Skip to main content

Region-Based Geospatial Abduction with Counter-IED Applications

  • Chapter
  • First Online:
Counterterrorism and Open Source Intelligence

Part of the book series: Lecture Notes in Social Networks ((LNSN))

Abstract

Geospatial abduction problems (GAPsfor short) were introduced in Shakarian et al. (Gaps: Geospatial abduction problems. ACM Transactions on Intelligent Systems and Technology. (2011)). Given a set \(\mathcal{O}\) of observations, GAPstry to find a set of “partner” locations (points) that best explain those observations. For instance, the observations may refer to improvised-explosive device (IED) attacks (or burglaries) and the partner locations may refer to caches supporting those attacks (or the burglar’s house/office). A region-based GAP(or RGAP) tries to find a set of regions that best explain the observations. We study the complexity and mathematical properties of region-based GAPswhere we vary the shape of the region(s) we are seeking. We develop several exact and approximate algorithms for RGAPs, often with guarantees – we also explore practical implementation issues. We performed experiments where we attempted to use RGAPsto locate weapons caches in Baghdad based on IED attack locations. Our implementation was able to find regions that contained multiple weapons caches (on average 1. 7 cache sites) as well as a significantly higher density such caches (8 caches per square kilometer vs. the city-wide average of 0. 4). Further, the algorithm ran quickly, performing computation in just over 2 s on commodity desktop hardware.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Brantingham, P., Brantingham, P.: Crime Pattern Theory. In: Wortley, R., Mazerolle, L. (eds.) Enviromental Criminology and Crime Analysis, pp. 78–93. Willan Publishing, UK (2008)

    Google Scholar 

  2. Brönnimann, H., Goodrich, M.T.: Almost optimal set covers in finite vc-dimension. Discrete Comput. Geom. 14, 293–302 (1995)

    Google Scholar 

  3. Bylander, T., Allemang, D., Tanner, M.C., Josephson, J.R.: The Computational Complexity of Abduction. (1991)

    Google Scholar 

  4. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 2nd edn. MIT, Cambridge (2001). http://mitpress.mit.edu/catalog/item/default.asp?tid=8570\&\#38;ttype=2

  5. Eiter, T., Gottlob, G.: The complexity of logic-based abduction. J. ACM 42(1), 3–42 (1995)

    Google Scholar 

  6. Feige, U.: A threshold of ln n for approximating set cover. J. ACM 45(4), 634–652 (1998)

    Google Scholar 

  7. Franceschetti, M., Cook, M., Bruck, J.: A geometric theorem for network design. IEEE Trans. Comput. 53(4), 483–489 (2004)

    Google Scholar 

  8. Fredman, M.L., Tarjan, R.E.: Fibonacci heaps and their uses in improved network optimization algorithms. J. ACM 34(3), 596–615 (1987). http://dx.doi.org/10.1145/28869.28874

    Google Scholar 

  9. Freedman, D., Purves, R., Pisani, R.: Statistics, 4 edn. W.W. Norton and Co., New York (2007)

    Google Scholar 

  10. Fu, B., Chen, Z., Abdelguerfi, M.: An almost linear time 2.8334-approximation algorithm for the disc covering problem. In: AAIM ’07: Proceedings of the 3rd international conference on Algorithmic Aspects in Information and Management, pp. 317–326. Springer, Berlin (2007)

    Google Scholar 

  11. Gijsbrechts, E., Campo, K., Goossens, T.: The impact of store flyers on store traffic and store sales: a geo-marketing approach. J. Retailing 79(1), 1–16 (2003). http://www.sciencedirect.com/science/article/B6W5D-4893MB0-1/2/db6c17461f5e9d38b3856a6b742e5a7a

  12. Gonzalez, T.F.: Covering a set of points in multidimensional space. Inf. Process. Lett. 40(4), 181–188 (1991)

    Google Scholar 

  13. Hochbaum, D.S., Maass, W.: Approximation schemes for covering and packing problems in image processing and vlsi. J. ACM 32, 130–136 (1985)

    Google Scholar 

  14. ISW: Map of Special Groups Activity in Iraq, Institute for the Study of War (2008)

    Google Scholar 

  15. doL̃agoP̃ereira, S., deB̃arros, L.N.: Planning with abduction: A logical framework to explore extensions to classical planning. In: Lecture Notes in Computer Science Advances in Artificial Intelligence – SBIA (2004)

    Google Scholar 

  16. Liao, C., Hu, S.: Polynomial time approximation schemes for minimum disk cover problems. J. Comb. Optim. http://dx.doi.org/10.1007/s10878-009-9216-y

  17. MacQueen, J.B.: Some methods for classification and analysis of multivariate observations. In: Cam, L.M.L., Neyman, J. (eds.) Proceedings of the fifth Berkeley Symposium on Mathematical Statistics and Probability. vol. 1, pp. 281–297. University of California Press, Berkeley, CA (1967)

    Google Scholar 

  18. Megiddo, N., Supowit, K.J.: On the complexity of some common geometric location problems. SIAM J. Comput. 13(1), 182–196 (1984)

    Google Scholar 

  19. Nemhauser, G.L., Wolsey, L.A., Fisher, M.:

    Google Scholar 

  20. Paschos, V.T.: A survey of approximately optimal solutions to some covering and packing problems. ACM Comput. Surv. 29(2), 171–209 (1997)

    Google Scholar 

  21. Peirce, C.S.: In: Buchler, J. (ed.) Philosophical Writings of Peirce. Dover Publications, New York (1955)

    Google Scholar 

  22. Peng, Y., Reggia, J.A.: Abductive Inference Models for Diagnostic Problem-Solving. Springer, New York (1990)

    Google Scholar 

  23. Rich, T.H., Fenton, M.A., Fenton, C.L.: The fossil book: A record of prehistoric life, 2nd edn. Dover Publications, New York (1996)

    Google Scholar 

  24. Rossmo, D.K., Rombouts, S.: Geographic Profiling. In: Wortley, R., Mazerolle, L. (eds.) Enviromental Criminology and Crime Analysis, pp. 136–149. Willan, Portland, OR (2008)

    Google Scholar 

  25. Shakarian, P., Subrahmanian, V., Spaino, M.L.: SCARE: A Case Study with Baghdad. In: Proceedings of the Third International Conference on Computational Cultural Dynamics. AAAI (2009)

    Google Scholar 

  26. Shakarian, P., Subrahmanian, V., Spaino, M.L.: Gaps: Geospatial abduction problems. ACM Transactions on Intelligent Systems and Technology. (2011)

    Google Scholar 

  27. Stollsteimer, J.F.: A working model for plant numbers and locations. J. Farm. Econom. 45(3), 631–645 (1963)

    Google Scholar 

  28. US Army: Intelligence Preparation of the Battlefiled (US Army Field Manual), FM 34-130 edn. (1994)

    Google Scholar 

Download references

Acknowledgements

Some of the authors of this paper were funded in part by AFOSR grant FA95500610405 and ARO grants W911NF0910206 and W911NF0910525.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. S. Subrahmanian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag/Wien

About this chapter

Cite this chapter

Shakarian, P., Subrahmanian, V.S. (2011). Region-Based Geospatial Abduction with Counter-IED Applications. In: Wiil, U.K. (eds) Counterterrorism and Open Source Intelligence. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0388-3_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-7091-0388-3_7

  • Published:

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-7091-0387-6

  • Online ISBN: 978-3-7091-0388-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics