sis-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Nadeem Anjum (JIRA)" <j...@apache.org>
Subject [jira] [Commented] (SIS-97) [GSoC] Agent Based Modeling based geo-profiling of criminology projects
Date Thu, 02 May 2013 15:38:15 GMT

    [ https://issues.apache.org/jira/browse/SIS-97?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13647632#comment-13647632
] 

Nadeem Anjum commented on SIS-97:
---------------------------------

Hi Ramyaa,

1. Please tell me if I got the following conditions correctly or not for simulating crime
patterns with random movement of v-agents, patrolling police p-agents:

Condition for Breaking In: The c-agent is able to break into a spot with profit value pv,
ease of breaking f, probability of v-agent recognizing c-agent p1 and p-agents (police) pi
at distance di away,  if the following conditions are ALL satisfied: 
Profit Value Condition: Generate a random number between 0 and 1, break in if it is less than
pv
Ease of Breaking In condition: generate a random number between 0 and 1, break in if it is
less than f
Recognition Condition: Break in if the v-agent is not in the spot (i.e. is moving out) or
if the v-agent is in the spot, generate a random number between 0 and 1 and break in if it
is greater than p1
Patrolling Police Condition: Break In only if each patrolling police pi is at a distance di
and each di is greater than a certain threshold value say 1 km.
Condition for Being Caught: If the v-agent is in the spot, then generate a random number between
0 and 1 (both inclusive) and let the c-agent will be caught in if the generated number is
less than p1. Clearly, the c-agent has greater chances of being caught if p1 is high

2. The Routine Activity Theory mentions three conditions to be fulfilled for a successful
break in: a) a motivated offender b) a suitable target c) absence of guardian. I am planning
to simulate this by 
a) Associating a motivation level for each offender and simulating their random movements
b) Associating a desirability for each victim based on age, gender, wealth and presence of
guardian

Please tell me whether the work-relaxation environment should be associated with criminals
or victims?

Thanks,
Nadeem


                
> [GSoC] Agent Based Modeling based geo-profiling of criminology projects
> -----------------------------------------------------------------------
>
>                 Key: SIS-97
>                 URL: https://issues.apache.org/jira/browse/SIS-97
>             Project: Spatial Information Systems
>          Issue Type: New Feature
>            Reporter: Suresh Marru
>              Labels: gsoc2013, mentor
>
> This idea targeted for GSoC project to extend the geo-profiling computational criminology
projects discussed in [1], [2]. Paper [2] uses a simple 2 dimensional spacial grid with x,
y co-ordinates to move the agents. This project should instead use google maps api to make
the agents move around as we validate various criminology theories like Distance Decay and
Routine Activity [3]. In the future these could be modeling in SIS when rendering is fully
supported. 
> The project involves engaging with the SIS community for special expertise, understanding
google maps api, understand the basic concepts of agent based modeling using a simple proof
of concept like example [4]. The project deliverables includes a web based interface embedding
google maps and randomizing agent moves and develop a memory function and overlay mocked crime
data and predict crime patterns. 
> In addition to SIS PMC, external backup mentors Suresh Marru, Ramyaa Ramyaa and Arvind
Verma will provide the necessary guidance on the theory of computing  and logic, agent based
modeling and criminology concepts. 
> This projects is suited for students who can interpret computer theory and logic and
efficiently implement algorithms, to prototype with GIS based maps and have enthusiasm to
publish multi-disciplinary conference papers. 
> [1] - http://www2.tcs.ifi.lmu.de/~ramyaa/publications/patrol.pdf
> [2] - http://www.security-informatics.com/content/pdf/2190-8532-2-3.pdf
> [3] - http://en.wikipedia.org/wiki/Routine_activity_theory
> [4] - https://code.google.com/p/iu-themis/source/browse/trunk/CrimInfoAgentBased/src/CrimInfoAgentBased.cpp

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Mime
View raw message