A Statistical Model of Criminal Behavior M.B. Short, M.R. D’Orsogna, V.B. Pasour, G.E. Tita, P.J. Brantingham, A.L. Bertozzi, L.B. Chayez Maria Pavlovskaia.

Slides:



Advertisements
Similar presentations
1 Discrete models for defects and their motion in crystals A. Carpio, UCM, Spain A. Carpio, UCM, Spain joint work with: L.L. Bonilla,UC3M, Spain L.L. Bonilla,UC3M,
Advertisements

The Matching Hypothesis Jeff Schank PSC 120. Mating Mating is an evolutionary imperative Much of life is structured around securing and maintaining long-term.
ECE 8443 – Pattern Recognition ECE 8423 – Adaptive Signal Processing Objectives: Periodograms Bartlett Windows Data Windowing Blackman-Tukey Resources:
Hotspot/cluster detection methods(1) Spatial Scan Statistics: Hypothesis testing – Input: data – Using continuous Poisson model Null hypothesis H0: points.
Long run models in economics Professor Bill Mitchell Director, Centre of Full Employment and Equity School of Economics University of Newcastle Australia.
Andrea Bertozzi University of California Los Angeles Thanks to contributions from Martin Short, George Mohler, Jeff Brantingham, and Erik Lewis.
What is the Average Annual Crime Rate in the United States? David McDowall School of Criminal Justice University at Albany, SUNY 135 Western Avenue Albany,
Spatial Aspects of Robbery, Burglary and Vehicle Theft 10-Year Change in Neighborhood Characteristics and Crime.
Ashley Englefield (Cantab.) & Dr Barak Ariel
The Impact of Crime. How does crime impact on people? The immediate impact – physical harm, loss of / damage to property The ‘aftermath’ (fear of crime)
Understanding and preventing crime: A new generation of simulation models Nick Malleson and Andy Evans.
LFPs 1: Spectral analysis Kenneth D. Harris 11/2/15.
Jonathan R. Potts, Luca Giuggioli, Steve Harris, Bristol Centre for Complexity Sciences & School of Biological Sciences, University of Bristol. 20 September.
Biostatistics for Dummies Biomedical Computing Cross-Training Seminar October 18 th, 2002.
Complex Networks Third Lecture TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA TexPoint fonts used in EMF. Read the.
ODE and Discrete Simulation or Mean Field Methods for Computer and Communication Systems Jean-Yves Le Boudec EPFL MLQA, Aachen, September
Discover a Network by Walking on it! Andrea Asztalos & Zoltán Toroczkai Department of Physics University of Notre Dame Department of Physics University.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Mobile Ad Hoc Networks Mobility (II) 11th Week
D Nagesh Kumar, IIScOptimization Methods: M1L4 1 Introduction and Basic Concepts Classical and Advanced Techniques for Optimization.
Why Geography is important.
Methodological Difficulties to Explain the Observable Mapping Criminal Areas, Booze and Prostitution in Klaipeda ( ) Arūnas Acus Liutauras Kraniauskas.
CS401 presentation1 Effective Replica Allocation in Ad Hoc Networks for Improving Data Accessibility Takahiro Hara Presented by Mingsheng Peng (Proc. IEEE.
STOCHASTIC GEOMETRY AND RANDOM GRAPHS FOR THE ANALYSIS AND DESIGN OF WIRELESS NETWORKS Haenggi et al EE 360 : 19 th February 2014.
Lecture 6: Dendrites and Axons Cable equation Morphoelectronic transform Multi-compartment models Action potential propagation Refs: Dayan & Abbott, Ch.
Hotspot Mapping, Near Repeat Analysis, and Risk Terrain Modeling Joint Operational Utility Leslie W. Kennedy Joel M. Caplan Eric L. Piza Rutgers, The State.
Nawaf M Albadia Introduction. Components. Behavior & Characteristics. Classes & Rules. Grid Dimensions. Evolving Cellular Automata using Genetic.
How common are kidnapping and robberies in the U.S & Dominican Republic?
International Health Policy Program -Thailand BY SOPIT NASUEB SPATIAL ANAYSIS (TECHNIQUES)
Crime Chapter 8 Section 2. Crime Prohibited by law Punishable by the government.
The Role of Artificial Life, Cellular Automata and Emergence in the study of Artificial Intelligence Ognen Spiroski CITY Liberal Studies 2005.
Adam David Scott Department of Physics & Astronomy
1 1 Quantifying Impact of Mobility on Data Availability in Mobile Ad Hoc Networks Takahiro Hara IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 9, NO. 2, FEBRUARY.
MA354 Mathematical Modeling T H 2:45 pm– 4:00 pm Dr. Audi Byrne.
MBA.782.ForecastingCAJ Demand Management Qualitative Methods of Forecasting Quantitative Methods of Forecasting Causal Relationship Forecasting Focus.
Mixture Models, Monte Carlo, Bayesian Updating and Dynamic Models Mike West Computing Science and Statistics, Vol. 24, pp , 1993.
Measuring Repeat and Near- Repeat Burglary Effects.
Project funded by the Future and Emerging Technologies arm of the IST Programme Analytical Insights into Immune Search Niloy Ganguly Center for High Performance.
2014 Minneapolis Crime Totals Statistics verified and completed on 1/12/2015 CRIME yr % Chg Homicide % Rape % Robbery %
Maximum Likelihood Estimation Methods of Economic Investigation Lecture 17.
Defining Landscapes Forman and Godron (1986): A
Crime Mapping Level 1 BCJI WEBINAR FEBRUARY 23, 2015.
Cellular Automata Introduction  Cellular Automata originally devised in the late 1940s by Stan Ulam (a mathematician) and John von Neumann.  Originally.
12/17/ Geographic Profiling Geographic Profiling Charles L. Feer, JD, MPA Bakersfield College.
Aim: How much crime is there in the United States?
Case Study 1 M. B. Short, M. R. D’Orsogna, V. B., G. E. Tita, P. J. Brantingham, A. L. Bertozzi and L. B. Chayes, Math. Models and Methods in Applied Sciences,
Andrea Bertozzi University of California Los Angeles Thanks to contributions from Laura Smith, Rachel Danson, George Tita, Jeff Brantingham.
Discrete and Continuum Models of Crime Pattern Formation
Generalized Spatial Dirichlet Process Models Jason A. Duan Michele Guindani Alan E. Gelfand March, 2006.
Local Search. Systematic versus local search u Systematic search  Breadth-first, depth-first, IDDFS, A*, IDA*, etc  Keep one or more paths in memory.
Urban Traffic Simulated From A Dual Perspective Hu Mao-Bin University of Science and Technology of China Hefei, P.R. China
Near repeat burglary chains: describing the physical and network properties of a network of close burglary pairs. Dr Michael Townsley, UCL Jill Dando Institute.
Crime Forecasting Using Spatio-temporal Pattern with Ensemble Learning PAKDD 2014 Crime Forecasting Using Spatio-temporal Pattern with Ensemble Learning.
NEW AND OLD MEASURES OF THE FEAR OF CRIME A MULTILEVEL ASSESSMENT OF MEASURES OF INTENSITY AND FREQUENCY Ian Brunton-Smith: University of Surrey.
Single Season Study Design. 2 Points for consideration Don’t forget; why, what and how. A well designed study will:  highlight gaps in current knowledge.
Application of Criminological Theory to Terrorism Prevention Detective Eric Paull Planning Research and Development Akron, OH Police Department.
Home Reading Skoog et al. Fundamental of Analytical Chemistry. Chapters 5 and 6.
CP8308-visualization Fall 2015 Mina Mobini
Structure and Dynamics of forest stands Intro to Spatial Analyses
Mean Field Methods for Computer and Communication Systems Jean-Yves Le Boudec EPFL Network Science Workshop Hong Kong July
Pedro Ribeiro de Andrade Münster, 2013
секция №2 Английский язык и право
Presented by Chris Rollins and Voonhui Lai Ge 277 Winter 2016
The Matching Hypothesis
Understanding the Criminal Justice System
Measuring Repeat and Near-Repeat Burglary Effects
David Konrad Michel Pleimling 10/21/2011
Five Themes of Geography
Chapter 5 Language Change: A Preliminary Model (2/2)
Deviance & Social Control
Tactical Crime Analysis
Presentation transcript:

A Statistical Model of Criminal Behavior M.B. Short, M.R. D’Orsogna, V.B. Pasour, G.E. Tita, P.J. Brantingham, A.L. Bertozzi, L.B. Chayez Maria Pavlovskaia

Goal Model the behavior of crime hotspots Focus on house burglaries

Assumptions Criminals prowl close to home Repeat and near-repeat victimization

The Discrete Model A neighborhood is a 2d lattice Houses are vertices Vertices have attractiveness values A i Criminals move around the lattice

Criminal Movement A criminal can: Rob the house he is at - or - Move to an adjacent house Criminals regenerate at each node

Criminal Movement Modeled as a biased random walk

Attractiveness Values Rate of burglary when a criminal is at that house Has a static and a dynamic component Static (A 0 ) - overall attractiveness of the house Dynamic (B(t)) - based on repeat and near-repeat victimization

Dynamic Component When a house s is robbed, B s (t) increases When a neighboring house s’ is robbed, B s (t) increases B s (t) decays in time if no robberies occur

Dynamic Component The importance of neighboring effects:  The importance of repeat victimization:  When repeat victimization is most likely to occur:  Number of burglaries between t and  t: E s (t)

Computer Simulations

Three Behavioral Regimes are Observed: Spatial Homogeneity Dynamic Hotspots Stationary Hotspots

Spatial Homogeneity Dynamic Hotspots Stationary Hotspots

Computer Simulations Three Behavioral Regimes are Observed: Spatial Homogeneity –Large number of criminals or burglaries Dynamic Hotspots –Low number of criminals and burglaries –Manifestation of the other two regimes due to finite size effects Stationary Hotspots –Large number of criminals or burglaries

Continuum Limit In the limit as the time unit and the lattice spacing becomes small: The dynamic component of attractiveness: The criminal density:

Continuum Limit Reaction-diffusion system Dimensionless version is similar to: –Chemotaxis models in biology (do not contain the time derivative) –Population bioglogy studies of wolfe and coyote territories

Computer Simulations Dynamic Hotspots are never seen Spatial Homogeneity or Stationary Hotspots? –Performed linear stability analysis –Found an inequality to distinguish between the cases

Summary Discrete Model Computer Simulations –Spatial Homogeneity, Dynamic Hotspots, Stationary Hotspots Continuum Limit –Dynamic Hotspots are not observed: due to finite size effects –Inequality to distinguish between Homogeneity and Hotspots cases

Applications House burglaries Assault with a lethal weapon Muggings Terrorist attacks in Iraq Lootings