2009
DOI: 10.1109/tsmca.2009.2027611
|View full text |Cite
|
Sign up to set email alerts
|

A Statistical Threat Assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…(Huddleston and Brown 2013) demonstrate that criminal hot-spot (probability) maps can be used to accurately forecast future crime counts within police patrol districts. These criminal hot-spot maps are two dimensional probability density functions that can be estimated using kernel density estimation (Harris 1999), predictive crime models (Smith and Brown 2007;Huddleston and Brown 2009), or by binning historical crime counts by atom (Zhang and Brown 2013). We use the binning approach in this paper.…”
Section: Closed Form Evaluation Methodsmentioning
confidence: 99%
“…(Huddleston and Brown 2013) demonstrate that criminal hot-spot (probability) maps can be used to accurately forecast future crime counts within police patrol districts. These criminal hot-spot maps are two dimensional probability density functions that can be estimated using kernel density estimation (Harris 1999), predictive crime models (Smith and Brown 2007;Huddleston and Brown 2009), or by binning historical crime counts by atom (Zhang and Brown 2013). We use the binning approach in this paper.…”
Section: Closed Form Evaluation Methodsmentioning
confidence: 99%
“…(3) Update the initial route by the optimized, not-yet visited route after a constant period, and then go to (1).…”
Section: Approachmentioning
confidence: 99%
“…are regarded as a serious social problem [1]. Many local police governments assign police men, who ride on patrol vehicles with wireless communication devices, to each patrol block and enforce them to watch up individually the situations of assigned areas during a day in a three-shift working system.…”
Section: Introductionmentioning
confidence: 99%
“…respectively, and we compared Controller #7 to Controllers #1, #2, and #3. From Figure 20 (Karalus & Riese, 2009;Huddleston & Brown, 2009). For example, if we replace the constant decay parameter λ in p x ,y (t) = γ x,y e −λ(t−tx,y) with the non-homogeneous, decay parameter, λ px,y = λ(1 + ξ(f (threat x ,y )), where (a) ξ = 1 if the threat surface is active and 0 otherwise and (b) f (threat x,y ) ∈ [0, 1]; monotonically increasing, then we can add an appropriate threat premium to cells based on their underlying threat.…”
Section: Controller Comparisonmentioning
confidence: 99%