A NALYZING AN O FFENDER ’ S J OURNEY TO C RIME U SING A C RIMINAL M OVEMENT M ODEL Presenters Andre Norton Karen Lancaster-Ellis.

Slides:



Advertisements
Similar presentations
Traffic assignment.
Advertisements

Problem solving with graph search
Shortest Paths Text Discrete Mathematics and Its Applications (5 th Edition) Kenneth H. Rosen Chapter 9.6 Based on slides from Chuck Allison, Michael T.
BY MICHAEL SUDKOVITCH AND DAVID ROITMAN UNDER THE GUIDANCE OF DR. GABI NAKIBLY OSPF Security project: Summary.
CS171 Introduction to Computer Science II Graphs Strike Back.
Modeling travel distance to health care using geographic information systems Anupam Goel, MD Wayne State University Detroit, MI (USA)
Management Science 461 Lecture 2b – Shortest Paths September 16, 2008.
D IJKSTRA ' S ALGORITHM By Laksman Veeravagu and Luis Barrera Edited by: Manuela Caicedo, Francisco Morales, Rafael Feliciano, and Carlos Jimenez.
Shortest Paths and Dijkstra's Algorithm CS 110: Data Structures and Algorithms First Semester,
UNIT-IV Computer Network Network Layer. Network Layer Prepared by - ROHIT KOSHTA In the seven-layer OSI model of computer networking, the network layer.
Modelling Crime: A Spatial Microsimulation Approach Charatdao Kongmuang School of Geography University of Leeds Supervisors Dr. Graham Clarke, Dr. Andrew.
Crime Mapping & Analysis William Jarvis & Ibrahim Sabek CSCI 5715 Prof. Shashi Shekhar Wilson, Ronald and Filbert, Katie. “Crime Mapping and Analysis.”
A Mobile Infrastructure Based VANET Routing Protocol in the Urban Environment School of Electronics Engineering and Computer Science, PKU, Beijing, China.
Using Structure Indices for Efficient Approximation of Network Properties Matthew J. Rattigan, Marc Maier, and David Jensen University of Massachusetts.
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
Chapter 10 Introduction to Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach.
MULTICASTING Network Security.
Dijkstra’s Algorithm Slide Courtesy: Uwash, UT 1.
ROUTING PROTOCOLS Rizwan Rehman. Static routing  each router manually configured with a list of destinations and the next hop to reach those destinations.
D IJKSTRA ' S ALGORITHM By Laksman Veeravagu and Luis Barrera.
1 Shortest Path Calculations in Graphs Prof. S. M. Lee Department of Computer Science.
Geographic Profiling in Australia – An examination of the predictive potential of serial armed robberies in the Australian Environment By Peter Branca.
The National Intelligence Model (NIM)
Routing Algorithms (Ch5 of Computer Network by A. Tanenbaum)
Operations Research Assistant Professor Dr. Sana’a Wafa Al-Sayegh 2 nd Semester ITGD4207 University of Palestine.
Programming for Geographical Information Analysis: Advanced Skills Online mini-lecture: Introduction to Networks Dr Andy Evans.
Dijkstras Algorithm Named after its discoverer, Dutch computer scientist Edsger Dijkstra, is an algorithm that solves the single-source shortest path problem.
WAN technologies and routing Packet switches and store and forward Hierarchical addresses, routing and routing tables Routing table computation Example.
Shortest Path Problem Weight of the graph –Nonnegative real number assigned to the edges connecting to vertices Weighted graphs –When a graph.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
1 WAN Technologies and Routing. 2 Motivation Connect multiple computers Span large geographic distance Cross public right-of-way –Streets –Buildings –Railroads.
Highway Risk Mitigation through Systems Engineering.
Efficient Route Computation on Road Networks Based on Hierarchical Communities Qing Song, Xiaofan Wang Department of Automation, Shanghai Jiao Tong University,
Cole Kelleher Benjamin Post CSCI 5980 Assessment of Advanced GIS Tools for E-911 Services.
D IJKSTRA ' S ALGORITHM. S INGLE -S OURCE S HORTEST P ATH P ROBLEM Single-Source Shortest Path Problem - The problem of finding shortest paths from a.
TCOM 509 – Internet Protocols (TCP/IP) Lecture 06_a Routing Protocols: RIP, OSPF, BGP Instructor: Dr. Li-Chuan Chen Date: 10/06/2003 Based in part upon.
Most of contents are provided by the website Graph Essentials TJTSD66: Advanced Topics in Social Media.
12/17/ Geographic Profiling Geographic Profiling Charles L. Feer, JD, MPA Bakersfield College.
Shortest Paths Text Discrete Mathematics and Its Applications (5 th Edition) Kenneth H. Rosen Chapter 8.6 Based on slides from Chuck Allison, Michael T.
© 2008 Frans Ekman Mobility Models for Mobile Ad Hoc Network Simulations Frans Ekman Supervisor: Jörg Ott Instructor: Jouni Karvo.
Professor Alex Hirschfield, HonMFPH Professor of Criminology and Director International Centre for Applied Criminology ICAC University of Huddersfield,
Identifying and Analyzing Patterns of Evasion HM Investigator: Shashi Shekhar (U Minnesota) Collaborators: Renee Laubscher, James Kang Kickoff.
Highway Risk Mitigation through Systems Engineering.
VADD: Vehicle-Assisted Data Delivery in Vehicular Ad Hoc Networks Zhao, J.; Cao, G. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 鄭宇辰
Network Analyst. Network A network is a system of linear features that has the appropriate attributes for the flow of objects. A network is typically.
By Laksman Veeravagu and Luis Barrera
Quinn Nelson, Donald Steffensmeier, Sachin Pawaskar
Ch 13 WAN Technologies and Routing
(How the routers’ tables are filled in)
What Are Routers? Routers are an intermediate system at the network layer that is used to connect networks together based on a common network layer protocol.
COMP 3270 Computer Networks
Empirical analysis of Chinese airport network as a complex weighted network Methodology Section Presented by Di Li.
(How the routers’ tables are filled in)
Network Routing.
Shortest Paths Discrete Mathematics and Its Applications (7th Edition)
Discrete Mathematics and Its Applications (5th Edition)
Finding Fastest Paths on A Road Network with Speed Patterns
TransCAD Vehicle Routing 2018/11/29.
Shortest Paths Discrete Mathematics and Its Applications (7th Edition)
CSE 373: Data Structures and Algorithms
Discrete Mathematics and Its Applications (5th Edition)
Slide Courtesy: Uwash, UT
Shortest Path Algorithm for Weighted Non-negative Undirected Graphs
CE 221 Data Structures and Algorithms
Slide Courtesy: Uwash, UT
Dijkstra's Shortest Path Algorithm
CE 221 Data Structures and Algorithms
Shortest Paths Discrete Mathematics and Its Applications (8th Edition)
Graphs: Shortest path and mst
Shortest Paths Discrete Mathematics and Its Applications (7th Edition)
Presentation transcript:

A NALYZING AN O FFENDER ’ S J OURNEY TO C RIME U SING A C RIMINAL M OVEMENT M ODEL Presenters Andre Norton Karen Lancaster-Ellis

What is the main goal? The main goal of this study is to model the movement of offenders journey to crime in order to investigate the relationship between their road network travel route and the actual locations of their crimes in the same geographic space.

Trinidad– 1864 sq. m Tobago – 116 sq. m Est. Population-1.3m Ethnicity – Cosmopolitan Religions – Predominantly Muslim, Hindu & Christian Politics- Democracy Economy- Petro-Chemical sector Brief Historical Overview Police Stations & Posts - 77 Strength – Approx. 6,500

Key Words KEY WORDMEANING NodeHome, Recreation, Entertainment, Work (locations). Activity Space An area familiar to an individual through his/her through everyday activities such as where they live, work, commutes or goes shopping; Crime Attractor A location that attracts offenders because of its known opportunity for crime; Crime Generator A location which attracts a large amount of people without and which presents opportunities to commit crimes (e.g. a shopping mall); Awareness Space Route individuals traverse to and from typical locations of activity in their daily lives; Self-Containment Index The percentage of crimes in an area that is committed by offenders who live in the area;

Background Crime Triangle Adapted from Clarke & Eck (2003) Overlapping “ Activity Space”

Previous Research Consensus across Academic community – Journey to crime research  Offender don’t tend to travel to far to commit crime Distance decay pattern Major weakness discovered  Sole focus on distance to crime  Distance in isolation (ambiguous results) Shortcoming Addressed  Our research addresses all 3 dimensions  Starting point  Direction travelled

Research Title Introduction Environmental Criminology (Brantingham & Brantingham, 1990) Criminology & Computer Science  Crime Pattern Theory  Dijkstra’s Algorithm (Edgar Dijkstra, 1956)

Crime Pattern Theory Criminals – preferred areas to commit crimes Criminal events likely to occur  Activity space of offenders overlap with activity space of victims  Activity space of target is simply its location (Brantingham & Brantingham, 1990, Felson & Clarke,1998) Theory- The social intervention level Nature & Immediate situations in which crime occurs

Dijkstra’s Algorithm G (V,E)

Some uses of Dijkstra’s Algorithm ? Urban traffic planning; Optimal pipelining of VLSI chip; Telemarketer operator scheduling; Routing of telecommunications messages; Network routing protocols (OSPF, BGP, RIP); Optimal truck routing through given traffic.

Offender & Victim Activity Space example Computer Science- Graph TheoryEnvironmental Criminology Vertex / Node A – B – C – D = 28 A – F – E - D = 29 A – B – D = 22 A – C – F – E - D = 26 A – C – D = 20

Four Attractor Locations – Southern Division  Gulf City Mall- (largest shopping mall in City)  Teddy’s Shopping Center  Space La Nouba (Social Night Club)  Pizza Hut Food Complex *** See depiction on next slide Study Area

Home Activity Space Recreation Awareness Space Entertainment Study Area Buffer Zone

Data Sets crime data (Serious Crimes)  Anonymised crime reference number (GO)  Offence type (robbery, vehicle theft)  Anonymised geographic co-ordinates (crime location & offender residence)  Offender’s name, date of birth, home address  Date, time and location (each offence committed)  Estimated monetary value of goods stolen Methodology

Data Sets crime data (Serious Crimes) Defaults to text file format (.txt) Converted to.csv & imported into Microsoft Excel Manual pre-processing to improve data quality Data Integrity- Significant number of offenders recorded multiple addresses (This caused some issues) Home node – Single address Distinct offender addresses – Table A Methodology

Crime TypeCrime Trips OffendersOffender Addresses Robbery Larceny Motor Vehicle Table A Weaknesses Present in virtually all published studies that use data of a similar source or nature Analyses – Directly comparable with previous work (extends)

Dijkstra’s Model Requirements INPUTS Spatial data – road network connecting attractors Distance Measures (length of road networks) Temporal data- Estimated travel time (impactors)  Encoded into adjacency Matrices (plot network)  Crime address- Where committed  Offender address- Home address  Attractor location- towards which offenders travel

Assumptions ScenarioAssumption Shorter distance from crime location to attractor than from home; Offender travelling in direction of attractor; Crime location in direction of specific attractor; Attractor location coded as offender destination; Crime location between attractors; Closest attractor assigned as potential crime location;

Dijkatra’s Pseudocode Function Dijkstra’s (Graph, source) for each vertex v in Graph//Initialization dist[v] := infinity//Initial distance from source to vertex v is set to infinity previous[v] := undefined//Previous node in optimal path from source dist[source] := 0//Distance from source to source Q := the set of all node in the Graph // All nodes in the graph are unoptimized thus are in Q While Q is not empty: //Main loop u := node in Q with smallest dist[] remove u from Q for each neighbor v of u: //Where v has not been removed from Q alt := dist[u] + dist_between(u,v) if alt < dist[v]//Relax (u,v) dist[v] := alt previous[v] := u return previous

Experimentation Octave program – High level programming language  Inputs imported into Octave (Matlab compatible)  Model run based on inputs (1hrs) Dijkstra’s Algorithm – Time efficiency  worst-case running time O (n 2 ) – Input size  Model took 2.5hrs with Dijkstra’s shortest path calculations

Results Analysis (Crimes) Attractor Locations Crimes80% Activity Space Crimes20% Model generated paths55% simulated the offender crime location Self-Containment Index90% Euclidean Measure30% offenders used Dijkstra’s Measure70% Offenders used shortest Path Predictive Analytics25% (approximation)

Impact & Implications Situational Crime Prevention Policy Formulation Evidence Based Approach (Sherman, 1998) Predictive Policing – Data Mining & Big Data solutions

Conclusions & Future Research Priorities Test bed for geographic profiling of volume crime; Robbery offences (include victim’s JTC in model); Increase the number of offences being analyzed; Eliminate assumption of home node start point; Increase the geographical size of the analyzed study area.

Acknowledgement

THE END ( / ) ( / )