Anil S. Damle Colin G. West Eric J. Benzel
University of Colorado–Boulder
Boulder, CO
Advisor: Anne Dougherty

Abstract

Research shows that most violent serial criminals tend to commit crimes in a radial band around a central point: home, workplace, We will give a predicting of a criminal’s spatial patterns is called geographic profiling. we assume that the offender is a ―violent serial criminal, since research suggests that serial burglars and arsonists are less likely to follow spatial patterns. We treat the single-anchor-point case first taking the spatial coordinates of the criminal’s last strikes and the sequence of the crimes as inputs. For the multiple-anchor-point case, we use a cluster-finding and sorting method

Assumptions

Domain is Approximately Urban

  • Entire domain is a potential crime spot
  • Criminal’s movement is unconstrained.
  • Domain contains all possible strike points.
    ###Developing a Serial Crime Test Set
  • Existing Crime Sets
  • The Problem with Simulation
  • Pixel Point Analysis

Metrics of Success

The Effectiveness Multiplier
\(\kappa=\frac{Z_1(CrimePoint)}{Z_2(CrimePoint)}\) \(\kappa_s=\frac{Z_{our\ model}(CrimePoint)}{Z_{flat}(CrimePoint)}\)

Two Schemes for Spatial Prediction

Serial crime is patterned around place of daily activity. The key is the crime center. The two scenarios are shown below

Single Anchor Point: Centroid Method

Algorithm

Create Search Domain
Constructs the smallest rectangle that contains all existing offenses, and scales each dimension three times.It meets the requirements

Find Centroid of Crime Sites
The anchor point is the average of the n crime coordinates\((x_i,y_i)\).

Build Likelihood Crater
We use cratering technique. The two dimensional crime points \(x_i\) are mapped to their radius from the anchor point \(a_i\). We have \(f:x_i→r_i\),where \(f(x_i)= \Arrowvert x_i−a_i\Arrowvert_2\) (a shifted modulus). Then using the set \(r_i\) to generate a crater around the anchor point. The following two methods can be used:

  • There is a buffer zone around the anchor point.
  • Crimes follow a decaying exponential pattern from the anchor point.

We use the gamma distribution. Define the random variable \(X_i\) to be the distance between the with crime point and the anchor point \(r\). We let each \(X_i\) have a gamma distribution with parameters \(\kappa\) and \(θ\): \(X_i ∼ Γ(\kappa, θ)\), with probability density function pdf

\(f(x;\kappa;\theta)=\frac{\theta^k}{\ulcorner(\kappa)}x^ {\kappa-1}\theta^{-\theta x}\)

Suppose \(X_i\) is independent, using the maximum likelihood estimates of \(\kappa\) and \(θ\). Use the resulting distribution to calculate possible crime locations. The pdf was evaluated for each point and normalized to give a volume of 1 under the likelihood surface.

Adjust for Temporal Trends

The outward or inward trend of \(r_i\) might indicate that the next crime will follow this trend. We let \(\stackrel{\sim}{X}=X +\overline{\Delta r}\),Where \(r=r_n-r_{n-1}\). The new random variable \(\stackrel{\sim}{X}\) Temporal adjustment in expected value:

\(E[\stackrel{\sim}{X}]=E[X +\overline{\Delta r}]=E[X]+\overline{\Delta r}\)

Results and Analysis

Analysis of three criminals by removal the final criminal data. Produce the likelihood plane \(Z(x,y)\). Then estimate the location of the final crime, and calculate the standard effect multiplier \(\kappa_s\).
For the offenders B&C, the model is relatively successful, \(\kappa_s ≈ 12\). And \(\Delta r=-0.276\), the temporal corrections in this distribution are negligible.
Since two outlier models failed for crime A (\( \kappa_s≈0.4 \)). There is a problem with the model. But the model still applies to most crimes. Unless some external influence distracts off the previous models of criminals.

Multiple Anchor Points: Cluster Method

Algorithm

We force a minimum of 2 clusters and a maximum of 4. The clustering algorithm is accomplished in a 3-step process.

  1. Compute the Euclidean distances between all crime locations.
  2. Organize the distances into a hierarchical cluster tree, represented by a dendrogram.
  3. Merge the two clusters that are the closest, and continue such merging until the desired number of clusters is reached. The height is based on the distance between merged clusters at the time of merging.

To determine the optimal number of clusters, we use the notion of silhouettes. We denote by a\((P_i)\) the average distance from \(P_i\) to all other points in its cluster and by \(b(P_i,\kappa)\) the average distance from \(P_i\) to points in a different cluster \(C_k\) . Then the silhouette of \(P_i\) is

\(s(P_i)=\frac{\left[\min\limits_{\kappa|P_i\notin C_k}b(P_i,\kappa)\right] - a(P_i)}{\max\left(a(P_i), \min\limits_{\kappa|P_i\notin C_k}b(P_i,\kappa)\right)}\)

The silhouette s can take values in \([−1, 1]\): The closer \(s(P_i)\) is to \(1\), the better \(P_i\) fits into its current cluster; and the closer \(s(P_i)\) is to \(−1\), the worse it fits within its current cluster. To optimize the number of clusters, we compute the clusterings for 2, 3, and 4 clusters. We then find the maximum of the three average silhouette values.

Cluster Loop Algorithm and Combining Cluster Predictions

We compute the likelihood surface for the centroid of each cluster. We use a Gaussian distribution centered at the point as the likelihood surface, with mean the expected value of the gamma distribution placed over every anchor point of a cluster that has more than one point.
we create our final surface as a normalized linear combination of the individual surfaces, using weights for the number of points in the cluster and for the average temporal index of the events in the cluster.

Results and Analysis
  • Offender C: The cluster method identifies the point directly below the centroid as an outlier and therefore excludes it, which slightly reduces the variance and therefore narrowing the fit function.
  • Offender B: Although the actual crime point no longer appears in the band of maximum likelihood, the cluster method still outperforms the centroid method with a \(\kappa_s≈23\), for fewer resources are “wasted” at high-likelihood areas where no crime is committed.
  • Offender A: Since the outlier points are excluded from the centroid calculation for the larger cluster, the model bets even more aggressively on this cluster, with a resulting \(\kappa_s≈0\).

Summary

  • The predictions are based on the assumption of trends in serial crime behavior which has been tested on large sets of real-world data. Similar mathematical techniques are used in the anchor-point estimation solutions currently employed, which consistently outperform random guesses when tested across data samples.
  • The model is applicable only to violent serial criminals. Simultaneously, it has not been validated on a large set of empirical data, and cannot make use of underlying map data.

数学建模美赛O奖论文总结的更多相关文章

  1. 2019建模美赛B题(派送无人机)M奖论文

    昨天上午出了建模美赛的结果,我们小组获得的是M奖,感觉挺开心的.我一直觉得拿O奖那种是个概率事件,需要天时地利人和的各种因素都合适才行,所以看到自己是M奖,感觉自己的能力已经得到了认可就很满意了.今天 ...

  2. 2018年数学建模国赛B题 智能RGV的动态调度策略

    第一种情况大致思路: 每秒判断各个CNC的状态,若工作完成或者是出于空闲状态下则向RGV发出一个请求.同时,RGV每秒判断自己的状态(上下料.移动.闲置.清洗等),如果是处于闲置状态,则启用调度算法, ...

  3. 2018数学建模国赛总结(A题/编程选手视角)

    2018数学建模已经告一段落了,先说说基本情况吧,我们队伍专业分别为:金融(A),会计(B),计算机(我),配置还算可以,他们俩会数据分析软件也会写论文,我可以写代码,画图.他们俩打过美赛(M奖),我 ...

  4. 2017年第六届数学中国数学建模国际赛(小美赛)C题解题思路

    这篇文章主要是介绍下C题的解题思路,首先我们对这道C题进行一个整体的概括,结构如下: C题:经济类 第一问:发现危险人群. 发现:欺诈的方式开始.雇佣或浪漫的承诺. 数据→确定特定的经济萧条地区→确定 ...

  5. Python小白的数学建模课-A3.12 个新冠疫情数模竞赛赛题与点评

    新冠疫情深刻和全面地影响着社会和生活,已经成为数学建模竞赛的背景帝. 本文收集了与新冠疫情相关的的数学建模竞赛赛题,供大家参考,欢迎收藏关注. 『Python小白的数学建模课 @ Youcans』带你 ...

  6. 在数学建模中学MATLAB

    为期三周的数学建模国赛培训昨天正式结束了,还是有一定的收获的,尤其是在MATLAB的使用上. 1. 一些MATLAB的基础性东西: 元胞数组的使用:http://blog.csdn.net/z1137 ...

  7. Python小白的数学建模课-17.条件最短路径

    条件最短路径问题,指带有约束条件.限制条件的最短路径问题.例如: 顶点约束,包括必经点或禁止点的限制: 边的约束,包括必经路段.禁行路段和单向路段:无权路径长度的限制,如要求经过几步或不超过几步到达终 ...

  8. 2018年中国研究生数学建模竞赛C题 二等奖 赛题论文

    2018年中国研究生数学建模竞赛C题 对恐怖袭击事件记录数据的量化分析 恐怖袭击是指极端分子或组织人为制造的.针对但不仅限于平民及民用设施的.不符合国际道义的攻击行为,它不仅具有极大的杀伤性与破坏力, ...

  9. 2017年研究生数学建模D题(前景目标检测)相关论文与实验结果

    一直都想参加下数学建模,通过几个月培训学到一些好的数学思想和方法,今年终于有时间有机会有队友一起参加了研究生数模,but,为啥今年说不培训直接参加国赛,泪目~_~~,然后比赛前也基本没看,直接硬刚.比 ...

随机推荐

  1. Java -- Properties类使用 读取配置文档

    Java-Properties类的使用 分类: Java基础 2007-05-11 19:35 2666人阅读 评论(1) 收藏 举报 propertiesxmlimportexceptionstri ...

  2. form表单验证失败,阻止表单提交

    form表单验证失败,阻止表单提交 效果演示: 贴上完整代码: <!DOCTYPE html> <html lang="en"> <head> ...

  3. Codeforces 351B Jeff and Furik:概率 + 逆序对【结论题 or dp】

    题目链接:http://codeforces.com/problemset/problem/351/B 题意: 给你一个1到n的排列a[i]. Jeff和Furik轮流操作,Jeff先手. Jeff每 ...

  4. php设计模式课程---6、策略模式如何使用

    php设计模式课程---6.策略模式如何使用 一.总结 一句话总结:比如代码需求,做一饭店,有南北方不同菜系,不同分店有不同的饭菜汤的需求,代码怎么设计 从饭店有特色过渡到厨师有特色(南方厨师(南方饭 ...

  5. Java微信开发_Exception_03_errcode:48001 errmsg:api unauthorized hint

    创建菜单时出现这个异常, 异常信息:errcode:48001 errmsg:api unauthorized hint 解读:调用的接口没有权限. 回去公众号后台一看,发现真的没有自定义菜单的权限, ...

  6. L100

    The world’s lightest wireless flying machine lifts off1Circult: cutting the circuitry from copper fo ...

  7. unity破解步骤

    1.选择unity的安装目录 C:\Programe Files (x86)\Unity\Editor 2.点击patch 3.使用random生成序列号 4.使用Cre Lic生成授权文件

  8. 【leetcode刷题笔记】Plus One

    Given a non-negative number represented as an array of digits, plus one to the number. The digits ar ...

  9. 判断浏览器是否支持css3属性或单位

    1.用CSS.supports()方法 mark-zhq[3] //判断是否支持flex布局 var supportsFlex = CSS.supports("display", ...

  10. bzoj 3545: [ONTAK2010]Peaks Kruskal重构树

    题目: 在Bytemountains有N座山峰,每座山峰有他的高度h_i.有些山峰之间有双向道路相连,共M条路径,每条路径有一个困难值,这个值越大表示越难走,现在有Q组询问,每组询问询问从点v开始只经 ...