifying, select πj with the smallest uncertainty as the final decision, which is defined as the minimum uncertainty decision.

Empirical analysis of criminal law imputation path
Signal acquisition and processing analysis

In order to verify the validity of the MUNN model for the classification and identification problem, we conduct a classification and identification test on the two-dimensional signals of the citizen biometric information of 10 people (100 samples for each person, a total of 1000 training samples). Before the signal is input, the two-dimensional signal needs to be preprocessed. According to the characteristics of each dimension of the signal, the continuous value of the signal is divided into 11 and 13 discrete regions at equal distances to meet the MUNN discrete value input requirements. For each iteration, it takes about 20 s, with 1G P3 processor PC, 128M memory, Win2000 system, VC++6.0 language.

The Bayesian probability model, the PSO training model and the MUNN model proposed in this article are used to train these 1000 samples, and the results of the three models in terms of the number of misjudgements, recognition rate and iteration times are analysed. The comparison results are shown in Table 1.

Comparison of training results of different models

Total number of samples is 1000Number of misjudgementsRecognition rate (%)Number of iterations
Bayesian probability model28771.31
PSO model42957.11500
Minimum uncertainty neural network model6593.501501

PSO, particle swarm optimisation

Table 1 shows that in terms of the number of misjudgements, the MUNN model proposed in this study has the least number of misjudgements, and only 65 samples are misjudged; in terms of recognition rate, the model proposed in this article has the highest recognition rate, reaching 93.5%. In terms of the number of iterations, the number of iterations in this study is the most, so the classification and recognition process are the most stable, and the accuracy is also high. In order to compare the training results more vividly, it is shown in the form of a graph. The specific recognition rate training change curve is shown in Figure 2.

Fig. 2

Training curve of recognition rate

In Figure 2, since the number of iterations of the Bayesian probability model is 1, the curve of the model cannot be reflected. The figure can only reflect the PSO model and the MUNN model proposed in this study. The training change curve of the recognition rate: The identification training curve of the PSO model shows that the initial number of misjudgements is 870, but as the number of iterations continues to increase, the number of misjudgements is also decreases. At the 200th iteration, the number of misjudgements became stable and remained at 429; the training curve of the MUNN model proposed in this article shows that the initial number of misjudgements is 290, but as the number of iterations continued to increase, the number of misjudgements increased. It is also decreasing continuously. At the 200th iteration, the number of misjudgements began to stabilise and remained at 65.

Criminal law imputation analysis

Since September 2020, the defendant Guo Yong violated the robots agreement and other means by adopting high-similarity browser camouflage technology on the Internet, and illegally obtained 108 pieces of motor vehicle information, 79 pieces of company registration information, 101 pieces of passport information, 57 pieces of hotel check-in information, 85 pieces of demographic information, 94 pieces of bank personal credit report information, 86 pieces of personal bank information and 106 pieces of mobile phone information. As of the time of the incident, the defendant Guo Yong used the aforementioned illegally obtained information to defraud the victim, and some pieces of the information were sold at a higher price, and now he has made a profit of more than 100,000 yuan.

Using the criminal law imputation path of biometric information in this study, this case is analysed, and the analysis results are compared with the actual criminal law imputation results of the court, as shown in Table 2.

Comparative analysis of criminal law imputation results

ProjectCourt of first instanceCourt of second instancePath of attribution of this articleConsistency (%)
Responsible subjectSuspect Guo YongSuspect Guo YongSuspect Guo Yong100
Main chargeThe crime of illegally obtaining citizens’ personal information and the crime of fraudFraudThe crime of illegally obtaining citizens’ personal information and the crime of fraud50
Sentence7 years6 years8 years75

It can be seen from Table 2 that the adopted criminal law imputation path is used to analyse the case, and the analysis results are compared with the actual criminal law imputation results of the court. The subject is the criminal suspect Guo Yong himself, so the consistency in the subject of attribution is 100%; in terms of the main charges, Guo Yong was convicted of illegally obtaining citizens’ personal information and fraud in the first instance, but in the second instance, the prosecutor claimed the crime in this case. For the crime of fraud, the final suspect was convicted of fraud. According to the path of attribution of criminal law in this article, it is believed that the suspect in this case should be punished for the crime of illegally obtaining citizens’ personal information and the crime of fraud, so the consistency of the main crimes is 50%. The main reason for this situation is the insufficient response of the criminal law to biometric information. Violation of citizens’ biometric information includes two types of criminal tools and criminal objects. How should different types of behaviour be convicted and punished? The criminal law does not clearly stipulate the punishment for multiple crimes; there is also a gap in terms of the sentence. The criminal law in this article believes that according to the case of the crime of illegally obtaining citizens’ personal information and the crime of fraud, the sentence should be 8 years. However, the actual court only punished the crime according to the crime of fraud, so the final sentence was 6 years, so the consistency of the sentence was 75%.

Conclusion

Because of the particularity of biometric information, it has been widely used in many fields, playing a unique role beyond general personal information. Faced with the huge commercial value and wide application of biometric information, as well as various chaos in the process, the criminal law must guard the last line of defence and regulate related behaviours. Criminal legislation and criminal law theory need to provide effective solutions for the criminal law governance of biometric information according to the characteristics of biometric information. This article analyses the principle of web crawler technology and, on this basis, criminally imputes the relevant subjects of biometric information. Responsibility determination provides a possible path. This study conducts experiments from two aspects of signal acquisition and processing analysis and criminal law imputation analysis, and arrived at the following implications:

In the process of signal acquisition and processing analysis, this study finds that in terms of the number of misjudgements, the MUNN model proposed in this article has the least number of misjudgements of 65; in terms of recognition rate, the recognition rate of the model proposed in this article is 93.5. In terms of the number of iterations, the number of iterations in this study is 1501, so the model proposed in this article is the most stable in the process of information classification and recognition, and the accuracy is also the highest.

In the analysis of criminal law imputation, the analysis results of the criminal law imputation path in this study are compared with the actual criminal law results, and it is found that although the consistency of the subject of attribution reaches 100%, the criminal law response to biometric information is insufficient, so there are differences in the main charges and sentences, and the agreement is 50% and 75%, respectively.

Fig. 1

Minimum uncertainty neural network structure. [A] Layer: the sample input layer; A is the observed value, and Xii is the observed value of the attribute xi. [B] Layer: weight selection layer, when xii′ ∈ A, Oii′ = 1; otherwise, Oii′ = 0. [C] Layer: weighted calculation layer; there is Eq. (8) to get sj. [D] Layer: Uncertainty output layer, and the πj output is obtained by using Eqs (11) and (12)
Minimum uncertainty neural network structure. [A] Layer: the sample input layer; A is the observed value, and Xii is the observed value of the attribute xi. [B] Layer: weight selection layer, when xii′ ∈ A, Oii′ = 1; otherwise, Oii′ = 0. [C] Layer: weighted calculation layer; there is Eq. (8) to get sj. [D] Layer: Uncertainty output layer, and the πj output is obtained by using Eqs (11) and (12)

Fig. 2

Training curve of recognition rate
Training curve of recognition rate

Comparative analysis of criminal law imputation results

Project Court of first instance Court of second instance Path of attribution of this article Consistency (%)
Responsible subject Suspect Guo Yong Suspect Guo Yong Suspect Guo Yong 100
Main charge The crime of illegally obtaining citizens’ personal information and the crime of fraud Fraud The crime of illegally obtaining citizens’ personal information and the crime of fraud 50
Sentence 7 years 6 years 8 years 75

Comparison of training results of different models

Total number of samples is 1000 Number of misjudgements Recognition rate (%) Number of iterations
Bayesian probability model 287 71.3 1
PSO model 429 57.1 1500
Minimum uncertainty neural network model 65 93.50 1501

Jeong, Da-som, Byun, et al. Analysis of Environmental Design Research Trend based on Biometric Information[J]. Proceedings of the Korean Society of Interior Design Conference, 2018:59-63. Jeong, Da-som, Byun, Analysis of Environmental Design Research Trend based on Biometric Information[J]. Proceedings of the Korean Society of Interior Design Conference, 2018:59-63. Search in Google Scholar

Park B Y, Jeon J, Lee H, et al. An Analysis of Research Trend for Integrated Understanding of Environmental Issues: Focusing on Science Education Research on Carbon Cycle[J]. Journal of The Korean Association For Science Education, 2020, 40(3):237-251. Park B Y, Jeon J, Lee H, An Analysis of Research Trend for Integrated Understanding of Environmental Issues: Focusing on Science Education Research on Carbon Cycle[J]. Journal of The Korean Association For Science Education, 2020, 40(3):237-251. Search in Google Scholar

P Sánchez-Ostiz. Imputation and concerns in Criminal law[J]. Politica Criminal, 2017, 12(24):1211-1227. Sánchez-Ostiz P. Imputation and concerns in Criminal law[J]. Politica Criminal, 2017, 12(24):1211-1227. Search in Google Scholar

Chong K, Sung H, Jang Y. Analysis of Research Trend for Development of Future Forecast Traffic Information Service Technology based on Big Data. 2017. Chong K, Sung H, Jang Y. Analysis of Research Trend for Development of Future Forecast Traffic Information Service Technology based on Big Data. 2017. Search in Google Scholar

Li Z, Liu Y. Development and Trend Analysis of Wastewater Resource Recovery Research Based on Bibliometrics Methods and Data during the Period 1995–2014[J]. Acta Scientiarum Naturalium Universitatis Pekinensis, 2018. Li Z, Liu Y. Development and Trend Analysis of Wastewater Resource Recovery Research Based on Bibliometrics Methods and Data during the Period 1995–2014[J]. Acta Scientiarum Naturalium Universitatis Pekinensis, 2018. Search in Google Scholar

Xing X, Liu F, Gao J. Design and implementation of watermelon traceable identification algorithm based on biometric texture information[J]. Nongye Gongcheng Xuebao/Transactions of the Chinese Society of Agricultural Engineering, 2017, 33(18):298-305. Xing X, Liu F, Gao J. Design and implementation of watermelon traceable identification algorithm based on biometric texture information[J]. Nongye Gongcheng Xuebao/Transactions of the Chinese Society of Agricultural Engineering, 2017, 33(18):298-305. Search in Google Scholar

Schwabe A C. Predicting actions based on psychographic optimization of biometric data, US20190108453A1[P]. 2019. Schwabe A C. Predicting actions based on psychographic optimization of biometric data, US20190108453A1[P]. 2019.10.1016/S0969-4765(19)30104-3 Search in Google Scholar

Popov G, Nakov O, Mihaylova E. A Distributed System for Biometrical Identification Based on Big Data Analysis[C]//2019 International conference on Creative Business for Smart and Sustainable Growth (CREBUS). 2019. Popov G, Nakov O, Mihaylova E. A Distributed System for Biometrical Identification Based on Big Data Analysis[C]//2019 International conference on Creative Business for Smart and Sustainable Growth (CREBUS). 2019.10.1109/CREBUS.2019.8840079 Search in Google Scholar

Yeo U H, Lee I B, Kwon K S, et al. Analysis of Research Trend and Core TechnologiesBased on ICT to Materialize Smart-farm[J]. Protected horticulture and Plant Factory, 2018, 25(1):30-41. Yeo U H, Lee I B, Kwon K S, Analysis of Research Trend and Core TechnologiesBased on ICT to Materialize Smart-farm[J]. Protected horticulture and Plant Factory, 2018, 25(1):30-41.10.12791/KSBEC.2016.25.1.30 Search in Google Scholar

Zhang Lingling, Gong Jie, Zhang Ying. A review of ecosystem services: a bibliometric analysis based on web of science[J]. Acta Ecologica Sinica, 2016, 36(18). Zhang Lingling, Gong Jie, Zhang Ying. A review of ecosystem services: a bibliometric analysis based on web of science[J]. Acta Ecologica Sinica, 2016, 36(18).10.5846/stxb201504060688 Search in Google Scholar

Sabharwal M. Performance analysis of biometric technologies based on identified significant metrics for deployment in E-banking[J]. International Journal of Control Theory and Applications, 2016, 9(17):8623-8628. Sabharwal M. Performance analysis of biometric technologies based on identified significant metrics for deployment in E-banking[J]. International Journal of Control Theory and Applications, 2016, 9(17):8623-8628. Search in Google Scholar

Zhang H, Huang M, Xiuling Q, et al. Bibliometric Analysis of Global Remote Sensing Research during 2010–2015[J]. International Journal of Geo-Information, 2017, 6(11):332. Zhang H, Huang M, Xiuling Q, Bibliometric Analysis of Global Remote Sensing Research during 2010–2015[J]. International Journal of Geo-Information, 2017, 6(11):332.10.3390/ijgi6110332 Search in Google Scholar

Hector H, Jason B, Geoffrey X, et al. System and method for facilitating user access to vehicles based on biometric information:, AU2019203222A1[P]. 2019. Hector H, Jason B, Geoffrey X, System and method for facilitating user access to vehicles based on biometric information:, AU2019203222A1[P]. 2019. Search in Google Scholar

Yu X. Research on the Path of Criminal Law Regulation of Archival Crime[J]. Archives & Construction, 2017. Yu X. Research on the Path of Criminal Law Regulation of Archival Crime[J]. Archives & Construction, 2017. Search in Google Scholar

Wang J C. Research on the Criminal Law Regulation of Ocean Ecological Environmental Crime:a Case Study of the Bohai Sea[J]. Eastern Forum, 2018. Wang J C. Research on the Criminal Law Regulation of Ocean Ecological Environmental Crime:a Case Study of the Bohai Sea[J]. Eastern Forum, 2018. Search in Google Scholar

Pinciroli F. Detección de incumbencias en el desarrollo de los requisitos[J]. Entre ciencia e ingeniería, 2018, 12(23):117. Pinciroli F. Detección de incumbencias en el desarrollo de los requisitos[J]. Entre ciencia e ingeniería, 2018, 12(23):117.10.31908/19098367.3711 Search in Google Scholar

Freedman D. Comentario a Derecho Penal. Parte general de Eugenio Raul Zaffaroni, Alejandro Alagia y Alejandro Slokar. (Ediar, Buenos Aires, 2000)[J]. 2019(79). Freedman D. Comentario a Derecho Penal. Parte general de Eugenio Raul Zaffaroni, Alejandro Alagia y Alejandro Slokar. (Ediar, Buenos Aires, 2000)[J]. 2019(79). Search in Google Scholar

Yongchao G U. Dilemma and Outlet: the Substantive Linking between Archive law and Criminal law of China Archival Crime[J]. Archives Science Study, 2018. Yongchao G U. Dilemma and Outlet: the Substantive Linking between Archive law and Criminal law of China Archival Crime[J]. Archives Science Study, 2018. Search in Google Scholar

Shesler A. The implication to crime as a subject of criminal law research[J]. Vestnik of the St Petersburg University of the Ministry of Internal Affairs of Russia, 2020, 2020(1):235-240. Shesler A. The implication to crime as a subject of criminal law research[J]. Vestnik of the St Petersburg University of the Ministry of Internal Affairs of Russia, 2020, 2020(1):235-240.10.35750/2071-8284-2020-1-235-240 Search in Google Scholar

Zhang S. The Legislation Perfection of Archival Crime[J]. Archives Management, 2017. Zhang S. The Legislation Perfection of Archival Crime[J]. Archives Management, 2017. Search in Google Scholar

Gil A G, Pardos M M. Bibliografía iberoamericana de Derecho penal y Criminología (Octubre-Marzo de 2002)[J]. 2019(12). Gil A G, Pardos M M. Bibliografía iberoamericana de Derecho penal y Criminología (Octubre-Marzo de 2002)[J]. 2019(12). Search in Google Scholar

Wei W. Research on Several Issues of the Criminal Responsibility Boundary of the Crime of Refusing to Fulfill the Obligation of Information and Network Security Management[J]. Journal of Guangxi Administrative Cadre Institute of Politics and Law, 2019. Wei W. Research on Several Issues of the Criminal Responsibility Boundary of the Crime of Refusing to Fulfill the Obligation of Information and Network Security Management[J]. Journal of Guangxi Administrative Cadre Institute of Politics and Law, 2019. Search in Google Scholar

Xue Q, Lv X. Research on the characteristics of “trick loan” crime and criminal regulation[J]. Journal of Liaoning Administrators College of Police and Justice, 2018. Xue Q, Lv X. Research on the characteristics of “trick loan” crime and criminal regulation[J]. Journal of Liaoning Administrators College of Police and Justice, 2018. Search in Google Scholar

Sha W, Wang L, Jinfeng L V. Research on the Problems and Legal Regulation of Video Surveillance in Criminal Investigation and Prevention[J]. China Public Security(Academy Edition), 2018. Sha W, Wang L, Jinfeng L V. Research on the Problems and Legal Regulation of Video Surveillance in Criminal Investigation and Prevention[J]. China Public Security(Academy Edition), 2018. Search in Google Scholar

Wu D. Research on the criminal regulation of abortion[J]. Chinese Journal of Coal Industry Medicine, 2017. Wu D. Research on the criminal regulation of abortion[J]. Chinese Journal of Coal Industry Medicine, 2017. Search in Google Scholar

Artículos recomendados de Trend MD

Planifique su conferencia remota con Sciendo