US20170293847A1 - Crime risk forecasting - Google Patents
Crime risk forecasting Download PDFInfo
- Publication number
- US20170293847A1 US20170293847A1 US15/628,832 US201715628832A US2017293847A1 US 20170293847 A1 US20170293847 A1 US 20170293847A1 US 201715628832 A US201715628832 A US 201715628832A US 2017293847 A1 US2017293847 A1 US 2017293847A1
- Authority
- US
- United States
- Prior art keywords
- crime
- time
- incidents
- geographic area
- period
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000000034 method Methods 0.000 claims abstract description 35
- 230000002452 interceptive effect Effects 0.000 claims description 27
- 238000013459 approach Methods 0.000 abstract description 10
- 238000004422 calculation algorithm Methods 0.000 description 35
- 238000010801 machine learning Methods 0.000 description 25
- 238000004891 communication Methods 0.000 description 16
- 230000006870 function Effects 0.000 description 12
- 238000004040 coloring Methods 0.000 description 7
- 230000000694 effects Effects 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 6
- 238000007477 logistic regression Methods 0.000 description 6
- 238000013528 artificial neural network Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 5
- 230000007613 environmental effect Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 230000000007 visual effect Effects 0.000 description 5
- 238000000605 extraction Methods 0.000 description 3
- 230000003068 static effect Effects 0.000 description 3
- 238000012549 training Methods 0.000 description 3
- 239000013598 vector Substances 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000006855 networking Effects 0.000 description 2
- 230000001932 seasonal effect Effects 0.000 description 2
- 238000012706 support-vector machine Methods 0.000 description 2
- 230000002123 temporal effect Effects 0.000 description 2
- 241000208140 Acer Species 0.000 description 1
- VYZAMTAEIAYCRO-UHFFFAOYSA-N Chromium Chemical compound [Cr] VYZAMTAEIAYCRO-UHFFFAOYSA-N 0.000 description 1
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 208000001836 Firesetting Behavior Diseases 0.000 description 1
- 240000004050 Pentaglottis sempervirens Species 0.000 description 1
- 235000004522 Pentaglottis sempervirens Nutrition 0.000 description 1
- 239000008186 active pharmaceutical agent Substances 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008878 coupling Effects 0.000 description 1
- 238000010168 coupling process Methods 0.000 description 1
- 238000005859 coupling reaction Methods 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 230000003247 decreasing effect Effects 0.000 description 1
- 238000001983 electron spin resonance imaging Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007774 longterm Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000003909 pattern recognition Methods 0.000 description 1
- 230000000737 periodic effect Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000001568 sexual effect Effects 0.000 description 1
- 239000013589 supplement Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000016776 visual perception Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
- G06N20/20—Ensemble learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
- G06N5/048—Fuzzy inferencing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/04—Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/048—Interaction techniques based on graphical user interfaces [GUI]
- G06F3/0481—Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
Definitions
- the disclosed embodiments relate generally to computing devices. More specifically, the disclosed embodiments relate to computing devices and computer-implemented methods for generating crime risk forecasts and conveying the forecasts to a user.
- Interactive geospatial maps such as those produced by Internet-based mapping systems or other computer-based geospatial information systems (GIS). These interactive maps typically comprise satellite imagery or graphical basemaps that provide an aerial or bird's-eye perspective of a curved geographic surface, such as the surface of the Earth, after being projected using a map projection (e.g., a Mercator map projection). Some of the interactive basemaps may include one or more situational data layers displayed as overlays on the basemaps that visually convey various situational features such as roads, traffic, buildings, parks, restaurants, banks, schools, and other situational features.
- FIG. 1A is a screen shot of a computer graphical user interface showing an example generated crime risk forecast overlay to an interactive geospatial basemap per an embodiment of the present invention.
- FIG. 1B is another screen shot of a computer graphical user interface showing another example generated crime risk forecast overlay to an interactive geospatial basemap per an embodiment of the present invention.
- FIG. 2 is a schematic of a 5 kilometer by 5-kilometer geographic surface region divided into 400 square grid areas, each 250 by 250 meters in length.
- FIG. 3 is a block diagram of an example web-based geographic crime risk forecasting computer system in which an embodiment of the present invention is implemented.
- FIG. 4 is a block diagram that illustrates a computing device upon which embodiments of the present invention may be implemented.
- a computer-based crime risk forecasting system and corresponding method are provided for generating crime risk forecasts and conveying the forecasts to a user.
- the user may be a police officer or another law enforcement official, for example. With the conveyed forecasts, the user can more effectively gauge both the level of increased crime threat and its potential duration. The user can then leverage the information conveyed by the forecasts to take a more proactive approach to law enforcement in the affected areas during the period of increased crime threat.
- crime risk forecasts are generated and conveyed by a computer-based crime risk forecasting system.
- the crime risk forecasting system has at least two components: a forecasting component and a display component.
- the forecasting component and the display component may each be implemented in software, in hardware, or in a combination of software and hardware per the requirements of the implementation at hand.
- the forecasting component can use several different algorithms for generating the crime risk forecasts. Exemplary crime risk forecasting algorithms are described in greater detail below.
- the display component provides functionality for displaying generated forecasts to a user of the system.
- the display component incorporates a geospatial application capable of generating interactive geospatial basemaps such as, for example, those disclosed in related U.S. patent application Ser. No. 13/917,571, filed Jun. 13, 2013, entitled “Interactive Geospatial Map”, which is incorporated by reference herein in its entirety.
- the display component displays the generated crime risk forecast as an overlay to an interactive geospatial basemap generated by the geospatial application.
- the display component can provide environmental context to the conveyed forecast.
- the environmental context may indicate nearby buildings, roads, banks, automated teller machines, public transportation hubs, subway entrances and exits, and other environmental and situational information which can suggest why a geographic area is forecasted as a crime risk.
- the crime risk forecast is generated for a “target geographic area”, or just “target area” for short.
- the target area may correspond to 250 by 250 square meters of a geographic area.
- the target area may correspond to a city block, or a portion thereof.
- Other sized target areas are possible and the target area need not correspond to only a 250 by 250 square meter geographical area. More generally, the size of a target area may vary from implementation to implementation per the requirements of the particular implementation at hand.
- the crime risk forecast may also be generated for a time window.
- the term “time window” refers to a continuous period of time.
- the time window for which the forecast is generated may correspond to an 8-hour law enforcement patrol shift on a particular day.
- the day may be divided into three patrol shifts: a morning shift from 6 A.M. to 2 P.M., a late shift from 2 P.M. to 10 P.M., and a night shift from 10 P.M. to 6 A.M.
- a time window may correspond to one of the three patrol shifts on a given day.
- Other length time windows are possible and a time window need not be only 8-hours in length or span only a single day. More generally, the length of the time window may vary from implementation to implementation per the requirements of the implementation at hand.
- the crime risk forecast may also be generated for a predefined crime type in a set of predefined crime types.
- the set of predefined crime types may include one or more general personal and property crimes such as assault, battery, kidnapping, homicide, offenses of a sexual nature, larceny (theft), robbery (theft by force), vehicle theft, burglary, arson, and so forth.
- the set of predefined crime types includes a crime type that is a combination of two or more crime types.
- the set of predefined crime types may include a robbery and theft crime type instead of having separate robbery and theft crime types. More generally, the set of predefined crime types for which the forecast can be generated may vary from implementation to implementation per the requirements of the implementation at hand.
- a crime risk forecast may be generated for the same target area in which each forecast corresponds to a predefined crime type and a time window. For example, a crime risk forecast may be generated for burglary during the late patrol shift on a particular day in a target area, another forecast generated for burglary during the early patrol shift on the particular date in the target area, yet another forecast generated for vehicle theft during the late patrol shift on the particular date in the target area, and so forth.
- a generated crime risk forecast has a visible manifestation presented to the user.
- the visible manifestation can be presented to the user in a web browser or another computer graphical user interface.
- the visible manifestation of the crime risk forecast includes a visually highlighted area corresponding to the target area on the interactive geospatial basemap generated by the geospatial application. The visually highlighted area indicates the geographic target area the crime risk forecast applies to.
- the visual highlighting of the target area can take a variety of different forms including a bounding box or other geometric outline that indicates the geographic borders of the target area relative to the interactive geospatial basemap.
- the interior of the outlined geographic shape may also be colored with a semi-transparent fill that allows for visual perception of the underlying basemap, at least some degree corresponding to the level of transparency of the fill color.
- the fill color may indicate, for example, that the visual highlighting corresponds to a crime risk forecast, as opposed to a previous crime incident.
- the visible manifestation may convey a crime risk rating for the crime type and the time window the forecast was generated for.
- the crime risk rating conveys to the user the crime risk level in the target area for the crime type during the time window.
- the risk rating may be a quantitative value such as a number on a scale of 1 to 10, with 10 being the highest risk of the crime type occurring in the target area within the time window and 1 being the lowest risk of the crime type occurring in the target area and during the time window.
- Other risk rating scales are possible and a numerical risk rating scale of 1 to 10 is not required.
- the crime risk rating scale could be “A”, “B”, “C”, “D”, “E” and “F” with “A” indicating the lowest (or highest) crime risk and “F” indicating the highest (or lowest) crime risk.
- Qualitative risk ratings such as “low risk”, “moderate risk”, and “high risk” are also possible.
- the visible manifestation of the crime risk forecast may convey the algorithm used to generate the forecast.
- a different algorithm is used to generate forecasts for different time windows.
- forecasts generated for the early patrol shift, the late patrol shift, and the night patrol shift may be generated by different algorithms.
- the visible manifestation of the crime risk forecasts may indicate which algorithm was used to generate the risk ratings for each of the time windows. By doing so, the user can acquire a better sense of why a risk rating for a time window (e.g., the early shift) may be similar or different from a risk rating for another time window (e.g., the night shift).
- FIG. 1A is a screen shot of a computer graphical user interface 101 showing an example generated crime risk forecast overlay to an interactive geospatial basemap 103 per an embodiment of the present invention.
- the interactive geospatial basemap 103 is generated by a geospatial application and the overlay is generated by the display component of the crime risk forecasting system based on a crime risk forecast generated by the forecasting component of the crime risk forecasting system.
- the interactive geospatial basemap 103 includes graphical user interface controls 105 and 107 for adjusting the display of the basemap 103 .
- controls 105 allow the user to selectively add and remove geospatial situational layers to and from the basemap 105 .
- the layers can include, but are not limited to, one or more vector layers that convey geographical regions, roads, bridges, buildings/structures, terrain, transportation hubs, utilities, infrastructure, street lights, hotels/motels, railroads, hospitals, other types of buildings or structures, regions, transportation objects, and/or other types of entities and events.
- the vector layers may overlay one or more base layers to form basemap 103 .
- the base layers may include, for example, overhead (e.g., aerial or satellite) imagery, topographic, blank projected (e.g., Mercator projected), basemap, and blank unprojected.
- Controls 107 allow the user to adjust the zoom level of the basemap 103 either by increasing the zoom level to a smaller geographic area but in greater detail or by decreasing the zoom level to a larger geographic area but in less detail.
- Basemap 103 includes a map of a city. More specifically, basemap 103 represents an area of London. Basemap 103 is overlaid with several squares each representing the target area of a corresponding crime risk forecast generated by the forecasting component. One of the squares 109 is currently selected by the user and the details of the corresponding crime risk forecast are shown in a panel overlay to the basemap 103 generated by the display component. More specifically, the overlay panel shows that the crime risk forecast corresponding to square 109 is for the crime type 111 Theft Person and for the time window 115 of the afternoon shift on Jun. 12, 2014. The panel overlay also includes a risk rating 113 of 10.
- time of day graphical user interface element 117 color codes each hour of the day by the number of the historical crimes that occurred in the hour irrespective of crime type. Relatively darker coloring indicates that relatively more of the historical crime incidents occurred during that hour of the day. Relatively lighter coloring indicates that relatively fewer of the historical crime incidents occurred during that hour of the day. For example, the relatively darker coloring to the 9 a.m. hour suggests that higher crime activity may be associated with persons arriving at work in downtown London.
- Time of day graphical user interface element 119 is like element 117 except just for historical crime incidents of the crime type Theft Person. The relatively darker coloring to the 9 a.m.
- Color bar 121 breaks down all historical crime incidents in the last twelve months based on which the corresponding crime risk forecast is generated by crime type where each different color corresponds to a different crime type and the percentage of the color bar 121 occupied by a color represents the percentage of all historical crime incidents in the last twelve months that are of the corresponding crime type.
- FIG. 1B is a screen shot of a computer graphical user interface 151 showing another example generated crime risk forecast overlay to an interactive geospatial basemap 153 per an embodiment of the present invention.
- the interactive geospatial basemap 153 is generated by a geospatial application and the overlay is generated by the display component of the crime risk forecasting system based on a crime risk forecast generated by the forecasting component of the crime risk forecasting system.
- Basemap 153 includes a map of a city. More specifically, basemap 153 represents an area of London. Basemap 153 is overlaid with several squares each representing the target area of a corresponding crime risk forecast generated by the forecasting component. One of the squares 159 is currently selected by the user and the details of the corresponding crime risk forecast are shown in a panel overlay to the basemap 153 generated by the display component. More specifically, the overlay panel shows that the crime risk forecast corresponding to square 159 is for the crime type 161 Burglary and for the time window 165 of the morning shift on Jun. 13, 2014. The panel overlay also includes a risk rating 163 of 10 out of 10.
- the crime risk forecast is generated based on 214 historical crime incidents, 54 of which are burglary crime types.
- Color wheel graphical user interface element 167 color codes each hour of the day by the number of the 214 historical crime incidents that occurred in the hour irrespective of crime type. Relatively darker coloring indicates that relatively more of the 214 historical crime incidents occurred during that hour of the day. Relatively lighter coloring indicates that relatively fewer of the 214 historical crime incidents occurred during that hour of the day.
- Color wheel element 169 is like element 167 except just for the 54 of the 214 historical crime incidents that are of the crime type Burglary.
- Pie chart 171 is like color bar 121 of FIG. 1A except that it shows percentages by pie slices instead of by coloring portions of a color bar.
- Listing 173 shows the last five historical crime incidents to have occurred in the geographical area represented by square 159 and when they occurred.
- the layering features and functions of the geospatial application can be used to provide the user greater context to the forecast. More specifically, the user can add and remove situational geospatial layers to provide environment context to the forecast.
- the environmental context may indicate nearby buildings, roads, banks, automated teller machines, public transportation hubs, subway entrances and exits, and other environmental and situational information which can suggest why a geographic area is forecasted as a crime risk.
- a crime risk forecast is based on machine learning.
- historical crime incident features may be considered. Such features may include, for example, frequency of crime incidents in the target area, the number of crime incidents in the target area in a past period of time (e.g., the past week), the number of crime incidents in the target area in an extended past period of time (e.g., the past few weeks), the number of crime incidents in a past period of time in neighboring areas, and so forth.
- a machine learning algorithm such as, for example, a support vector machine, neural network, logistic regression or any other algorithm may be applied to available historical crime incident features.
- Example neural network and logistic regression algorithms for generating crime risk forecasts are described in greater detail below.
- a crime risk forecast generated by machine learning may be based on historical crime incident data associated with the target area.
- the historical crime incident data may pertain to only incidents within the target area over a given period(s) of time.
- the historical crime incident data may also pertain to incidents within neighboring or surrounding areas over a given period(s) of time.
- non-incident historical information may include, for example, weather information for the target area over a given period(s) of time and level of law enforcement patrol presence in or near the target area over a given period(s) of time.
- Level of law enforcement patrol presence in or near a target area can be determined from global positioning system (GPS) information obtained from radio equipment used by patrol officers over a given period(s) of time.
- GPS global positioning system
- crime risk forecasts generated according to the present invention are not limited to being generated based only on historical crime incident information but may also be based on other types of historical information such as historical weather information and historical law enforcement officer patrol activity.
- a first generated crime risk forecast for a first target area can indicate that the future crime risk in the first target area is relatively low and a second generated crime risk forecast for a second target area can indicate that the future crime risk in the second target area is relatively high.
- an indication of historical law enforcement presence in or near the first target area can indicate that the historical presence was relatively high and another indication of historical law enforcement presence in or near the second target area can indicate that the historical presence was relatively low.
- the user may decide to re-allocate some of the patrols assigned to areas in or near the first target area to areas in or near the second target area.
- Historical crime incident data on which generated crime risk forecasts may be based can include metadata pertaining to crime incidents.
- metadata may include the crime type, the date and time of the crime, the geographic location of the crime and the method of the crime.
- the crime type can be one of an enumeration such as burglary, robbery, theft of vehicle, theft from vehicle, criminal damage, violence, and so forth.
- the date and time may correspond to a law enforcement or police dispatch time, for example, or other date and time that indicates when the corresponding crime incident occurred or was reported to law enforcement.
- the date and time of the crime is a date/time range as opposed to a discrete point in time.
- the date and time of the crime can be treated as a uniform probability distribution over the date/time range.
- a geographic surface region is divided into uniformly sized areas in a grid-like fashion and location metadata for a crime incident specifies or indicates one of the areas in a region.
- FIG. 2 is a schematic of a 5 kilometers (km) by 5 km region 202 divided into 400 square grid cells, each 250 by 250 meters (m) in length.
- Region 202 and cells within region 202 can by defined with respect to a geographic surface by geographic coordinates such as latitude and longitude coordinates.
- Region 202 may correspond to a town or a neighborhood of a city.
- Cells within region 202 may correspond to a portion of the town or neighborhood such as, for example, a portion of a city block.
- Region 202 may be of square or rectangular dimensions other than 5 km by 5 km or any other shape. Similarly, cells with region 202 may be of square or rectangular dimensions other than 250 m by 250 m or any other shape, per the requirements of the implementation at hand.
- Location metadata for a historical crime incident can specify a cell in a region where the crime incident occurred.
- the location metadata can include a region identifier that specifies the region within which the crime incident occurred.
- the location metadata can also include grid coordinates that specifies a cell 204 within the identified region 202 within which the crime incident occurred.
- each cell within a region may be identified by an x, y grid coordinate, where x corresponds to the horizontal axis of the region and y corresponding to the vertical axis of the region.
- Other grid coordinate schemes as possible and the present invention is not limited to any manner for specifying a cell within a region in location metadata.
- the location metadata can indicate the cell and region where the crime incident occurred without explicitly identifying the regions and the cell.
- the metadata indicating the cell and region will need to be resolved to determine the cell 204 and the region 202 the metadata indicates.
- the location metadata is a street address location of the crime incident
- the street address can be resolved to geographic coordinates (e.g., latitude/longitude coordinates) using a geocoding application.
- the geographic coordinates returned for the street address by the geocoding application can be resolved to a cell within a region based on geographic coordinates associated with the cell and the region.
- the cell and region can be determined by identifying the region and the cell within the region the geographic coordinates for the street address are within or nearest to.
- the location metadata can indicate a region and a cell within the region with geographic coordinates. In this case, consulting a geocoding application to resolve a street address would not be necessary.
- a geographic area is divided into region(s) and grid cells before crime risk forecasts are generated for the area
- the area is divided in a grid-like fashion after crime risk forecasts are generated for the area in other embodiments.
- an algorithm for generating a crime risk forecast for a geographic area may not require the area to have been divided into grid cells prior to performing the algorithm to generate the forecast.
- a different algorithm may require an area to have been divided into grid cells before the algorithm can generate a forecast for a grid cell or cell(s) in the area.
- Crime incident metadata for a historical crime incident can include information about the crime incident other than just the crime type, crime date/time, and crime location. For example, if the crime incident involves entry into physical premises such as a building, home, or office, then the crime metadata for the incident may indicate the entry method used by the perpetrator. For example, if the crime incident was a burglary of a home, then the metadata for the incident may specify whether the perpetrator entered through a window, through communal doors, and so forth. Including entry method metadata information about certain crime incidents allows separate crime incidents to be linked or associated together by entry method.
- crime incident metadata for a crime incident can indicate a primary crime type (e.g., burglary) and one or more sub-types or characteristics of the primary crime type (e.g., entry method). This allows separate crime incidents of the same primary type to be linked or associated together by their common sub-types or characteristics.
- a primary crime type e.g., burglary
- sub-types or characteristics of the primary crime type e.g., entry method
- Crime incident metadata for a crime incident can also include free-form text provided by a reporting law enforcement officer. Such text may be a short description of the crime incident in the law enforcement officer's own words. Keywords may be extracted from the text and used to determine a location for the crime incident where no specific location is provided. For example, the text entered by the law enforcement officer may state that an incident occurred “in Appletown somewhere along First Street between Maple and Elm Avenues”. Based on this text description, an approximate street address can be determined and fed to a geocoding application to obtain approximate geographic coordinates or a line or area where the incident occurred. The returned geographic coordinates or line or area can then be resolved to a grid cell(s) in a region as described above.
- generation of a crime risk forecast may be based on custody data.
- the custody data may indicate persons apprehended or placed in law enforcement custody that are suspected to have or known to have committed certain crime incidents.
- Such custody information may be used to mathematically de-emphasize the significance of these crime incidents when generating crime risk forecasts based on these crime incidents on the theory that such crime incidents are less likely to occur again now that the perpetrators of those crime incidents are in custody.
- the custody data may also indicate when and where persons will be released from custody. Based on temporal and spatial custody release information, the significance of historical crime incidents in or near a target area where persons will be released from custody may be mathematically emphasized when generating a crime risk forecast for the target area based on these crime incidents on the theory that the persons released from custody have a significant probability of re-offending in or near the area they are released at. For example, when generating the crime risk forecast for the target area, historical crime incidents of the type perpetrated by the persons being released from custody in or near the target area may be mathematically emphasized on the theory that the persons released are more likely to re-commit the same types of crimes as opposed to other types of crimes.
- CAD computer-aided dispatch
- the CAD data may be obtained from a computer-aided dispatch (CAD) system or other computer system for dispatching public emergency personnel to respond to reported incidents.
- CAD data obtained for an incident may be used to create or supplement the historical crime incident data for the incident. More specifically, information in the CAD data may be used to generate or populate the crime type, crime date/time, and/or the crime location metadata for the incident.
- a prospective hotspotting algorithm is used to generate a crime risk forecast for a target area.
- historical crime incidents in or near the target area are analyzed.
- a set of possible historical crime incidents analyzed for generating the forecast can be circumscribed by time and space threshold parameters. More specifically, only recent crime incidents within a specified geographic distance (e.g., a radial distance) of the target area may be analyzed.
- recent crime incidents can be established by identifying nearby crime incidents that occurred, for example, after a specified time in the past.
- the set of crime incidents used for generating the forecast can include crime incidents that occurred in the past week.
- the crime risk for the target area is a weighted sum over all previous crime incidents within a space and time threshold.
- Each previous crime incident within the space and time thresholds can be weighted using a decay function that considers how far in space and in time the crime incident is from the target area.
- a spatiotemporal threshold can be applied so that, for example, only those events occurring within a 1 km geographic radial distance from the center of the target area and four (4) weeks of the current date/time are included in the calculation.
- the crime risk for a grid cell at time can be computed from a sum of a set of previous crime incidents:
- a j , k ⁇ ( t ) ⁇ i ⁇ : ⁇ ⁇ t - T ⁇ T i ⁇ t , ⁇ ⁇ ⁇ S ⁇ S ⁇ ⁇ 1 1 + ⁇ ⁇ ⁇ T ⁇ 1 1 + ⁇ ⁇ ⁇ S
- a j,k (t) is the crime risk in grid cell (j, k) in a geographic region at time t.
- T and S are the time and space threshold cut-off parameters, respectively.
- ⁇ T is the number of days between T i and t divided by T/10 where T i is the time of occurrence of one of n number of previous crime incidents over which the sum is computed.
- ⁇ S is the geographic distance between a point (e.g., the centroid) of the geographic area covered by the grid cell (j, k) and a geographic location of the previous crime incident Si.
- the prospective hotspotting technique can generate a more accurate crime risk forecast for a target area because it incorporates previous crime incidents for nearby areas and because it discounts previous nearby crime incidents as a function of their spatial and temporal distance from current forecast.
- the previous crime incidents within the time and space thresholds that are included in the sum can be limited to only those previous crime incidents that are of one or more particular crime types and that occurred within one or more particular time windows. For example, when generating a crime risk forecast for burglary during the late shift on a future date, the previous crime incidents can be limited to previous burglaries that occurred during the late shift within the space and time thresholds.
- a decay function can be used to limit the previous crime incidents included in the sum in other embodiments.
- an exponential decay function can be used to limit the previous crime incidents included in the sum.
- a crime risk forecast generated for a target area is computed as the sum of previous crime incidents in the target area.
- the crime risk for a grid cell at a time can be computed from a sum of a set of previous crime incidents:
- a j,k (t) is the crime risk in grid cell (j, k) in a geographic region at time t.
- the symbol I represents an indicator function that returns a positive numerical value (e.g., one) or zero for each previous crime incident in the set of previous crime incidents T i ⁇ t, where T i is the time of the ith previous crime incident in the set.
- the indicator function I returns a positive numerical value if the location of the ith previous crime incident (J i , K i ) was in the same grid cell (j,k) as the grid cell of the target area. Otherwise, the indicator function returns I zero.
- the indicator function returns I zero.
- the previous crime incidents included in the sum can be limited to those of a crime type and corresponding to a time window.
- logistic regression is used to generate a crime risk forecast from machine learning features.
- time 1 is discretized to a date.
- Machine learning features can be built as a function ⁇ of previous crime incidents and the discretized space-time coordinates of the target grid cell. For example, features ⁇ i (j, k, l, J m , K m , L m ) for time L m ⁇ l can be built.
- dates to be predicated can be excluded from the regression.
- built features can be static features.
- built features may be sparse vectors encoding the cell position (j, k).
- built features can be historical features that count previous crimes over a time window.
- any other machine learning algorithm for example a support vector machine or feed forward neural network may be used to learn the effects of previous crime incidents.
- the machine learning algorithm may also include different input such as historical weather information associated with the previous crime incidents.
- Other inputs may include computer-aided dispatch data, arrest data, and law enforcement patrol activity data.
- An example of a feature extraction method is a non-linear transformation in time and space, for example “distance to the nearest police station” or “square of the time elapsed since pub closing time”.
- a feature extraction method is known as “spatiotemporal cuboids”. Previous crime incidents are projected onto a space-time “cuboid”. Machine learning features are then built from the cuboid for each cell on each date in a date set. An example of one of the machine learning features that could be built is: how many crimes (or crimes of a crime type and during a corresponding time window) occurred in the past 7 days within a 3 by 3 grid-cell neighborhood of the grid cell corresponding to the target area.
- Another example of a feature extraction method is seasonal decomposition. Crime events are normalized per seasonal patterns on various time scales (day of the week, month of the year etc.) to isolate the periodic component and reveal the underlying trend in the data.
- a forecast is generated from a weighted combination of forecasts produced by multiple algorithms.
- a forecast for a target area for a crime type for a time window can be generated from a weighted combination of a) a first forecast for the target area for the crime type for the time window produced by the prospective hotspotting approach described above and b) a second forecast for the target area for the crime type for the time window generated by the histogram technique described above.
- Weights for each algorithm can be determined by comparing forecasts produced by the algorithm to the actual crime activity that occurred. Algorithms that produce more accurate forecasts receive greater weighting in the combination and algorithms that produce less accurate forecasts receive less weighting in the combination.
- outputs of multiple criminological algorithms are treated as machine learning features.
- the outputs of the prospective hotspotting and histogram approaches described above can be treated as machine learning features.
- the outputs of the multiple algorithms are then provided as input to a machine learning algorithm, potentially along with other machine learning feature inputs such as those described in the following section.
- the machine leaning algorithm can be a feed forward neural network with back propagation or logistic regression, as just some examples.
- a function of the ensemble machine learning algorithm is to decide as to which algorithm(s) to use for the prediction using the input data as a guide.
- the input algorithms may have varying time scales, area, parameters and thus the machine learning step is effectively choosing how far back in time to look, how wide a geographic area to consider, etc.
- this decision surface can be non-linear and thus potentially account for crime patterns varying over time, space, season, weather, patrol levels, custody release levels, etc. This approach in effect fuses the advantages of machine learning and automated pattern recognition with the more intuitive comprehensibility of the criminological approaches.
- a benefit of the ensemble method is that it provides a way to more accurately account for the trade-off faced with the criminological approaches between capturing areas of long-term elevated risk and finding short-term fluctuations. For example, the ensemble method can more accurately decide when to pick a criminological algorithm with a longer time window.
- the training of the machine learning algorithm used in the ensemble method is restricted to a subset of the training examples.
- the training set could be restricted to geographic areas of only high inherent risk. This would then bias the ensemble method forecast to weight towards algorithms that work well in these circumstances.
- FIG. 3 is a block diagram of an exemplary web-based geographic crime risk forecasting computer system 300 .
- System 300 includes a client computing device 302 operatively coupled to crime risk forecasting system 304 by data network 306 .
- the crime risk forecasting system 304 includes a display component 308 and a forecasting component 310 .
- Client computing device 302 executes a web browser 312 .
- the web browser 312 may in turn execute a portion of display component 308 .
- Web browser 312 may be a conventional web browser offering a well-known web browser platform such as MICROSOFT INTERNET EXPLORER, MOZILLA FIREFOX, GOOGLE CHROME, and so forth.
- the portion of display component 308 executed by web browser 312 may be implemented in standard client-side web application technologies such as HyperText Markup Language (HTML), Cascading Style Sheets (CSS), JavaScript (JS), and so forth.
- HTML HyperText Markup Language
- CSS Cascading Style Sheets
- JS JavaScript
- the portion of display component 308 executed by web browser 312 may be delivered to client 302 for execution by web browser 312 over network 306 by the display component 308 of crime risk forecasting system 304 .
- Such delivery may be made per a standard Internet networking protocol such as the Transmission Control Protocol/Internet Protocol (IP), the HyperText Transfer Protocol (HTTP), and so forth.
- IP Transmission Control Protocol/Internet Protocol
- HTTP HyperText Transfer Protocol
- the portion of display component 308 executed by web browser 312 is configured to retrieve over network 306 interactive geospatial basemaps from geospatial application 314 and visually overlay the retrieved basemaps with generated visual manifestations of crime risk forecasts generated by forecasting component 310 .
- the forecasts generated by forecasting component 310 may also be sent to client 302 using standard Internet networking protocol(s).
- the basemaps with the forecast overlays are then presented in a window of the web browser 312 to a user of client 302 .
- Database 316 stores generated forecast information and information from which crime risk forecasts are generated such as region and grid cell geographic information, historical crime incident data, custody data, dispatch data, and so forth.
- Geospatial application 314 can be any geospatial application capable of providing interactive geospatial basemaps such as those disclosed in related U.S. patent application Ser. No. 13/917,571, filed Jun. 13, 2013, entitled “Interactive Geospatial Map”, which is incorporated by reference herein in its entirety.
- Other possible geospatial applications that could be used as geospatial application 314 for providing interactive geospatial basemaps include Internet map servers that support Web Map Service (WMS) standards developed by the Open Geospatial Consortium such as ESRI ARCGIS SERVER, GEOSERVER, ARCGIS.COM, GOOGLE MAPS API, MICROSOFT BING MAPS, and so forth.
- WMS Web Map Service
- FIG. 4 is a block diagram that illustrates a computing device 400 in which some embodiments of the present invention may be embodied.
- Computing device 400 includes a bus 402 or other communication mechanism for communicating information, and a hardware processor 404 coupled with bus 402 for processing information.
- Hardware processor 404 may be, for example, a general purpose microprocessor or a system on a chip (SoC).
- Computing device 400 also includes a main memory 406 , such as a random access memory (RAM) or other dynamic storage device, coupled to bus 402 for storing information and instructions to be executed by processor 404 .
- Main memory 406 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed by processor 404 .
- Such instructions when stored in non-transitory storage media accessible to processor 404 , render computing device 400 into a special-purpose machine that is customized to perform the operations specified in the instructions.
- Computing device 400 further includes a read-only memory (ROM) 408 or other static storage device coupled to bus 402 for storing static information and instructions for processor 404 .
- ROM read-only memory
- a storage device 410 such as a magnetic disk, optical disk, or solid-state drive is provided and coupled to bus 402 for storing information and instructions.
- Computing device 400 may be coupled via bus 402 to a display 412 , such as a liquid crystal display (LCD) or other electronic visual display, for displaying information to a computer user.
- Display 412 may also be a touch-sensitive display for communicating touch gesture (e.g., finger or stylus) input to processor 404 .
- touch gesture e.g., finger or stylus
- An input device 414 is coupled to bus 402 for communicating information and command selections to processor 404 .
- cursor control 416 such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections to processor 404 and for controlling cursor movement on display 412 .
- This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane.
- Computing device 400 may implement the techniques described herein using customized hard-wired logic, one or more application-specific integrated circuits (ASICs), one or more field-programmable gate arrays (FPGAs), firmware, or program logic which, in combination with the computing device, causes or programs computing device 400 to be a special-purpose machine.
- the techniques herein are performed by computing device 400 in response to processor 404 executing one or more sequences of one or more instructions contained in main memory 406 . Such instructions may be read into main memory 406 from another storage medium, such as storage device 410 . Execution of the sequences of instructions contained in main memory 406 causes processor 404 to perform the process steps described herein.
- hard-wired circuitry may be used in place of or in combination with software instructions.
- Non-volatile media includes, for example, optical disks, magnetic disks, or solid-state drives, such as storage device 410 .
- Volatile media includes dynamic memory, such as main memory 406 .
- storage media include, for example, a floppy disk, a flexible disk, hard disk, solid-state drive, magnetic tape, or any other magnetic data storage medium, a CD-ROM, any other optical data storage medium, any physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, NVRAM, any other memory chip or cartridge.
- Storage media is distinct from but may be used in conjunction with transmission media.
- Transmission media participates in transferring information between storage media.
- transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise bus 402 .
- transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications.
- Various forms of media may be involved in carrying one or more sequences of one or more instructions to processor 404 for execution.
- the instructions may initially be carried on a magnetic disk or solid-state drive of a remote computer.
- the remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem.
- a modem local to computing device 400 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal.
- An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data on bus 402 .
- Bus 402 carries the data to main memory 406 , from which processor 404 retrieves and executes the instructions.
- the instructions received by main memory 406 may optionally be stored on storage device 410 either before or after execution by processor 404 .
- Computing device 400 also includes a communication interface 418 coupled to bus 402 .
- Communication interface 418 provides a two-way data communication coupling to a network link 420 that is connected to a local network 422 .
- communication interface 418 may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line.
- ISDN integrated services digital network
- communication interface 418 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN.
- LAN local area network
- Wireless links may also be implemented.
- communication interface 418 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information.
- Network link 420 typically provides data communication through one or more networks to other data devices.
- network link 420 may provide a connection through local network 422 to a host computer 424 or to data equipment operated by an Internet Service Provider (ISP) 426 .
- ISP 426 in turn provides data communication services through the world-wide packet data communication network now commonly referred to as the “Internet” 428 .
- Internet 428 uses electrical, electromagnetic or optical signals that carry digital data streams.
- the signals through the various networks and the signals on network link 420 and through communication interface 418 which carry the digital data to and from computing device 400 , are example forms of transmission media.
- Computing device 400 can send messages and receive data, including program code, through the network(s), network link 420 and communication interface 418 .
- a server 430 might transmit a requested code for an application program through Internet 428 , ISP 426 , local network 422 and communication interface 418 .
- the received code may be executed by processor 404 as it is received, and/or stored in storage device 410 , or other non-volatile storage for later execution.
- a software system is typically provided for controlling the operation of computing device 400 .
- the software system which is usually stored in main memory 406 and on fixed storage (e.g., hard disk) 410 , includes a kernel or operating system (OS) which manages low-level aspects of computer operation, including managing execution of processes, memory allocation, file and network input and output (I/O), and device I/O.
- OS can be provided by a conventional operating system such as, for example, MICROSOFT WINDOWS, SUN SOLARIS, or LINUX.
- the application(s) may be “loaded” into main memory 406 from storage 410 or may be downloaded from a network location (e.g., an Internet web server).
- a graphical user interface is typically provided for receiving user commands and data in a graphical (e.g., “point-and-click” or “touch gesture”) fashion. These inputs, in turn, may be acted upon by the computing device in accordance with instructions from the OS and/or application(s).
- the graphical user interface also serves to display the results of operation from the OS and application(s).
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Data Mining & Analysis (AREA)
- Tourism & Hospitality (AREA)
- Economics (AREA)
- General Engineering & Computer Science (AREA)
- Evolutionary Computation (AREA)
- Mathematical Physics (AREA)
- Computing Systems (AREA)
- Artificial Intelligence (AREA)
- Entrepreneurship & Innovation (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Development Economics (AREA)
- Medical Informatics (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computational Linguistics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Educational Administration (AREA)
- Primary Health Care (AREA)
- Computer Security & Cryptography (AREA)
- Game Theory and Decision Science (AREA)
- Fuzzy Systems (AREA)
- Automation & Control Theory (AREA)
- Alarm Systems (AREA)
Abstract
Description
- This application is a Continuation of U.S. application Ser. No. 14/843,734, filed Sep. 2, 2015, which is a Continuation of U.S. application Ser. No. 14/319,161, filed Jun. 30, 2014, now U.S. Pat. No. 9,129,219, the entire contents of each of which is hereby incorporated by reference for all purposes as if fully set forth herein. The applicant(s) hereby rescind any disclaimer of claim scope in the parent application(s) or the prosecution history thereof and advise the USPTO that the claims in this application may be broader than any claim in the parent application(s).
- This application is also related to U.S. patent application Ser. No. 13/917,571, filed Jun. 13, 2013, entitled “Interactive Geospatial Map”, which is incorporated by reference herein in its entirety.
- The disclosed embodiments relate generally to computing devices. More specifically, the disclosed embodiments relate to computing devices and computer-implemented methods for generating crime risk forecasts and conveying the forecasts to a user.
- Interactive geospatial maps, such as those produced by Internet-based mapping systems or other computer-based geospatial information systems (GIS), are available from several providers. These interactive maps typically comprise satellite imagery or graphical basemaps that provide an aerial or bird's-eye perspective of a curved geographic surface, such as the surface of the Earth, after being projected using a map projection (e.g., a Mercator map projection). Some of the interactive basemaps may include one or more situational data layers displayed as overlays on the basemaps that visually convey various situational features such as roads, traffic, buildings, parks, restaurants, banks, schools, and other situational features.
- The claims section appended hereto provides a useful summary of some embodiments of the present invention.
- In the drawings:
-
FIG. 1A is a screen shot of a computer graphical user interface showing an example generated crime risk forecast overlay to an interactive geospatial basemap per an embodiment of the present invention. -
FIG. 1B is another screen shot of a computer graphical user interface showing another example generated crime risk forecast overlay to an interactive geospatial basemap per an embodiment of the present invention. -
FIG. 2 is a schematic of a 5 kilometer by 5-kilometer geographic surface region divided into 400 square grid areas, each 250 by 250 meters in length. -
FIG. 3 is a block diagram of an example web-based geographic crime risk forecasting computer system in which an embodiment of the present invention is implemented. -
FIG. 4 is a block diagram that illustrates a computing device upon which embodiments of the present invention may be implemented. - In the following description, for the purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, that the present invention may be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form to avoid unnecessarily obscuring the present invention.
- Police departments and other law enforcement agencies would like to know when and where crimes are most likely to occur in the future to most efficiently and effectively allocate crime prevention resources. A computer-based crime risk forecasting system and corresponding method are provided for generating crime risk forecasts and conveying the forecasts to a user. The user may be a police officer or another law enforcement official, for example. With the conveyed forecasts, the user can more effectively gauge both the level of increased crime threat and its potential duration. The user can then leverage the information conveyed by the forecasts to take a more proactive approach to law enforcement in the affected areas during the period of increased crime threat.
- Per an embodiment of the present invention, crime risk forecasts are generated and conveyed by a computer-based crime risk forecasting system. The crime risk forecasting system has at least two components: a forecasting component and a display component. The forecasting component and the display component may each be implemented in software, in hardware, or in a combination of software and hardware per the requirements of the implementation at hand.
- The forecasting component can use several different algorithms for generating the crime risk forecasts. Exemplary crime risk forecasting algorithms are described in greater detail below.
- The display component provides functionality for displaying generated forecasts to a user of the system. The display component incorporates a geospatial application capable of generating interactive geospatial basemaps such as, for example, those disclosed in related U.S. patent application Ser. No. 13/917,571, filed Jun. 13, 2013, entitled “Interactive Geospatial Map”, which is incorporated by reference herein in its entirety.
- The display component displays the generated crime risk forecast as an overlay to an interactive geospatial basemap generated by the geospatial application. By incorporating interactive geospatial basemaps generated by the geospatial application, the display component can provide environmental context to the conveyed forecast. The environmental context may indicate nearby buildings, roads, banks, automated teller machines, public transportation hubs, subway entrances and exits, and other environmental and situational information which can suggest why a geographic area is forecasted as a crime risk.
- The crime risk forecast is generated for a “target geographic area”, or just “target area” for short. For example, the target area may correspond to 250 by 250 square meters of a geographic area. For example, the target area may correspond to a city block, or a portion thereof. Other sized target areas are possible and the target area need not correspond to only a 250 by 250 square meter geographical area. More generally, the size of a target area may vary from implementation to implementation per the requirements of the particular implementation at hand.
- In addition to being generated for the target area, the crime risk forecast may also be generated for a time window. As used herein, the term “time window” refers to a continuous period of time. For example, the time window for which the forecast is generated may correspond to an 8-hour law enforcement patrol shift on a particular day. For example, the day may be divided into three patrol shifts: a morning shift from 6 A.M. to 2 P.M., a late shift from 2 P.M. to 10 P.M., and a night shift from 10 P.M. to 6 A.M. A time window may correspond to one of the three patrol shifts on a given day. Other length time windows are possible and a time window need not be only 8-hours in length or span only a single day. More generally, the length of the time window may vary from implementation to implementation per the requirements of the implementation at hand.
- In addition to being generated for the target area and the time window, the crime risk forecast may also be generated for a predefined crime type in a set of predefined crime types. For example, the set of predefined crime types may include one or more general personal and property crimes such as assault, battery, kidnapping, homicide, offenses of a sexual nature, larceny (theft), robbery (theft by force), vehicle theft, burglary, arson, and so forth. In some instances, the set of predefined crime types includes a crime type that is a combination of two or more crime types. For example, the set of predefined crime types may include a robbery and theft crime type instead of having separate robbery and theft crime types. More generally, the set of predefined crime types for which the forecast can be generated may vary from implementation to implementation per the requirements of the implementation at hand.
- Multiple crime risk forecasts may be generated for the same target area in which each forecast corresponds to a predefined crime type and a time window. For example, a crime risk forecast may be generated for burglary during the late patrol shift on a particular day in a target area, another forecast generated for burglary during the early patrol shift on the particular date in the target area, yet another forecast generated for vehicle theft during the late patrol shift on the particular date in the target area, and so forth.
- A generated crime risk forecast has a visible manifestation presented to the user. For example, the visible manifestation can be presented to the user in a web browser or another computer graphical user interface. The visible manifestation of the crime risk forecast includes a visually highlighted area corresponding to the target area on the interactive geospatial basemap generated by the geospatial application. The visually highlighted area indicates the geographic target area the crime risk forecast applies to.
- The visual highlighting of the target area can take a variety of different forms including a bounding box or other geometric outline that indicates the geographic borders of the target area relative to the interactive geospatial basemap. The interior of the outlined geographic shape may also be colored with a semi-transparent fill that allows for visual perception of the underlying basemap, at least some degree corresponding to the level of transparency of the fill color. The fill color may indicate, for example, that the visual highlighting corresponds to a crime risk forecast, as opposed to a previous crime incident.
- In addition to indicating the target area to which the crime risk forecast applies, the visible manifestation may convey a crime risk rating for the crime type and the time window the forecast was generated for. The crime risk rating conveys to the user the crime risk level in the target area for the crime type during the time window. For example, the risk rating may be a quantitative value such as a number on a scale of 1 to 10, with 10 being the highest risk of the crime type occurring in the target area within the time window and 1 being the lowest risk of the crime type occurring in the target area and during the time window. Other risk rating scales are possible and a numerical risk rating scale of 1 to 10 is not required. For example, the crime risk rating scale could be “A”, “B”, “C”, “D”, “E” and “F” with “A” indicating the lowest (or highest) crime risk and “F” indicating the highest (or lowest) crime risk. Qualitative risk ratings such as “low risk”, “moderate risk”, and “high risk” are also possible.
- In addition to visually highlighting the target area on the interactive geospatial basemap and providing the risk rating, the visible manifestation of the crime risk forecast may convey the algorithm used to generate the forecast. In some instances, a different algorithm is used to generate forecasts for different time windows. For example, forecasts generated for the early patrol shift, the late patrol shift, and the night patrol shift may be generated by different algorithms. The visible manifestation of the crime risk forecasts may indicate which algorithm was used to generate the risk ratings for each of the time windows. By doing so, the user can acquire a better sense of why a risk rating for a time window (e.g., the early shift) may be similar or different from a risk rating for another time window (e.g., the night shift).
-
FIG. 1A is a screen shot of a computergraphical user interface 101 showing an example generated crime risk forecast overlay to an interactivegeospatial basemap 103 per an embodiment of the present invention. The interactivegeospatial basemap 103 is generated by a geospatial application and the overlay is generated by the display component of the crime risk forecasting system based on a crime risk forecast generated by the forecasting component of the crime risk forecasting system. The interactivegeospatial basemap 103 includes graphical user interface controls 105 and 107 for adjusting the display of thebasemap 103. - More specifically, controls 105 allow the user to selectively add and remove geospatial situational layers to and from the
basemap 105. The layers can include, but are not limited to, one or more vector layers that convey geographical regions, roads, bridges, buildings/structures, terrain, transportation hubs, utilities, infrastructure, street lights, hotels/motels, railroads, hospitals, other types of buildings or structures, regions, transportation objects, and/or other types of entities and events. The vector layers may overlay one or more base layers to formbasemap 103. The base layers may include, for example, overhead (e.g., aerial or satellite) imagery, topographic, blank projected (e.g., Mercator projected), basemap, and blank unprojected.Controls 107 allow the user to adjust the zoom level of thebasemap 103 either by increasing the zoom level to a smaller geographic area but in greater detail or by decreasing the zoom level to a larger geographic area but in less detail. -
Basemap 103 includes a map of a city. More specifically,basemap 103 represents an area of London.Basemap 103 is overlaid with several squares each representing the target area of a corresponding crime risk forecast generated by the forecasting component. One of thesquares 109 is currently selected by the user and the details of the corresponding crime risk forecast are shown in a panel overlay to thebasemap 103 generated by the display component. More specifically, the overlay panel shows that the crime risk forecast corresponding to square 109 is for thecrime type 111 Theft Person and for thetime window 115 of the afternoon shift on Jun. 12, 2014. The panel overlay also includes arisk rating 113 of 10. - The overlay panel generated by the display component also includes other contextual information to aid the user in better understanding the selected crime risk forecast. More specifically, time of day graphical
user interface element 117 color codes each hour of the day by the number of the historical crimes that occurred in the hour irrespective of crime type. Relatively darker coloring indicates that relatively more of the historical crime incidents occurred during that hour of the day. Relatively lighter coloring indicates that relatively fewer of the historical crime incidents occurred during that hour of the day. For example, the relatively darker coloring to the 9 a.m. hour suggests that higher crime activity may be associated with persons arriving at work in downtown London. Time of day graphicaluser interface element 119 is likeelement 117 except just for historical crime incidents of the crime type Theft Person. The relatively darker coloring to the 9 a.m. hour suggests that a relatively higher number of incidents of Theft Person crime type may also be associated with persons arriving at work in downtown London.Color bar 121 breaks down all historical crime incidents in the last twelve months based on which the corresponding crime risk forecast is generated by crime type where each different color corresponds to a different crime type and the percentage of thecolor bar 121 occupied by a color represents the percentage of all historical crime incidents in the last twelve months that are of the corresponding crime type. -
FIG. 1B is a screen shot of a computergraphical user interface 151 showing another example generated crime risk forecast overlay to an interactivegeospatial basemap 153 per an embodiment of the present invention. Like inbasemap 103 ofFIG. 1A , the interactivegeospatial basemap 153 is generated by a geospatial application and the overlay is generated by the display component of the crime risk forecasting system based on a crime risk forecast generated by the forecasting component of the crime risk forecasting system. -
Basemap 153 includes a map of a city. More specifically,basemap 153 represents an area of London.Basemap 153 is overlaid with several squares each representing the target area of a corresponding crime risk forecast generated by the forecasting component. One of thesquares 159 is currently selected by the user and the details of the corresponding crime risk forecast are shown in a panel overlay to thebasemap 153 generated by the display component. More specifically, the overlay panel shows that the crime risk forecast corresponding to square 159 is for thecrime type 161 Burglary and for thetime window 165 of the morning shift on Jun. 13, 2014. The panel overlay also includes arisk rating 163 of 10 out of 10. - In this example, as indicated in the overlay panel, the crime risk forecast is generated based on 214 historical crime incidents, 54 of which are burglary crime types. Color wheel graphical
user interface element 167 color codes each hour of the day by the number of the 214 historical crime incidents that occurred in the hour irrespective of crime type. Relatively darker coloring indicates that relatively more of the 214 historical crime incidents occurred during that hour of the day. Relatively lighter coloring indicates that relatively fewer of the 214 historical crime incidents occurred during that hour of the day.Color wheel element 169 is likeelement 167 except just for the 54 of the 214 historical crime incidents that are of the crime type Burglary.Pie chart 171 is likecolor bar 121 ofFIG. 1A except that it shows percentages by pie slices instead of by coloring portions of a color bar. Listing 173 shows the last five historical crime incidents to have occurred in the geographical area represented bysquare 159 and when they occurred. - By generating a visual manifestation of a crime risk forecast as an overlay to an interactive geospatial basemap generated by a geospatial application, the layering features and functions of the geospatial application can be used to provide the user greater context to the forecast. More specifically, the user can add and remove situational geospatial layers to provide environment context to the forecast. The environmental context may indicate nearby buildings, roads, banks, automated teller machines, public transportation hubs, subway entrances and exits, and other environmental and situational information which can suggest why a geographic area is forecasted as a crime risk.
- As described in greater detail below, several different algorithms may be used to generate a crime risk forecast. In some instances, a crime risk forecast is based on machine learning.
- When generating a crime risk forecast based on machine learning, historical crime incident features may be considered. Such features may include, for example, frequency of crime incidents in the target area, the number of crime incidents in the target area in a past period of time (e.g., the past week), the number of crime incidents in the target area in an extended past period of time (e.g., the past few weeks), the number of crime incidents in a past period of time in neighboring areas, and so forth.
- To generate a crime risk forecast based on machine learning, a machine learning algorithm such as, for example, a support vector machine, neural network, logistic regression or any other algorithm may be applied to available historical crime incident features. Example neural network and logistic regression algorithms for generating crime risk forecasts are described in greater detail below.
- A crime risk forecast generated by machine learning may be based on historical crime incident data associated with the target area. The historical crime incident data may pertain to only incidents within the target area over a given period(s) of time. Alternatively, the historical crime incident data may also pertain to incidents within neighboring or surrounding areas over a given period(s) of time.
- In addition to the historical crime incident data, machine learning can be used to generate a crime risk forecast based on “non-incident” historical information. Such non-incident historical information may include, for example, weather information for the target area over a given period(s) of time and level of law enforcement patrol presence in or near the target area over a given period(s) of time.
- Level of law enforcement patrol presence in or near a target area can be determined from global positioning system (GPS) information obtained from radio equipment used by patrol officers over a given period(s) of time. Thus, crime risk forecasts generated according to the present invention are not limited to being generated based only on historical crime incident information but may also be based on other types of historical information such as historical weather information and historical law enforcement officer patrol activity.
- Further, by collecting and maintaining information on historical law enforcement officer patrol activity in or near a target area and presenting such information in conjunction with a crime risk forecast for the target area, the user can see the relationship between historical law enforcement presence in or near the target area and the predicted risk of crime in the target area. For example, a first generated crime risk forecast for a first target area can indicate that the future crime risk in the first target area is relatively low and a second generated crime risk forecast for a second target area can indicate that the future crime risk in the second target area is relatively high. At the same, an indication of historical law enforcement presence in or near the first target area can indicate that the historical presence was relatively high and another indication of historical law enforcement presence in or near the second target area can indicate that the historical presence was relatively low. Based on conveying these forecasts and law enforcement presence indications to the user, the user may decide to re-allocate some of the patrols assigned to areas in or near the first target area to areas in or near the second target area.
- Historical crime incident data on which generated crime risk forecasts may be based can include metadata pertaining to crime incidents. Such metadata may include the crime type, the date and time of the crime, the geographic location of the crime and the method of the crime.
- The crime type can be one of an enumeration such as burglary, robbery, theft of vehicle, theft from vehicle, criminal damage, violence, and so forth.
- The date and time may correspond to a law enforcement or police dispatch time, for example, or other date and time that indicates when the corresponding crime incident occurred or was reported to law enforcement.
- In some instances, the date and time of the crime is a date/time range as opposed to a discrete point in time. In these instances, the date and time of the crime can be treated as a uniform probability distribution over the date/time range.
- In an embodiment, a geographic surface region is divided into uniformly sized areas in a grid-like fashion and location metadata for a crime incident specifies or indicates one of the areas in a region.
-
FIG. 2 is a schematic of a 5 kilometers (km) by 5km region 202 divided into 400 square grid cells, each 250 by 250 meters (m) in length. In this example, only four of the 400 square grid cells are illustrated and are labeled 204A, 204B, 204C, and 204D.Region 202 and cells withinregion 202 can by defined with respect to a geographic surface by geographic coordinates such as latitude and longitude coordinates.Region 202, for example, may correspond to a town or a neighborhood of a city. Cells withinregion 202 may correspond to a portion of the town or neighborhood such as, for example, a portion of a city block. -
Region 202 may be of square or rectangular dimensions other than 5 km by 5 km or any other shape. Similarly, cells withregion 202 may be of square or rectangular dimensions other than 250 m by 250 m or any other shape, per the requirements of the implementation at hand. - Location metadata for a historical crime incident can specify a cell in a region where the crime incident occurred. For example, the location metadata can include a region identifier that specifies the region within which the crime incident occurred.
- The location metadata can also include grid coordinates that specifies a cell 204 within the identified
region 202 within which the crime incident occurred. For example, each cell within a region may be identified by an x, y grid coordinate, where x corresponds to the horizontal axis of the region and y corresponding to the vertical axis of the region. For example,cell 204A inregion 202 may be identified by the grid coordinate x=1, y=1;cell 204B identified by the grid coordinates x=20, y=1;cell 204C identified by the grid coordinates x=20, y=20;cell 204D identified by the grid coordinates x=1, y=20; and so forth. Other grid coordinate schemes as possible and the present invention is not limited to any manner for specifying a cell within a region in location metadata. - In addition to or instead of explicitly specifying a region and a cell within the region within which the crime incident occurred, the location metadata can indicate the cell and region where the crime incident occurred without explicitly identifying the regions and the cell. In this case, the metadata indicating the cell and region will need to be resolved to determine the cell 204 and the
region 202 the metadata indicates. For example, if the location metadata is a street address location of the crime incident, the street address can be resolved to geographic coordinates (e.g., latitude/longitude coordinates) using a geocoding application. Then, the geographic coordinates returned for the street address by the geocoding application can be resolved to a cell within a region based on geographic coordinates associated with the cell and the region. For example, the cell and region can be determined by identifying the region and the cell within the region the geographic coordinates for the street address are within or nearest to. Alternatively, the location metadata can indicate a region and a cell within the region with geographic coordinates. In this case, consulting a geocoding application to resolve a street address would not be necessary. - While in some embodiments a geographic area is divided into region(s) and grid cells before crime risk forecasts are generated for the area, the area is divided in a grid-like fashion after crime risk forecasts are generated for the area in other embodiments. In other words, an algorithm for generating a crime risk forecast for a geographic area may not require the area to have been divided into grid cells prior to performing the algorithm to generate the forecast. However, a different algorithm may require an area to have been divided into grid cells before the algorithm can generate a forecast for a grid cell or cell(s) in the area.
- Crime incident metadata for a historical crime incident can include information about the crime incident other than just the crime type, crime date/time, and crime location. For example, if the crime incident involves entry into physical premises such as a building, home, or office, then the crime metadata for the incident may indicate the entry method used by the perpetrator. For example, if the crime incident was a burglary of a home, then the metadata for the incident may specify whether the perpetrator entered through a window, through communal doors, and so forth. Including entry method metadata information about certain crime incidents allows separate crime incidents to be linked or associated together by entry method. More generally, crime incident metadata for a crime incident can indicate a primary crime type (e.g., burglary) and one or more sub-types or characteristics of the primary crime type (e.g., entry method). This allows separate crime incidents of the same primary type to be linked or associated together by their common sub-types or characteristics.
- Crime incident metadata for a crime incident can also include free-form text provided by a reporting law enforcement officer. Such text may be a short description of the crime incident in the law enforcement officer's own words. Keywords may be extracted from the text and used to determine a location for the crime incident where no specific location is provided. For example, the text entered by the law enforcement officer may state that an incident occurred “in Appletown somewhere along First Street between Maple and Elm Avenues”. Based on this text description, an approximate street address can be determined and fed to a geocoding application to obtain approximate geographic coordinates or a line or area where the incident occurred. The returned geographic coordinates or line or area can then be resolved to a grid cell(s) in a region as described above.
- In addition to historical crime incident data, generation of a crime risk forecast may be based on custody data. The custody data may indicate persons apprehended or placed in law enforcement custody that are suspected to have or known to have committed certain crime incidents. Such custody information may be used to mathematically de-emphasize the significance of these crime incidents when generating crime risk forecasts based on these crime incidents on the theory that such crime incidents are less likely to occur again now that the perpetrators of those crime incidents are in custody.
- The custody data may also indicate when and where persons will be released from custody. Based on temporal and spatial custody release information, the significance of historical crime incidents in or near a target area where persons will be released from custody may be mathematically emphasized when generating a crime risk forecast for the target area based on these crime incidents on the theory that the persons released from custody have a significant probability of re-offending in or near the area they are released at. For example, when generating the crime risk forecast for the target area, historical crime incidents of the type perpetrated by the persons being released from custody in or near the target area may be mathematically emphasized on the theory that the persons released are more likely to re-commit the same types of crimes as opposed to other types of crimes.
- In addition to custody data, generation of a crime risk forecast may be based on computer-aided dispatch (CAD) data. The CAD data may be obtained from a computer-aided dispatch (CAD) system or other computer system for dispatching public emergency personnel to respond to reported incidents. CAD data obtained for an incident may be used to create or supplement the historical crime incident data for the incident. More specifically, information in the CAD data may be used to generate or populate the crime type, crime date/time, and/or the crime location metadata for the incident.
- Per an embodiment of the present invention, a prospective hotspotting algorithm is used to generate a crime risk forecast for a target area. To do so, historical crime incidents in or near the target area are analyzed. A set of possible historical crime incidents analyzed for generating the forecast can be circumscribed by time and space threshold parameters. More specifically, only recent crime incidents within a specified geographic distance (e.g., a radial distance) of the target area may be analyzed. Here, recent crime incidents can be established by identifying nearby crime incidents that occurred, for example, after a specified time in the past. For example, the set of crime incidents used for generating the forecast can include crime incidents that occurred in the past week.
- Per an embodiment of the prospective hotspotting technique for generating a crime risk forecast for a target area, the crime risk for the target area is a weighted sum over all previous crime incidents within a space and time threshold. Each previous crime incident within the space and time thresholds can be weighted using a decay function that considers how far in space and in time the crime incident is from the target area. In addition to the decay function, a spatiotemporal threshold can be applied so that, for example, only those events occurring within a 1 km geographic radial distance from the center of the target area and four (4) weeks of the current date/time are included in the calculation.
- For example, the crime risk for a grid cell at time can be computed from a sum of a set of previous crime incidents:
-
- Here, Aj,k(t) is the crime risk in grid cell (j, k) in a geographic region at time t. T and S are the time and space threshold cut-off parameters, respectively. ΔT is the number of days between Ti and t divided by T/10 where Ti is the time of occurrence of one of n number of previous crime incidents over which the sum is computed. ΔS is the geographic distance between a point (e.g., the centroid) of the geographic area covered by the grid cell (j, k) and a geographic location of the previous crime incident Si.
- As can be seen from the above equation, only previous crime incidents with locations and times within the time and space threshold cut-off parameters T and S, respectively, are included in the sum.
- The prospective hotspotting technique can generate a more accurate crime risk forecast for a target area because it incorporates previous crime incidents for nearby areas and because it discounts previous nearby crime incidents as a function of their spatial and temporal distance from current forecast.
- When generating a crime risk forecast for a particular crime type and a particular time window in addition to generating the crime risk forecast for the target area, the previous crime incidents within the time and space thresholds that are included in the sum can be limited to only those previous crime incidents that are of one or more particular crime types and that occurred within one or more particular time windows. For example, when generating a crime risk forecast for burglary during the late shift on a future date, the previous crime incidents can be limited to previous burglaries that occurred during the late shift within the space and time thresholds.
- While in the above example the prospective hotspotting technique space and time thresholds are used to limit the previous crime incidents considered in the sum, a decay function can be used to limit the previous crime incidents included in the sum in other embodiments. For example, an exponential decay function can be used to limit the previous crime incidents included in the sum.
- Per an embodiment, a crime risk forecast generated for a target area is computed as the sum of previous crime incidents in the target area. For example, the crime risk for a grid cell at a time can be computed from a sum of a set of previous crime incidents:
-
- The above-equation effectively functions as a simple histogram estimator. Aj,k(t) is the crime risk in grid cell (j, k) in a geographic region at time t. The symbol I represents an indicator function that returns a positive numerical value (e.g., one) or zero for each previous crime incident in the set of previous crime incidents Ti<t, where Ti is the time of the ith previous crime incident in the set. The indicator function I returns a positive numerical value if the location of the ith previous crime incident (Ji, Ki) was in the same grid cell (j,k) as the grid cell of the target area. Otherwise, the indicator function returns I zero. Thus, only previous crime incidents that occurred in the target area are considered in the histogram approach.
- Like with the prospective hotspotting technique, the previous crime incidents included in the sum can be limited to those of a crime type and corresponding to a time window.
- In one embodiment, logistic regression is used to generate a crime risk forecast from machine learning features. In one embodiment, the output of the logistic regression approach for a given target grid cell is whether that grid cell will or will not experience a crime at time t. This can be modeled as a random variable Cjkl={0, 1}, where j, k, and l are space-time grid coordinates. In an embodiment,
time 1 is discretized to a date. - Machine learning features can be built as a function ƒ of previous crime incidents and the discretized space-time coordinates of the target grid cell. For example, features ƒi(j, k, l, Jm, Km, Lm) for time Lm<l can be built.
- For the regression of the random variable onto the features, dates to be predicated can be excluded from the regression.
- In an embodiment, built features can be static features. For example, built features may be sparse vectors encoding the cell position (j, k). As another example, built features can be historical features that count previous crimes over a time window.
- Instead of logistic regression, any other machine learning algorithm for example a support vector machine or feed forward neural network may be used to learn the effects of previous crime incidents.
- The machine learning algorithm may also include different input such as historical weather information associated with the previous crime incidents. Other inputs may include computer-aided dispatch data, arrest data, and law enforcement patrol activity data.
- To improve the performance of machine learning algorithms discussed herein, various features are extracted from the underlying data and used as inputs to the machine learning algorithms.
- An example of a feature extraction method is a non-linear transformation in time and space, for example “distance to the nearest police station” or “square of the time elapsed since pub closing time”.
- Another example of a feature extraction method is known as “spatiotemporal cuboids”. Previous crime incidents are projected onto a space-time “cuboid”. Machine learning features are then built from the cuboid for each cell on each date in a date set. An example of one of the machine learning features that could be built is: how many crimes (or crimes of a crime type and during a corresponding time window) occurred in the past 7 days within a 3 by 3 grid-cell neighborhood of the grid cell corresponding to the target area.
- Another example of a feature extraction method is seasonal decomposition. Crime events are normalized per seasonal patterns on various time scales (day of the week, month of the year etc.) to isolate the periodic component and reveal the underlying trend in the data.
- In some embodiments, a forecast is generated from a weighted combination of forecasts produced by multiple algorithms. For example, a forecast for a target area for a crime type for a time window can be generated from a weighted combination of a) a first forecast for the target area for the crime type for the time window produced by the prospective hotspotting approach described above and b) a second forecast for the target area for the crime type for the time window generated by the histogram technique described above. Weights for each algorithm can be determined by comparing forecasts produced by the algorithm to the actual crime activity that occurred. Algorithms that produce more accurate forecasts receive greater weighting in the combination and algorithms that produce less accurate forecasts receive less weighting in the combination.
- In one ensemble method approach, outputs of multiple criminological algorithms are treated as machine learning features. For example, the outputs of the prospective hotspotting and histogram approaches described above can be treated as machine learning features. The outputs of the multiple algorithms are then provided as input to a machine learning algorithm, potentially along with other machine learning feature inputs such as those described in the following section. The machine leaning algorithm can be a feed forward neural network with back propagation or logistic regression, as just some examples.
- A function of the ensemble machine learning algorithm is to decide as to which algorithm(s) to use for the prediction using the input data as a guide. The input algorithms may have varying time scales, area, parameters and thus the machine learning step is effectively choosing how far back in time to look, how wide a geographic area to consider, etc. Where a neural network machine learning algorithm is used, this decision surface can be non-linear and thus potentially account for crime patterns varying over time, space, season, weather, patrol levels, custody release levels, etc. This approach in effect fuses the advantages of machine learning and automated pattern recognition with the more intuitive comprehensibility of the criminological approaches.
- A benefit of the ensemble method is that it provides a way to more accurately account for the trade-off faced with the criminological approaches between capturing areas of long-term elevated risk and finding short-term fluctuations. For example, the ensemble method can more accurately decide when to pick a criminological algorithm with a longer time window.
- In one embodiment, the training of the machine learning algorithm used in the ensemble method is restricted to a subset of the training examples. For example, the training set could be restricted to geographic areas of only high inherent risk. This would then bias the ensemble method forecast to weight towards algorithms that work well in these circumstances.
-
FIG. 3 is a block diagram of an exemplary web-based geographic crime risk forecastingcomputer system 300.System 300 includes aclient computing device 302 operatively coupled to crimerisk forecasting system 304 bydata network 306. The crimerisk forecasting system 304 includes adisplay component 308 and aforecasting component 310. -
Client computing device 302 executes aweb browser 312. Theweb browser 312 may in turn execute a portion ofdisplay component 308. -
Web browser 312 may be a conventional web browser offering a well-known web browser platform such as MICROSOFT INTERNET EXPLORER, MOZILLA FIREFOX, GOOGLE CHROME, and so forth. - The portion of
display component 308 executed byweb browser 312 may be implemented in standard client-side web application technologies such as HyperText Markup Language (HTML), Cascading Style Sheets (CSS), JavaScript (JS), and so forth. - The portion of
display component 308 executed byweb browser 312 may be delivered toclient 302 for execution byweb browser 312 overnetwork 306 by thedisplay component 308 of crimerisk forecasting system 304. Such delivery may be made per a standard Internet networking protocol such as the Transmission Control Protocol/Internet Protocol (IP), the HyperText Transfer Protocol (HTTP), and so forth. - The portion of
display component 308 executed byweb browser 312 is configured to retrieve overnetwork 306 interactive geospatial basemaps fromgeospatial application 314 and visually overlay the retrieved basemaps with generated visual manifestations of crime risk forecasts generated by forecastingcomponent 310. The forecasts generated by forecastingcomponent 310 may also be sent toclient 302 using standard Internet networking protocol(s). The basemaps with the forecast overlays are then presented in a window of theweb browser 312 to a user ofclient 302. -
Database 316 stores generated forecast information and information from which crime risk forecasts are generated such as region and grid cell geographic information, historical crime incident data, custody data, dispatch data, and so forth. -
Geospatial application 314 can be any geospatial application capable of providing interactive geospatial basemaps such as those disclosed in related U.S. patent application Ser. No. 13/917,571, filed Jun. 13, 2013, entitled “Interactive Geospatial Map”, which is incorporated by reference herein in its entirety. Other possible geospatial applications that could be used asgeospatial application 314 for providing interactive geospatial basemaps include Internet map servers that support Web Map Service (WMS) standards developed by the Open Geospatial Consortium such as ESRI ARCGIS SERVER, GEOSERVER, ARCGIS.COM, GOOGLE MAPS API, MICROSOFT BING MAPS, and so forth. - In some embodiments, the techniques disclosed herein are implemented on one or more computing devices. For example,
FIG. 4 is a block diagram that illustrates acomputing device 400 in which some embodiments of the present invention may be embodied.Computing device 400 includes abus 402 or other communication mechanism for communicating information, and ahardware processor 404 coupled withbus 402 for processing information.Hardware processor 404 may be, for example, a general purpose microprocessor or a system on a chip (SoC). -
Computing device 400 also includes amain memory 406, such as a random access memory (RAM) or other dynamic storage device, coupled tobus 402 for storing information and instructions to be executed byprocessor 404.Main memory 406 also may be used for storing temporary variables or other intermediate information during execution of instructions to be executed byprocessor 404. Such instructions, when stored in non-transitory storage media accessible toprocessor 404, rendercomputing device 400 into a special-purpose machine that is customized to perform the operations specified in the instructions. -
Computing device 400 further includes a read-only memory (ROM) 408 or other static storage device coupled tobus 402 for storing static information and instructions forprocessor 404. - A
storage device 410, such as a magnetic disk, optical disk, or solid-state drive is provided and coupled tobus 402 for storing information and instructions. -
Computing device 400 may be coupled viabus 402 to adisplay 412, such as a liquid crystal display (LCD) or other electronic visual display, for displaying information to a computer user.Display 412 may also be a touch-sensitive display for communicating touch gesture (e.g., finger or stylus) input toprocessor 404. - An
input device 414, including alphanumeric and other keys, is coupled tobus 402 for communicating information and command selections toprocessor 404. - Another type of user input device is
cursor control 416, such as a mouse, a trackball, or cursor direction keys for communicating direction information and command selections toprocessor 404 and for controlling cursor movement ondisplay 412. This input device typically has two degrees of freedom in two axes, a first axis (e.g., x) and a second axis (e.g., y), that allows the device to specify positions in a plane. -
Computing device 400 may implement the techniques described herein using customized hard-wired logic, one or more application-specific integrated circuits (ASICs), one or more field-programmable gate arrays (FPGAs), firmware, or program logic which, in combination with the computing device, causes orprograms computing device 400 to be a special-purpose machine. Per some embodiments, the techniques herein are performed by computingdevice 400 in response toprocessor 404 executing one or more sequences of one or more instructions contained inmain memory 406. Such instructions may be read intomain memory 406 from another storage medium, such asstorage device 410. Execution of the sequences of instructions contained inmain memory 406 causesprocessor 404 to perform the process steps described herein. In alternative embodiments, hard-wired circuitry may be used in place of or in combination with software instructions. - The term “storage media” as used herein refers to any non-transitory media that store data and/or instructions that cause a machine to operate in a specific fashion. Such storage media may comprise non-volatile media and/or volatile media. Non-volatile media includes, for example, optical disks, magnetic disks, or solid-state drives, such as
storage device 410. Volatile media includes dynamic memory, such asmain memory 406. Common forms of storage media include, for example, a floppy disk, a flexible disk, hard disk, solid-state drive, magnetic tape, or any other magnetic data storage medium, a CD-ROM, any other optical data storage medium, any physical medium with patterns of holes, a RAM, a PROM, and EPROM, a FLASH-EPROM, NVRAM, any other memory chip or cartridge. - Storage media is distinct from but may be used in conjunction with transmission media. Transmission media participates in transferring information between storage media. For example, transmission media includes coaxial cables, copper wire and fiber optics, including the wires that comprise
bus 402. Transmission media can also take the form of acoustic or light waves, such as those generated during radio-wave and infra-red data communications. - Various forms of media may be involved in carrying one or more sequences of one or more instructions to
processor 404 for execution. For example, the instructions may initially be carried on a magnetic disk or solid-state drive of a remote computer. The remote computer can load the instructions into its dynamic memory and send the instructions over a telephone line using a modem. A modem local tocomputing device 400 can receive the data on the telephone line and use an infra-red transmitter to convert the data to an infra-red signal. An infra-red detector can receive the data carried in the infra-red signal and appropriate circuitry can place the data onbus 402.Bus 402 carries the data tomain memory 406, from whichprocessor 404 retrieves and executes the instructions. The instructions received bymain memory 406 may optionally be stored onstorage device 410 either before or after execution byprocessor 404. -
Computing device 400 also includes acommunication interface 418 coupled tobus 402.Communication interface 418 provides a two-way data communication coupling to anetwork link 420 that is connected to alocal network 422. For example,communication interface 418 may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection to a corresponding type of telephone line. As another example,communication interface 418 may be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links may also be implemented. In any such implementation,communication interface 418 sends and receives electrical, electromagnetic or optical signals that carry digital data streams representing various types of information. - Network link 420 typically provides data communication through one or more networks to other data devices. For example,
network link 420 may provide a connection throughlocal network 422 to ahost computer 424 or to data equipment operated by an Internet Service Provider (ISP) 426.ISP 426 in turn provides data communication services through the world-wide packet data communication network now commonly referred to as the “Internet” 428.Local network 422 andInternet 428 both use electrical, electromagnetic or optical signals that carry digital data streams. The signals through the various networks and the signals onnetwork link 420 and throughcommunication interface 418, which carry the digital data to and fromcomputing device 400, are example forms of transmission media. -
Computing device 400 can send messages and receive data, including program code, through the network(s),network link 420 andcommunication interface 418. In the Internet example, aserver 430 might transmit a requested code for an application program throughInternet 428,ISP 426,local network 422 andcommunication interface 418. - The received code may be executed by
processor 404 as it is received, and/or stored instorage device 410, or other non-volatile storage for later execution. - A software system is typically provided for controlling the operation of
computing device 400. The software system, which is usually stored inmain memory 406 and on fixed storage (e.g., hard disk) 410, includes a kernel or operating system (OS) which manages low-level aspects of computer operation, including managing execution of processes, memory allocation, file and network input and output (I/O), and device I/O. The OS can be provided by a conventional operating system such as, for example, MICROSOFT WINDOWS, SUN SOLARIS, or LINUX. - One or more application(s), such as client software or “programs” or set of processor-executable instructions, may also be provided for execution by
computer 400. The application(s) may be “loaded” intomain memory 406 fromstorage 410 or may be downloaded from a network location (e.g., an Internet web server). A graphical user interface (GUI) is typically provided for receiving user commands and data in a graphical (e.g., “point-and-click” or “touch gesture”) fashion. These inputs, in turn, may be acted upon by the computing device in accordance with instructions from the OS and/or application(s). The graphical user interface also serves to display the results of operation from the OS and application(s). - The foregoing description, for purpose of explanation, has been described regarding specific embodiments. However, the illustrative discussions above are not intended to be exhaustive or to limit the invention to the precise forms described. Many modifications and variations are possible in view of the above teachings. The embodiments were chosen and described to best explain the principles of the invention and its practical applications, to thereby enable other skilled in the art to best utilize the invention and various embodiments with various modifications as are suited to the use contemplated.
Claims (20)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US15/628,832 US20170293847A1 (en) | 2014-06-30 | 2017-06-21 | Crime risk forecasting |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/319,161 US9129219B1 (en) | 2014-06-30 | 2014-06-30 | Crime risk forecasting |
US14/843,734 US9836694B2 (en) | 2014-06-30 | 2015-09-02 | Crime risk forecasting |
US15/628,832 US20170293847A1 (en) | 2014-06-30 | 2017-06-21 | Crime risk forecasting |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/843,734 Continuation US9836694B2 (en) | 2014-06-30 | 2015-09-02 | Crime risk forecasting |
Publications (1)
Publication Number | Publication Date |
---|---|
US20170293847A1 true US20170293847A1 (en) | 2017-10-12 |
Family
ID=53502470
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/319,161 Active US9129219B1 (en) | 2014-06-30 | 2014-06-30 | Crime risk forecasting |
US14/843,734 Active 2034-08-19 US9836694B2 (en) | 2014-06-30 | 2015-09-02 | Crime risk forecasting |
US15/628,832 Abandoned US20170293847A1 (en) | 2014-06-30 | 2017-06-21 | Crime risk forecasting |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/319,161 Active US9129219B1 (en) | 2014-06-30 | 2014-06-30 | Crime risk forecasting |
US14/843,734 Active 2034-08-19 US9836694B2 (en) | 2014-06-30 | 2015-09-02 | Crime risk forecasting |
Country Status (2)
Country | Link |
---|---|
US (3) | US9129219B1 (en) |
EP (1) | EP2963595A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109829055A (en) * | 2019-02-22 | 2019-05-31 | 苏州大学 | User's law article prediction technique based on filtering door machine |
WO2019152945A1 (en) * | 2018-02-02 | 2019-08-08 | Findo, Inc. | Method of using machine learning to predict problematic actions within an organization |
WO2021262213A1 (en) * | 2020-06-24 | 2021-12-30 | Petrey Jr William Holloway | System and method for using artificial intelligence to determine a probability of occurrence of a subsequent incident |
US11270129B2 (en) | 2019-06-25 | 2022-03-08 | William Holloway Petrey, JR. | System and method for correlating electronic device identifiers and vehicle information |
US11615695B2 (en) | 2018-06-12 | 2023-03-28 | Intergraph Corporation | Coverage agent for computer-aided dispatch systems |
WO2024028637A1 (en) * | 2022-08-03 | 2024-02-08 | Dubai Police General Headquarters | Computer-implemented event tracking and forecasting system and method of using the system |
Families Citing this family (176)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6505123B1 (en) | 2000-07-24 | 2003-01-07 | Weatherbank, Inc. | Interactive weather advisory system |
US8229467B2 (en) | 2006-01-19 | 2012-07-24 | Locator IP, L.P. | Interactive advisory system |
US8429194B2 (en) | 2008-09-15 | 2013-04-23 | Palantir Technologies, Inc. | Document-based workflows |
US9104695B1 (en) | 2009-07-27 | 2015-08-11 | Palantir Technologies, Inc. | Geotagging structured data |
US9547693B1 (en) | 2011-06-23 | 2017-01-17 | Palantir Technologies Inc. | Periodic database search manager for multiple data sources |
US8732574B2 (en) | 2011-08-25 | 2014-05-20 | Palantir Technologies, Inc. | System and method for parameterizing documents for automatic workflow generation |
US9508169B2 (en) | 2012-09-14 | 2016-11-29 | Google Inc. | Method and apparatus for contextually varying amounts of imagery on a map |
US9348677B2 (en) | 2012-10-22 | 2016-05-24 | Palantir Technologies Inc. | System and method for batch evaluation programs |
US9501507B1 (en) | 2012-12-27 | 2016-11-22 | Palantir Technologies Inc. | Geo-temporal indexing and searching |
US10140664B2 (en) | 2013-03-14 | 2018-11-27 | Palantir Technologies Inc. | Resolving similar entities from a transaction database |
US8924388B2 (en) | 2013-03-15 | 2014-12-30 | Palantir Technologies Inc. | Computer-implemented systems and methods for comparing and associating objects |
US8868486B2 (en) | 2013-03-15 | 2014-10-21 | Palantir Technologies Inc. | Time-sensitive cube |
US8909656B2 (en) | 2013-03-15 | 2014-12-09 | Palantir Technologies Inc. | Filter chains with associated multipath views for exploring large data sets |
US8799799B1 (en) | 2013-05-07 | 2014-08-05 | Palantir Technologies Inc. | Interactive geospatial map |
US8601326B1 (en) * | 2013-07-05 | 2013-12-03 | Palantir Technologies, Inc. | Data quality monitors |
US8938686B1 (en) | 2013-10-03 | 2015-01-20 | Palantir Technologies Inc. | Systems and methods for analyzing performance of an entity |
US9116975B2 (en) | 2013-10-18 | 2015-08-25 | Palantir Technologies Inc. | Systems and user interfaces for dynamic and interactive simultaneous querying of multiple data stores |
US9105000B1 (en) | 2013-12-10 | 2015-08-11 | Palantir Technologies Inc. | Aggregating data from a plurality of data sources |
US9734217B2 (en) | 2013-12-16 | 2017-08-15 | Palantir Technologies Inc. | Methods and systems for analyzing entity performance |
US10579647B1 (en) | 2013-12-16 | 2020-03-03 | Palantir Technologies Inc. | Methods and systems for analyzing entity performance |
US10356032B2 (en) | 2013-12-26 | 2019-07-16 | Palantir Technologies Inc. | System and method for detecting confidential information emails |
US8935201B1 (en) | 2014-03-18 | 2015-01-13 | Palantir Technologies Inc. | Determining and extracting changed data from a data source |
US9836580B2 (en) | 2014-03-21 | 2017-12-05 | Palantir Technologies Inc. | Provider portal |
US9619557B2 (en) | 2014-06-30 | 2017-04-11 | Palantir Technologies, Inc. | Systems and methods for key phrase characterization of documents |
US9535974B1 (en) | 2014-06-30 | 2017-01-03 | Palantir Technologies Inc. | Systems and methods for identifying key phrase clusters within documents |
US9256664B2 (en) | 2014-07-03 | 2016-02-09 | Palantir Technologies Inc. | System and method for news events detection and visualization |
US9838858B2 (en) | 2014-07-08 | 2017-12-05 | Rapidsos, Inc. | System and method for call management |
US20160026923A1 (en) | 2014-07-22 | 2016-01-28 | Palantir Technologies Inc. | System and method for determining a propensity of entity to take a specified action |
US9390086B2 (en) | 2014-09-11 | 2016-07-12 | Palantir Technologies Inc. | Classification system with methodology for efficient verification |
WO2016044540A1 (en) | 2014-09-19 | 2016-03-24 | Rapidsos, Inc. | Method and system for emergency call management |
US9785328B2 (en) | 2014-10-06 | 2017-10-10 | Palantir Technologies Inc. | Presentation of multivariate data on a graphical user interface of a computing system |
US9229952B1 (en) | 2014-11-05 | 2016-01-05 | Palantir Technologies, Inc. | History preserving data pipeline system and method |
USD780770S1 (en) * | 2014-11-05 | 2017-03-07 | Palantir Technologies Inc. | Display screen or portion thereof with graphical user interface |
US9483546B2 (en) | 2014-12-15 | 2016-11-01 | Palantir Technologies Inc. | System and method for associating related records to common entities across multiple lists |
US10552994B2 (en) | 2014-12-22 | 2020-02-04 | Palantir Technologies Inc. | Systems and interactive user interfaces for dynamic retrieval, analysis, and triage of data items |
US9348920B1 (en) | 2014-12-22 | 2016-05-24 | Palantir Technologies Inc. | Concept indexing among database of documents using machine learning techniques |
US20160189043A1 (en) * | 2014-12-24 | 2016-06-30 | Locator IP, L.P. | Crime forcasting system |
US9335911B1 (en) | 2014-12-29 | 2016-05-10 | Palantir Technologies Inc. | Interactive user interface for dynamic data analysis exploration and query processing |
US9817563B1 (en) | 2014-12-29 | 2017-11-14 | Palantir Technologies Inc. | System and method of generating data points from one or more data stores of data items for chart creation and manipulation |
US11302426B1 (en) | 2015-01-02 | 2022-04-12 | Palantir Technologies Inc. | Unified data interface and system |
US9727560B2 (en) | 2015-02-25 | 2017-08-08 | Palantir Technologies Inc. | Systems and methods for organizing and identifying documents via hierarchies and dimensions of tags |
EP3070622A1 (en) | 2015-03-16 | 2016-09-21 | Palantir Technologies, Inc. | Interactive user interfaces for location-based data analysis |
US9715668B1 (en) * | 2015-04-15 | 2017-07-25 | Predpol, Inc. | Patrol presence management system |
US10103953B1 (en) | 2015-05-12 | 2018-10-16 | Palantir Technologies Inc. | Methods and systems for analyzing entity performance |
US9460175B1 (en) | 2015-06-03 | 2016-10-04 | Palantir Technologies Inc. | Server implemented geographic information system with graphical interface |
US10628834B1 (en) | 2015-06-16 | 2020-04-21 | Palantir Technologies Inc. | Fraud lead detection system for efficiently processing database-stored data and automatically generating natural language explanatory information of system results for display in interactive user interfaces |
US9418337B1 (en) | 2015-07-21 | 2016-08-16 | Palantir Technologies Inc. | Systems and models for data analytics |
US9392008B1 (en) | 2015-07-23 | 2016-07-12 | Palantir Technologies Inc. | Systems and methods for identifying information related to payment card breaches |
US9996595B2 (en) | 2015-08-03 | 2018-06-12 | Palantir Technologies, Inc. | Providing full data provenance visualization for versioned datasets |
US9600146B2 (en) | 2015-08-17 | 2017-03-21 | Palantir Technologies Inc. | Interactive geospatial map |
US9671776B1 (en) | 2015-08-20 | 2017-06-06 | Palantir Technologies Inc. | Quantifying, tracking, and anticipating risk at a manufacturing facility, taking deviation type and staffing conditions into account |
US9485265B1 (en) | 2015-08-28 | 2016-11-01 | Palantir Technologies Inc. | Malicious activity detection system capable of efficiently processing data accessed from databases and generating alerts for display in interactive user interfaces |
US10706434B1 (en) | 2015-09-01 | 2020-07-07 | Palantir Technologies Inc. | Methods and systems for determining location information |
US20170068712A1 (en) | 2015-09-04 | 2017-03-09 | Palantir Technologies Inc. | Systems and methods for database investigation tool |
US9639580B1 (en) | 2015-09-04 | 2017-05-02 | Palantir Technologies, Inc. | Computer-implemented systems and methods for data management and visualization |
US9984428B2 (en) | 2015-09-04 | 2018-05-29 | Palantir Technologies Inc. | Systems and methods for structuring data from unstructured electronic data files |
US9576015B1 (en) | 2015-09-09 | 2017-02-21 | Palantir Technologies, Inc. | Domain-specific language for dataset transformations |
US10558936B2 (en) * | 2015-10-06 | 2020-02-11 | Numerica Corporation | Systems and methods for dynamically generating patrol schedules based on historic demand data |
US9424669B1 (en) | 2015-10-21 | 2016-08-23 | Palantir Technologies Inc. | Generating graphical representations of event participation flow |
EP3371990A4 (en) | 2015-11-02 | 2019-11-06 | Rapidsos Inc. | Method and system for situational awareness for emergency response |
US10223429B2 (en) | 2015-12-01 | 2019-03-05 | Palantir Technologies Inc. | Entity data attribution using disparate data sets |
US10706056B1 (en) | 2015-12-02 | 2020-07-07 | Palantir Technologies Inc. | Audit log report generator |
US9760556B1 (en) | 2015-12-11 | 2017-09-12 | Palantir Technologies Inc. | Systems and methods for annotating and linking electronic documents |
US9514414B1 (en) | 2015-12-11 | 2016-12-06 | Palantir Technologies Inc. | Systems and methods for identifying and categorizing electronic documents through machine learning |
US10114884B1 (en) | 2015-12-16 | 2018-10-30 | Palantir Technologies Inc. | Systems and methods for attribute analysis of one or more databases |
US9736670B2 (en) | 2015-12-17 | 2017-08-15 | Rapidsos, Inc. | Devices and methods for efficient emergency calling |
US10373099B1 (en) | 2015-12-18 | 2019-08-06 | Palantir Technologies Inc. | Misalignment detection system for efficiently processing database-stored data and automatically generating misalignment information for display in interactive user interfaces |
US10109094B2 (en) | 2015-12-21 | 2018-10-23 | Palantir Technologies Inc. | Interface to index and display geospatial data |
EP3398088A4 (en) * | 2015-12-28 | 2019-08-21 | Sixgill Ltd. | Dark web monitoring, analysis and alert system and method |
US10871878B1 (en) | 2015-12-29 | 2020-12-22 | Palantir Technologies Inc. | System log analysis and object user interaction correlation system |
US9792020B1 (en) | 2015-12-30 | 2017-10-17 | Palantir Technologies Inc. | Systems for collecting, aggregating, and storing data, generating interactive user interfaces for analyzing data, and generating alerts based upon collected data |
US9986404B2 (en) | 2016-02-26 | 2018-05-29 | Rapidsos, Inc. | Systems and methods for emergency communications amongst groups of devices based on shared data |
US10290068B2 (en) * | 2016-02-26 | 2019-05-14 | Navigatorsvrs, Inc. | Graphical platform for interacting with unstructured data |
US10698938B2 (en) | 2016-03-18 | 2020-06-30 | Palantir Technologies Inc. | Systems and methods for organizing and identifying documents via hierarchies and dimensions of tags |
US9652139B1 (en) | 2016-04-06 | 2017-05-16 | Palantir Technologies Inc. | Graphical representation of an output |
US9924043B2 (en) | 2016-04-26 | 2018-03-20 | Rapidsos, Inc. | Systems and methods for emergency communications |
US20170316357A1 (en) * | 2016-04-28 | 2017-11-02 | Honeywell International Inc. | Systems and methods for displaying a dynamic risk level indicator of an atm site or other remote monitoring site on a map for improved remote monitoring |
US10068199B1 (en) | 2016-05-13 | 2018-09-04 | Palantir Technologies Inc. | System to catalogue tracking data |
US10007674B2 (en) | 2016-06-13 | 2018-06-26 | Palantir Technologies Inc. | Data revision control in large-scale data analytic systems |
US10545975B1 (en) | 2016-06-22 | 2020-01-28 | Palantir Technologies Inc. | Visual analysis of data using sequenced dataset reduction |
USD826269S1 (en) | 2016-06-29 | 2018-08-21 | Palantir Technologies, Inc. | Display screen or portion thereof with graphical user interface |
US10909130B1 (en) | 2016-07-01 | 2021-02-02 | Palantir Technologies Inc. | Graphical user interface for a database system |
US11016730B2 (en) * | 2016-07-28 | 2021-05-25 | International Business Machines Corporation | Transforming a transactional data set to generate forecasting and prediction insights |
US9686357B1 (en) | 2016-08-02 | 2017-06-20 | Palantir Technologies Inc. | Mapping content delivery |
KR101830522B1 (en) * | 2016-08-22 | 2018-02-21 | 가톨릭대학교 산학협력단 | Method for predicting crime occurrence of prediction target region using big data |
US10861320B2 (en) | 2016-08-22 | 2020-12-08 | Rapidsos, Inc. | Predictive analytics for emergency detection and response management |
US10552002B1 (en) | 2016-09-27 | 2020-02-04 | Palantir Technologies Inc. | User interface based variable machine modeling |
US20180096253A1 (en) * | 2016-10-04 | 2018-04-05 | Civicscape, LLC | Rare event forecasting system and method |
JP2018061216A (en) * | 2016-10-07 | 2018-04-12 | パナソニックIpマネジメント株式会社 | Information display system and information display method |
US10726507B1 (en) | 2016-11-11 | 2020-07-28 | Palantir Technologies Inc. | Graphical representation of a complex task |
US10318630B1 (en) | 2016-11-21 | 2019-06-11 | Palantir Technologies Inc. | Analysis of large bodies of textual data |
US9842338B1 (en) | 2016-11-21 | 2017-12-12 | Palantir Technologies Inc. | System to identify vulnerable card readers |
US11250425B1 (en) | 2016-11-30 | 2022-02-15 | Palantir Technologies Inc. | Generating a statistic using electronic transaction data |
US10515433B1 (en) | 2016-12-13 | 2019-12-24 | Palantir Technologies Inc. | Zoom-adaptive data granularity to achieve a flexible high-performance interface for a geospatial mapping system |
US9886525B1 (en) | 2016-12-16 | 2018-02-06 | Palantir Technologies Inc. | Data item aggregate probability analysis system |
GB201621434D0 (en) | 2016-12-16 | 2017-02-01 | Palantir Technologies Inc | Processing sensor logs |
US10270727B2 (en) | 2016-12-20 | 2019-04-23 | Palantir Technologies, Inc. | Short message communication within a mobile graphical map |
US10249033B1 (en) | 2016-12-20 | 2019-04-02 | Palantir Technologies Inc. | User interface for managing defects |
US10728262B1 (en) | 2016-12-21 | 2020-07-28 | Palantir Technologies Inc. | Context-aware network-based malicious activity warning systems |
US11373752B2 (en) | 2016-12-22 | 2022-06-28 | Palantir Technologies Inc. | Detection of misuse of a benefit system |
US10360238B1 (en) | 2016-12-22 | 2019-07-23 | Palantir Technologies Inc. | Database systems and user interfaces for interactive data association, analysis, and presentation |
US10721262B2 (en) | 2016-12-28 | 2020-07-21 | Palantir Technologies Inc. | Resource-centric network cyber attack warning system |
US10762471B1 (en) | 2017-01-09 | 2020-09-01 | Palantir Technologies Inc. | Automating management of integrated workflows based on disparate subsidiary data sources |
US10133621B1 (en) | 2017-01-18 | 2018-11-20 | Palantir Technologies Inc. | Data analysis system to facilitate investigative process |
US10509844B1 (en) | 2017-01-19 | 2019-12-17 | Palantir Technologies Inc. | Network graph parser |
US10515109B2 (en) | 2017-02-15 | 2019-12-24 | Palantir Technologies Inc. | Real-time auditing of industrial equipment condition |
US10579239B1 (en) | 2017-03-23 | 2020-03-03 | Palantir Technologies Inc. | Systems and methods for production and display of dynamically linked slide presentations |
US10866936B1 (en) | 2017-03-29 | 2020-12-15 | Palantir Technologies Inc. | Model object management and storage system |
US10581954B2 (en) | 2017-03-29 | 2020-03-03 | Palantir Technologies Inc. | Metric collection and aggregation for distributed software services |
CN107103120A (en) * | 2017-03-31 | 2017-08-29 | 上海大学 | Method based on SVMs Fast Prediction Ni Mn Ga marmem transition temperatures |
US10133783B2 (en) | 2017-04-11 | 2018-11-20 | Palantir Technologies Inc. | Systems and methods for constraint driven database searching |
US10563990B1 (en) | 2017-05-09 | 2020-02-18 | Palantir Technologies Inc. | Event-based route planning |
US10244581B2 (en) | 2017-05-19 | 2019-03-26 | At&T Mobility Ii Llc | Public safety analytics gateway |
US10606872B1 (en) | 2017-05-22 | 2020-03-31 | Palantir Technologies Inc. | Graphical user interface for a database system |
USD837234S1 (en) * | 2017-05-25 | 2019-01-01 | Palantir Technologies Inc. | Display screen or portion thereof with transitional graphical user interface |
US11334216B2 (en) | 2017-05-30 | 2022-05-17 | Palantir Technologies Inc. | Systems and methods for visually presenting geospatial information |
US10895946B2 (en) | 2017-05-30 | 2021-01-19 | Palantir Technologies Inc. | Systems and methods for using tiled data |
US10795749B1 (en) | 2017-05-31 | 2020-10-06 | Palantir Technologies Inc. | Systems and methods for providing fault analysis user interface |
US10956406B2 (en) | 2017-06-12 | 2021-03-23 | Palantir Technologies Inc. | Propagated deletion of database records and derived data |
US11216762B1 (en) | 2017-07-13 | 2022-01-04 | Palantir Technologies Inc. | Automated risk visualization using customer-centric data analysis |
US11314798B2 (en) | 2017-07-19 | 2022-04-26 | Allstate Insurance Company | Processing system having machine learning engine for providing customized user functions |
US10430444B1 (en) | 2017-07-24 | 2019-10-01 | Palantir Technologies Inc. | Interactive geospatial map and geospatial visualization systems |
US10922334B2 (en) * | 2017-08-11 | 2021-02-16 | Conduent Business Services, Llc | Mixture model based time-series clustering of crime data across spatial entities |
JP6627842B2 (en) * | 2017-10-18 | 2020-01-08 | 日本電気株式会社 | Information processing apparatus, risk prediction method, and program |
WO2019088971A1 (en) * | 2017-10-30 | 2019-05-09 | Hewlett-Packard Development Company, L. P. | Crime profiles |
US20190164246A1 (en) * | 2017-11-27 | 2019-05-30 | Promontory Financial Group Llc | Overlaying software maps with crime risk forecast data |
US10371537B1 (en) | 2017-11-29 | 2019-08-06 | Palantir Technologies Inc. | Systems and methods for flexible route planning |
WO2019113129A1 (en) | 2017-12-05 | 2019-06-13 | Rapidsos, Inc. | Social media content for emergency management |
US11599706B1 (en) | 2017-12-06 | 2023-03-07 | Palantir Technologies Inc. | Systems and methods for providing a view of geospatial information |
US10877984B1 (en) | 2017-12-07 | 2020-12-29 | Palantir Technologies Inc. | Systems and methods for filtering and visualizing large scale datasets |
US10769171B1 (en) | 2017-12-07 | 2020-09-08 | Palantir Technologies Inc. | Relationship analysis and mapping for interrelated multi-layered datasets |
US11314721B1 (en) | 2017-12-07 | 2022-04-26 | Palantir Technologies Inc. | User-interactive defect analysis for root cause |
US10698756B1 (en) | 2017-12-15 | 2020-06-30 | Palantir Technologies Inc. | Linking related events for various devices and services in computer log files on a centralized server |
US10810280B2 (en) * | 2017-12-21 | 2020-10-20 | Motorola Solutions, Inc. | Device, system and method for deploying communication devices based on historic incidents |
US11263382B1 (en) | 2017-12-22 | 2022-03-01 | Palantir Technologies Inc. | Data normalization and irregularity detection system |
US10820181B2 (en) | 2018-02-09 | 2020-10-27 | Rapidsos, Inc. | Emergency location analysis system |
US10896234B2 (en) | 2018-03-29 | 2021-01-19 | Palantir Technologies Inc. | Interactive geographical map |
US10877654B1 (en) | 2018-04-03 | 2020-12-29 | Palantir Technologies Inc. | Graphical user interfaces for optimizations |
US10830599B2 (en) | 2018-04-03 | 2020-11-10 | Palantir Technologies Inc. | Systems and methods for alternative projections of geographical information |
US11585672B1 (en) | 2018-04-11 | 2023-02-21 | Palantir Technologies Inc. | Three-dimensional representations of routes |
US20190318223A1 (en) * | 2018-04-12 | 2019-10-17 | Georgia Tech Research Corporation | Methods and Systems for Data Analysis by Text Embeddings |
US10754822B1 (en) | 2018-04-18 | 2020-08-25 | Palantir Technologies Inc. | Systems and methods for ontology migration |
US11429725B1 (en) * | 2018-04-26 | 2022-08-30 | Citicorp Credit Services, Inc. (Usa) | Automated security risk assessment systems and methods |
CN108629452A (en) * | 2018-04-28 | 2018-10-09 | 智慧天气风险管理(深圳)有限公司 | A kind of Weather Risk decision-making technique based on multi-mode multi-parameter DATA PROCESSING IN ENSEMBLE PREDICTION SYSTEM |
US10885021B1 (en) | 2018-05-02 | 2021-01-05 | Palantir Technologies Inc. | Interactive interpreter and graphical user interface |
US10754946B1 (en) | 2018-05-08 | 2020-08-25 | Palantir Technologies Inc. | Systems and methods for implementing a machine learning approach to modeling entity behavior |
US10429197B1 (en) | 2018-05-29 | 2019-10-01 | Palantir Technologies Inc. | Terrain analysis for automatic route determination |
US10805786B2 (en) | 2018-06-11 | 2020-10-13 | Rapidsos, Inc. | Systems and user interfaces for emergency data integration |
CN109063887B (en) * | 2018-06-13 | 2021-09-17 | 中国华戎科技集团有限公司 | Crime hotspot prediction method and system |
US11119630B1 (en) | 2018-06-19 | 2021-09-14 | Palantir Technologies Inc. | Artificial intelligence assisted evaluations and user interface for same |
US11917514B2 (en) | 2018-08-14 | 2024-02-27 | Rapidsos, Inc. | Systems and methods for intelligently managing multimedia for emergency response |
US11556774B2 (en) | 2018-08-27 | 2023-01-17 | Conduent Business Services, Llc | Method and system for forecasting in sparse data streams via dense data streams |
CN109409638A (en) * | 2018-08-30 | 2019-03-01 | 昆明理工大学 | A kind of crime method for early warning based on irregular shape space scanning statistics |
US11126638B1 (en) | 2018-09-13 | 2021-09-21 | Palantir Technologies Inc. | Data visualization and parsing system |
US11294928B1 (en) | 2018-10-12 | 2022-04-05 | Palantir Technologies Inc. | System architecture for relating and linking data objects |
US10977927B2 (en) | 2018-10-24 | 2021-04-13 | Rapidsos, Inc. | Emergency communication flow management and notification system |
US10467435B1 (en) | 2018-10-24 | 2019-11-05 | Palantir Technologies Inc. | Approaches for managing restrictions for middleware applications |
US11025672B2 (en) | 2018-10-25 | 2021-06-01 | Palantir Technologies Inc. | Approaches for securing middleware data access |
US11227295B2 (en) | 2018-12-18 | 2022-01-18 | Kalibrate Technologies Limited | Methods and systems for generating an aggregated data stream |
WO2020172612A1 (en) | 2019-02-22 | 2020-08-27 | Rapidsos, Inc. | Systems & methods for automated emergency response |
US11853657B2 (en) | 2019-02-28 | 2023-12-26 | Kalibrate Technologies Limited | Machine-learned model selection network planning |
US10991060B2 (en) * | 2019-03-15 | 2021-04-27 | Motorola Solutions, Inc. | Device, system and method for dispatching responders to patrol routes |
JP7357316B2 (en) | 2019-03-27 | 2023-10-06 | 株式会社Singular Perturbations | Event prediction device |
US11146680B2 (en) | 2019-03-29 | 2021-10-12 | Rapidsos, Inc. | Systems and methods for emergency data integration |
CA3135274C (en) | 2019-03-29 | 2024-01-16 | Rapidsos, Inc. | Systems and methods for emergency data integration |
US11645628B2 (en) | 2019-05-16 | 2023-05-09 | Microsoft Technology Licensing, Llc | Translation of time between calendar systems |
US11228891B2 (en) | 2019-07-03 | 2022-01-18 | Rapidsos, Inc. | Systems and methods for emergency medical communications |
CN110750609A (en) * | 2019-10-14 | 2020-02-04 | 浙江警察学院 | Method for predicting number of criminal cases based on space-time data and neural network |
US11481421B2 (en) * | 2019-12-18 | 2022-10-25 | Motorola Solutions, Inc. | Methods and apparatus for automated review of public safety incident reports |
JP6828132B1 (en) * | 2019-12-25 | 2021-02-10 | 典志 藤本 | Accident occurrence prediction system and accident occurrence prediction method |
CN113095539A (en) * | 2020-07-06 | 2021-07-09 | 广州大学 | Method and device for identifying optimal measurement index of specific crowd |
US11451930B2 (en) * | 2020-10-15 | 2022-09-20 | Conduent Business Services, Llc | Dynamic hotspot prediction method and system |
US11330664B1 (en) | 2020-12-31 | 2022-05-10 | Rapidsos, Inc. | Apparatus and method for obtaining emergency data and providing a map view |
CN112989592A (en) * | 2021-03-09 | 2021-06-18 | 西北工业大学 | Event scene modeling method based on dynamic crime network |
US11681424B2 (en) | 2021-05-14 | 2023-06-20 | Microsoft Technology Licensing, Llc | Map calendar graphical user interface with content-variable view levels |
US11514405B1 (en) | 2021-05-14 | 2022-11-29 | Microsoft Technology Licensing, Llc | Map calendar graphical user interface with dynamic time mold functionality |
Family Cites Families (311)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4958305A (en) | 1987-11-04 | 1990-09-18 | General Electric Company | Polygon edge clipping |
US4899161A (en) | 1988-07-21 | 1990-02-06 | International Business Machines Corporation | High accuracy coordinate conversion method for air traffic control applications |
FR2684214B1 (en) | 1991-11-22 | 1997-04-04 | Sepro Robotique | INDEXING CARD FOR GEOGRAPHIC INFORMATION SYSTEM AND SYSTEM INCLUDING APPLICATION. |
IL113805A0 (en) | 1994-05-23 | 1995-08-31 | Coulter Corp | Detection of reticulocytes |
US5818737A (en) * | 1994-08-04 | 1998-10-06 | City Of Scottsdale | Method for guiding development of muncipality |
JP3252623B2 (en) | 1994-11-09 | 2002-02-04 | 松下電器産業株式会社 | Shape model generator |
US5781195A (en) | 1996-04-16 | 1998-07-14 | Microsoft Corporation | Method and system for rendering two-dimensional views of a three-dimensional surface |
US6178432B1 (en) | 1996-09-30 | 2001-01-23 | Informative Graphics Corp. | Method and apparatus for creating interactive web page objects |
CA2187704C (en) | 1996-10-11 | 1999-05-04 | Darcy Kim Rossmo | Expert system method of performing crime site analysis |
US5870559A (en) | 1996-10-15 | 1999-02-09 | Mercury Interactive | Software system and associated methods for facilitating the analysis and management of web sites |
US6275233B1 (en) | 1996-11-01 | 2001-08-14 | International Business Machines Corporation | Surface simplification preserving a solid volume |
US6430305B1 (en) | 1996-12-20 | 2002-08-06 | Synaptics, Incorporated | Identity verification methods |
US6026233A (en) | 1997-05-27 | 2000-02-15 | Microsoft Corporation | Method and apparatus for presenting and selecting options to modify a programming language statement |
US6091956A (en) | 1997-06-12 | 2000-07-18 | Hollenberg; Dennis D. | Situation information system |
US6157747A (en) | 1997-08-01 | 2000-12-05 | Microsoft Corporation | 3-dimensional image rotation method and apparatus for producing image mosaics |
US6247019B1 (en) | 1998-03-17 | 2001-06-12 | Prc Public Sector, Inc. | Object-based geographic information system (GIS) |
US6173067B1 (en) | 1998-04-07 | 2001-01-09 | Hughes Electronics Corporation | System and method for rapid determination of visibility-based terrain properties over broad regions |
US6389289B1 (en) | 1998-05-07 | 2002-05-14 | Hughes Electronics Corporation | Earth tiling system for providing regional based service in a mobile satellite communication network |
US7168039B2 (en) | 1998-06-02 | 2007-01-23 | International Business Machines Corporation | Method and system for reducing the horizontal space required for displaying a column containing text data |
US6577304B1 (en) | 1998-08-14 | 2003-06-10 | I2 Technologies Us, Inc. | System and method for visually representing a supply chain |
US6529900B1 (en) | 1999-01-14 | 2003-03-04 | International Business Machines Corporation | Method and apparatus for data visualization |
US6292796B1 (en) | 1999-02-23 | 2001-09-18 | Clinical Focus, Inc. | Method and apparatus for improving access to literature |
US6631496B1 (en) | 1999-03-22 | 2003-10-07 | Nec Corporation | System for personalizing, organizing and managing web information |
US6662103B1 (en) | 1999-03-22 | 2003-12-09 | Arc Second Inc. | Method and system for creating a user-selectable arbitrary coordinate frame |
US6483509B1 (en) | 1999-04-09 | 2002-11-19 | International Business Machines Corp. | Curve contour smoothing |
US6307573B1 (en) | 1999-07-22 | 2001-10-23 | Barbara L. Barros | Graphic-information flow method and system for visually analyzing patterns and relationships |
JP2003519828A (en) | 1999-09-21 | 2003-06-24 | チョイスメーカー テクノロジーズ インコーポレイテッド | Probabilistic record link model derived from training data |
US6958753B2 (en) | 1999-12-27 | 2005-10-25 | Minolta Co., Ltd. | Method and apparatus for reducing three-dimensional shape data |
US7148898B1 (en) | 2000-03-29 | 2006-12-12 | Sourceprose Corporation | System and method for synchronizing raster and vector map images |
JP4325075B2 (en) | 2000-04-21 | 2009-09-02 | ソニー株式会社 | Data object management device |
US6484101B1 (en) | 2000-08-16 | 2002-11-19 | Imagelinks, Inc. | 3-dimensional interactive image modeling system |
US6795868B1 (en) | 2000-08-31 | 2004-09-21 | Data Junction Corp. | System and method for event-driven data transformation |
US20020065708A1 (en) | 2000-09-22 | 2002-05-30 | Hikmet Senay | Method and system for interactive visual analyses of organizational interactions |
US6757445B1 (en) | 2000-10-04 | 2004-06-29 | Pixxures, Inc. | Method and apparatus for producing digital orthophotos using sparse stereo configurations and external models |
US8707185B2 (en) | 2000-10-10 | 2014-04-22 | Addnclick, Inc. | Dynamic information management system and method for content delivery and sharing in content-, metadata- and viewer-based, live social networking among users concurrently engaged in the same and/or similar content |
US8117281B2 (en) | 2006-11-02 | 2012-02-14 | Addnclick, Inc. | Using internet content as a means to establish live social networks by linking internet users to each other who are simultaneously engaged in the same and/or similar content |
US6754640B2 (en) | 2000-10-30 | 2004-06-22 | William O. Bozeman | Universal positive pay match, authentication, authorization, settlement and clearing system |
US6978419B1 (en) | 2000-11-15 | 2005-12-20 | Justsystem Corporation | Method and apparatus for efficient identification of duplicate and near-duplicate documents and text spans using high-discriminability text fragments |
US20020103705A1 (en) | 2000-12-06 | 2002-08-01 | Forecourt Communication Group | Method and apparatus for using prior purchases to select activities to present to a customer |
US7529698B2 (en) | 2001-01-16 | 2009-05-05 | Raymond Anthony Joao | Apparatus and method for providing transaction history information, account history information, and/or charge-back information |
US6516268B2 (en) | 2001-02-16 | 2003-02-04 | Wizeguides.Com Inc. | Bundled map guide |
US20100057622A1 (en) | 2001-02-27 | 2010-03-04 | Faith Patrick L | Distributed Quantum Encrypted Pattern Generation And Scoring |
US6985950B1 (en) | 2001-03-06 | 2006-01-10 | Microsoft Corporation | System for creating a space-efficient document categorizer for training and testing of automatic categorization engines |
TW493142B (en) | 2001-03-14 | 2002-07-01 | Ind Tech Res Inst | Method for building progressive mesh |
US6828920B2 (en) | 2001-06-04 | 2004-12-07 | Lockheed Martin Orincon Corporation | System and method for classifying vehicles |
WO2003032125A2 (en) | 2001-10-11 | 2003-04-17 | Visualsciences, Llc | System, method, and computer program product for processing and visualization of information |
US6744434B2 (en) | 2001-11-30 | 2004-06-01 | Caterpillar Inc | Cuts removal system for triangulated CAD Models |
US7970240B1 (en) | 2001-12-17 | 2011-06-28 | Google Inc. | Method and apparatus for archiving and visualizing digital images |
US7640173B2 (en) | 2002-01-17 | 2009-12-29 | Applied Medical Software, Inc. | Method and system for evaluating a physician's economic performance and gainsharing of physician services |
US7546245B2 (en) | 2002-01-17 | 2009-06-09 | Amsapplied Medical Software, Inc. | Method and system for gainsharing of physician services |
JP2006513462A (en) | 2002-03-20 | 2006-04-20 | カタリナ マーケティング インターナショナル,インク. | Target incentives based on predicted behavior |
US7533026B2 (en) | 2002-04-12 | 2009-05-12 | International Business Machines Corporation | Facilitating management of service elements usable in providing information technology service offerings |
JP2003345810A (en) | 2002-05-28 | 2003-12-05 | Hitachi Ltd | Method and system for document retrieval and document retrieval result display system |
US7872647B2 (en) | 2002-07-19 | 2011-01-18 | Rockwell Collins Simulation And Training Solutions Llc | System and method for modeling a spheroid world database |
US6847888B2 (en) | 2002-08-07 | 2005-01-25 | Hrl Laboratories, Llc | Method and apparatus for geographic shape preservation for identification |
US6728608B2 (en) | 2002-08-23 | 2004-04-27 | Applied Perception, Inc. | System and method for the creation of a terrain density model |
US20040143602A1 (en) | 2002-10-18 | 2004-07-22 | Antonio Ruiz | Apparatus, system and method for automated and adaptive digital image/video surveillance for events and configurations using a rich multimedia relational database |
IL153535A (en) | 2002-12-19 | 2007-12-03 | Rafael Advanced Defense Sys | Method and system for processing and analyzing digital terrain data |
US8589273B2 (en) | 2002-12-23 | 2013-11-19 | Ge Corporate Financial Services, Inc. | Methods and systems for managing risk management information |
US7752117B2 (en) | 2003-01-31 | 2010-07-06 | Trading Technologies International, Inc. | System and method for money management in electronic trading environment |
US20040153418A1 (en) | 2003-02-05 | 2004-08-05 | Hanweck Gerald Alfred | System and method for providing access to data from proprietary tools |
US7133054B2 (en) | 2004-03-17 | 2006-11-07 | Seadragon Software, Inc. | Methods and apparatus for navigating an image |
US9607092B2 (en) | 2003-05-20 | 2017-03-28 | Excalibur Ip, Llc | Mapping method and system |
US7562289B2 (en) | 2003-06-18 | 2009-07-14 | Layton Geo-Science, Inc. | Methods and systems for encoding geographic coordinates and features in a portable document format file |
US8412566B2 (en) | 2003-07-08 | 2013-04-02 | Yt Acquisition Corporation | High-precision customer-based targeting by individual usage statistics |
CA2436312C (en) | 2003-08-01 | 2011-04-05 | Perry Peterson | Close-packed, uniformly adjacent, multiresolutional, overlapping spatial data ordering |
US20060143075A1 (en) | 2003-09-22 | 2006-06-29 | Ryan Carr | Assumed demographics, predicted behaviour, and targeted incentives |
US7334195B2 (en) | 2003-10-14 | 2008-02-19 | Microsoft Corporation | System and process for presenting search results in a histogram/cluster format |
US7584172B2 (en) | 2003-10-16 | 2009-09-01 | Sap Ag | Control for selecting data query and visual configuration |
US7917376B2 (en) | 2003-12-29 | 2011-03-29 | Montefiore Medical Center | System and method for monitoring patient care |
US7872669B2 (en) | 2004-01-22 | 2011-01-18 | Massachusetts Institute Of Technology | Photo-based mobile deixis system and related techniques |
US7343272B2 (en) | 2004-02-12 | 2008-03-11 | International Business Machines Corporation | System and method for detecting generalized space-time clusters |
US20050182793A1 (en) | 2004-02-18 | 2005-08-18 | Keenan Viktor M. | Map structure and method for producing |
US7865301B2 (en) | 2004-03-23 | 2011-01-04 | Google Inc. | Secondary map in digital mapping system |
JP5592594B2 (en) | 2004-03-23 | 2014-09-17 | グーグル インコーポレイテッド | Digital mapping system |
US7599790B2 (en) | 2004-03-23 | 2009-10-06 | Google Inc. | Generating and serving tiles in a digital mapping system |
US20060026120A1 (en) | 2004-03-24 | 2006-02-02 | Update Publications Lp | Method and system for collecting, processing, and distributing residential property data |
US7269801B2 (en) | 2004-03-30 | 2007-09-11 | Autodesk, Inc. | System for managing the navigational usability of an interactive map |
US7539666B2 (en) | 2004-04-06 | 2009-05-26 | International Business Machines Corporation | Method, system and program for managing geographic data stored in a database |
US7280897B2 (en) | 2004-05-28 | 2007-10-09 | Lockheed Martin Corporation | Intervisibility determination |
WO2006012645A2 (en) | 2004-07-28 | 2006-02-02 | Sarnoff Corporation | Method and apparatus for total situational awareness and monitoring |
US7529195B2 (en) | 2004-07-30 | 2009-05-05 | Fortiusone, Inc. | System and method of mapping and analyzing vulnerabilities in networks |
US7617232B2 (en) | 2004-09-02 | 2009-11-10 | Microsoft Corporation | Centralized terminology and glossary development |
US7620628B2 (en) | 2004-12-06 | 2009-11-17 | Yahoo! Inc. | Search processing with automatic categorization of queries |
US20060143079A1 (en) | 2004-12-29 | 2006-06-29 | Jayanta Basak | Cross-channel customer matching |
JP2006190049A (en) | 2005-01-05 | 2006-07-20 | Fujitsu Ltd | Method and device for drawing apex reduced pattern |
US9436945B2 (en) | 2005-02-01 | 2016-09-06 | Redfin Corporation | Interactive map-based search and advertising |
US8091784B1 (en) | 2005-03-09 | 2012-01-10 | Diebold, Incorporated | Banking system controlled responsive to data bearing records |
US7596528B1 (en) | 2005-03-31 | 2009-09-29 | Trading Technologies International, Inc. | System and method for dynamically regulating order entry in an electronic trading environment |
US8341110B2 (en) * | 2005-04-04 | 2012-12-25 | Geoeye Analytics Inc. | Temporal-influenced geospatial modeling system and method |
US7746340B2 (en) | 2005-04-13 | 2010-06-29 | Siemens Medical Solutions Usa, Inc. | Method and apparatus for generating a 2D image having pixels corresponding to voxels of a 3D image |
US8082172B2 (en) | 2005-04-26 | 2011-12-20 | The Advisory Board Company | System and method for peer-profiling individual performance |
US7672968B2 (en) | 2005-05-12 | 2010-03-02 | Apple Inc. | Displaying a tooltip associated with a concurrently displayed database object |
US8825370B2 (en) | 2005-05-27 | 2014-09-02 | Yahoo! Inc. | Interactive map-based travel guide |
US8578500B2 (en) | 2005-05-31 | 2013-11-05 | Kurt James Long | System and method of fraud and misuse detection |
US8341259B2 (en) | 2005-06-06 | 2012-12-25 | Adobe Systems Incorporated | ASP for web analytics including a real-time segmentation workbench |
EP1732034A1 (en) | 2005-06-06 | 2006-12-13 | First Data Corporation | System and method for authorizing electronic payment transactions |
US8200676B2 (en) | 2005-06-28 | 2012-06-12 | Nokia Corporation | User interface for geographic search |
US20070016363A1 (en) | 2005-07-15 | 2007-01-18 | Oracle International Corporation | Interactive map-based user interface for transportation planning |
EP1920393A2 (en) | 2005-07-22 | 2008-05-14 | Yogesh Chunilal Rathod | Universal knowledge management and desktop search system |
US7586489B2 (en) | 2005-08-01 | 2009-09-08 | Nvidia Corporation | Method of generating surface defined by boundary of three-dimensional point cloud |
US7421429B2 (en) | 2005-08-04 | 2008-09-02 | Microsoft Corporation | Generate blog context ranking using track-back weight, context weight and, cumulative comment weight |
WO2007024892A2 (en) | 2005-08-23 | 2007-03-01 | R.A. Smith & Associates, Inc. | High accuracy survey-grade gis system |
US8095866B2 (en) | 2005-09-09 | 2012-01-10 | Microsoft Corporation | Filtering user interface for a data summary table |
JP2007079641A (en) | 2005-09-09 | 2007-03-29 | Canon Inc | Information processor and processing method, program, and storage medium |
US7716226B2 (en) | 2005-09-27 | 2010-05-11 | Patentratings, Llc | Method and system for probabilistically quantifying and visualizing relevance between two or more citationally or contextually related data objects |
US20070078832A1 (en) | 2005-09-30 | 2007-04-05 | Yahoo! Inc. | Method and system for using smart tags and a recommendation engine using smart tags |
US7574428B2 (en) | 2005-10-11 | 2009-08-11 | Telmap Ltd | Geometry-based search engine for navigation systems |
US7933897B2 (en) | 2005-10-12 | 2011-04-26 | Google Inc. | Entity display priority in a distributed geographic information system |
US20090168163A1 (en) | 2005-11-01 | 2009-07-02 | Global Bionic Optics Pty Ltd. | Optical lens systems |
US20100198858A1 (en) | 2005-11-21 | 2010-08-05 | Anti-Gang Enforcement Networking Technology, Inc. | System and Methods for Linking Multiple Events Involving Firearms and Gang Related Activities |
CN100481077C (en) | 2006-01-12 | 2009-04-22 | 国际商业机器公司 | Visual method and device for strengthening search result guide |
US7791616B2 (en) | 2006-02-10 | 2010-09-07 | The United States Of America As Represented By The Secretary Of The Navy | Method for efficiently transforming a raster image from one map projection to another map projection |
US20070208498A1 (en) | 2006-03-03 | 2007-09-06 | Inrix, Inc. | Displaying road traffic condition information and user controls |
US7899611B2 (en) | 2006-03-03 | 2011-03-01 | Inrix, Inc. | Detecting anomalous road traffic conditions |
US7579965B2 (en) | 2006-03-03 | 2009-08-25 | Andrew Bucholz | Vehicle data collection and processing system |
US7519470B2 (en) | 2006-03-15 | 2009-04-14 | Microsoft Corporation | Location-based caching for mobile devices |
DE602006002873D1 (en) | 2006-03-31 | 2008-11-06 | Research In Motion Ltd | A user interface method and apparatus for controlling the visual display of maps with selectable map elements in mobile communication devices |
US8712192B2 (en) | 2006-04-20 | 2014-04-29 | Microsoft Corporation | Geo-coding images |
JP4887359B2 (en) | 2006-04-24 | 2012-02-29 | パナソニック株式会社 | Drawing apparatus and drawing method |
US7945852B1 (en) | 2006-05-19 | 2011-05-17 | Washington State University Research Foundation | Strategies for annotating digital maps |
US9195985B2 (en) | 2006-06-08 | 2015-11-24 | Iii Holdings 1, Llc | Method, system, and computer program product for customer-level data verification |
WO2007146298A2 (en) | 2006-06-12 | 2007-12-21 | Metacarta, Inc. | Systems and methods for hierarchical organization and presentation of geographic search results |
US7468662B2 (en) | 2006-06-16 | 2008-12-23 | International Business Machines Corporation | Method for spatio-temporal event detection using composite definitions for camera systems |
US8290943B2 (en) | 2006-07-14 | 2012-10-16 | Raytheon Company | Geographical information display system and method |
US20090319295A1 (en) * | 2006-07-25 | 2009-12-24 | Kass-Hout Taha A | Global disease surveillance platform, and corresponding system and method |
US7853566B2 (en) | 2006-08-04 | 2010-12-14 | Apple Inc. | Navigation of electronic backups |
AU2007286064B2 (en) | 2006-08-10 | 2011-01-27 | Loma Linda University Medical Center | Advanced emergency geographical information system |
US20130150004A1 (en) | 2006-08-11 | 2013-06-13 | Michael Rosen | Method and apparatus for reducing mobile phone usage while driving |
US20080040684A1 (en) | 2006-08-14 | 2008-02-14 | Richard Crump | Intelligent Pop-Up Window Method and Apparatus |
JP4778865B2 (en) | 2006-08-30 | 2011-09-21 | 株式会社ソニー・コンピュータエンタテインメント | Image viewer, image display method and program |
US8054756B2 (en) | 2006-09-18 | 2011-11-08 | Yahoo! Inc. | Path discovery and analytics for network data |
US20080082578A1 (en) | 2006-09-29 | 2008-04-03 | Andrew Hogue | Displaying search results on a one or two dimensional graph |
US8060556B2 (en) | 2006-10-20 | 2011-11-15 | Sap Ag | Service enabled tagged user interfaces |
US7698336B2 (en) | 2006-10-26 | 2010-04-13 | Microsoft Corporation | Associating geographic-related information with objects |
US8065080B2 (en) | 2006-10-31 | 2011-11-22 | At&T Intellectual Property I, Lp | Location stamping and logging of electronic events and habitat generation |
US8229902B2 (en) | 2006-11-01 | 2012-07-24 | Ab Initio Technology Llc | Managing storage of individually accessible data units |
US7663621B1 (en) | 2006-11-03 | 2010-02-16 | Nvidia Corporation | Cylindrical wrapping using shader hardware |
WO2008064020A2 (en) | 2006-11-13 | 2008-05-29 | Tele Atlas North America, Inc. | System and method for providing multiple participants with a central access portal to geographic point of interest |
US8826139B1 (en) | 2007-02-02 | 2014-09-02 | Resource Consortium Limited | Searchable message board |
US7809703B2 (en) | 2006-12-22 | 2010-10-05 | International Business Machines Corporation | Usage of development context in search operations |
US8290838B1 (en) | 2006-12-29 | 2012-10-16 | Amazon Technologies, Inc. | Indicating irregularities in online financial transactions |
US8368695B2 (en) | 2007-02-08 | 2013-02-05 | Microsoft Corporation | Transforming offline maps into interactive online maps |
US10042862B2 (en) | 2007-02-13 | 2018-08-07 | Esri Technologies, Llc | Methods and systems for connecting a social network to a geospatial data repository |
US20080195421A1 (en) | 2007-02-13 | 2008-08-14 | Sunrise Medical Management, Llc | Electronic medical records exchange system |
US7920963B2 (en) | 2007-02-22 | 2011-04-05 | Iac Search & Media, Inc. | Map interface with a movable marker |
US8266116B2 (en) | 2007-03-12 | 2012-09-11 | Broadcom Corporation | Method and apparatus for dual-hashing tables |
US8084712B2 (en) | 2007-03-16 | 2011-12-27 | TEN Medias LLC | Method and apparatus for laser marking objects |
JP5268274B2 (en) | 2007-03-30 | 2013-08-21 | キヤノン株式会社 | Search device, method, and program |
US8036971B2 (en) | 2007-03-30 | 2011-10-11 | Palantir Technologies, Inc. | Generating dynamic date sets that represent market conditions |
US20080255973A1 (en) | 2007-04-10 | 2008-10-16 | Robert El Wade | Sales transaction analysis tool and associated method of use |
EP2149081B1 (en) | 2007-04-17 | 2019-06-12 | Luminex Corporation | Graphical user interface for analysis and comparison of location-specific multiparameter data sets |
US8078641B2 (en) | 2007-04-25 | 2011-12-13 | Mitac International Corporation | Adjusting spatial operations based on map density |
US20080267107A1 (en) | 2007-04-27 | 2008-10-30 | Outland Research, Llc | Attraction wait-time inquiry apparatus, system and method |
US8515207B2 (en) | 2007-05-25 | 2013-08-20 | Google Inc. | Annotations in panoramic images, and applications thereof |
US7809785B2 (en) | 2007-05-28 | 2010-10-05 | Google Inc. | System using router in a web browser for inter-domain communication |
US8739123B2 (en) | 2007-05-28 | 2014-05-27 | Google Inc. | Incorporating gadget functionality on webpages |
US7930547B2 (en) | 2007-06-15 | 2011-04-19 | Alcatel-Lucent Usa Inc. | High accuracy bloom filter using partitioned hashing |
US20090027418A1 (en) | 2007-07-24 | 2009-01-29 | Maru Nimit H | Map-based interfaces for storing and locating information about geographical areas |
US8631015B2 (en) | 2007-09-06 | 2014-01-14 | Linkedin Corporation | Detecting associates |
US20090088964A1 (en) | 2007-09-28 | 2009-04-02 | Dave Schaaf | Map scrolling method and apparatus for navigation system for selectively displaying icons |
US8849728B2 (en) * | 2007-10-01 | 2014-09-30 | Purdue Research Foundation | Visual analytics law enforcement tools |
US8484115B2 (en) | 2007-10-03 | 2013-07-09 | Palantir Technologies, Inc. | Object-oriented time series generator |
US20090198641A1 (en) * | 2007-10-12 | 2009-08-06 | Enforsys, Inc. | System and method for forecasting real-world occurrences |
US20090100018A1 (en) | 2007-10-12 | 2009-04-16 | Jonathan Roberts | System and method for capturing, integrating, discovering, and using geo-temporal data |
US8214308B2 (en) | 2007-10-23 | 2012-07-03 | Sas Institute Inc. | Computer-implemented systems and methods for updating predictive models |
US7650310B2 (en) | 2007-10-30 | 2010-01-19 | Intuit Inc. | Technique for reducing phishing |
US8019709B2 (en) | 2007-11-09 | 2011-09-13 | Vantrix Corporation | Method and system for rule-based content filtering |
EP2220457B1 (en) | 2007-11-09 | 2016-06-22 | TeleCommunication Systems, Inc. | Points-of-interest panning on a displayed map with a persistent search on a wireless phone |
KR20090050577A (en) | 2007-11-16 | 2009-05-20 | 삼성전자주식회사 | User interface for displaying and playing multimedia contents and apparatus comprising the same and control method thereof |
US8145703B2 (en) | 2007-11-16 | 2012-03-27 | Iac Search & Media, Inc. | User interface and method in a local search system with related search results |
US20090132953A1 (en) | 2007-11-16 | 2009-05-21 | Iac Search & Media, Inc. | User interface and method in local search system with vertical search results and an interactive map |
US20090144262A1 (en) | 2007-12-04 | 2009-06-04 | Microsoft Corporation | Search query transformation using direct manipulation |
US8400448B1 (en) | 2007-12-05 | 2013-03-19 | The United States Of America, As Represented By The Secretary Of The Navy | Real-time lines-of-sight and viewsheds determination system |
US8325178B1 (en) | 2007-12-05 | 2012-12-04 | The United States Of America, As Represented By The Secretary Of The Navy | Lines-of-sight and viewsheds determination system |
US20090158185A1 (en) | 2007-12-17 | 2009-06-18 | Socialexplorer, Inc. | Adaptive map layer visibility control |
US8230333B2 (en) | 2007-12-26 | 2012-07-24 | Vistracks, Inc. | Analysis of time-based geospatial mashups using AD HOC visual queries |
US7865308B2 (en) | 2007-12-28 | 2011-01-04 | Yahoo! Inc. | User-generated activity maps |
US8055633B2 (en) | 2008-01-21 | 2011-11-08 | International Business Machines Corporation | Method, system and computer program product for duplicate detection |
US8239245B2 (en) | 2008-01-22 | 2012-08-07 | International Business Machines Corporation | Method and apparatus for end-to-end retail store site optimization |
KR100915295B1 (en) | 2008-01-22 | 2009-09-03 | 성균관대학교산학협력단 | System and method for search service having a function of automatic classification of search results |
US7805457B1 (en) | 2008-02-14 | 2010-09-28 | Securus Technologies, Inc. | System and method for identifying members of a gang or security threat group |
WO2009111581A1 (en) | 2008-03-04 | 2009-09-11 | Nextbio | Categorization and filtering of scientific data |
US8370111B2 (en) | 2008-03-31 | 2013-02-05 | The Boeing Company | System and method for forming optimized perimeter surveillance |
US20090292626A1 (en) | 2008-04-22 | 2009-11-26 | Oxford J Craig | System and method for interactive map, database, and social networking engine |
US8121962B2 (en) | 2008-04-25 | 2012-02-21 | Fair Isaac Corporation | Automated entity identification for efficient profiling in an event probability prediction system |
US9646025B2 (en) | 2008-05-27 | 2017-05-09 | Qualcomm Incorporated | Method and apparatus for aggregating and presenting data associated with geographic locations |
US20090307049A1 (en) | 2008-06-05 | 2009-12-10 | Fair Isaac Corporation | Soft Co-Clustering of Data |
US8412707B1 (en) | 2008-06-13 | 2013-04-02 | Ustringer LLC | Method and apparatus for distributing content |
WO2010006334A1 (en) | 2008-07-11 | 2010-01-14 | Videosurf, Inc. | Apparatus and software system for and method of performing a visual-relevance-rank subsequent search |
US8301464B1 (en) | 2008-07-18 | 2012-10-30 | Cave Consulting Group, Inc. | Method and system for producing statistical analysis of medical care information |
US8010545B2 (en) | 2008-08-28 | 2011-08-30 | Palo Alto Research Center Incorporated | System and method for providing a topic-directed search |
US20100063961A1 (en) | 2008-09-05 | 2010-03-11 | Fotonauts, Inc. | Reverse Tagging of Images in System for Managing and Sharing Digital Images |
US8429194B2 (en) | 2008-09-15 | 2013-04-23 | Palantir Technologies, Inc. | Document-based workflows |
US8214361B1 (en) | 2008-09-30 | 2012-07-03 | Google Inc. | Organizing search results in a topic hierarchy |
US8391584B2 (en) | 2008-10-20 | 2013-03-05 | Jpmorgan Chase Bank, N.A. | Method and system for duplicate check detection |
US8422825B1 (en) | 2008-11-05 | 2013-04-16 | Hover Inc. | Method and system for geometry extraction, 3D visualization and analysis using arbitrary oblique imagery |
US8332354B1 (en) | 2008-12-15 | 2012-12-11 | American Megatrends, Inc. | Asynchronous replication by tracking recovery point objective |
US8762869B2 (en) | 2008-12-23 | 2014-06-24 | Intel Corporation | Reduced complexity user interface |
US8719350B2 (en) | 2008-12-23 | 2014-05-06 | International Business Machines Corporation | Email addressee verification |
US20100262688A1 (en) | 2009-01-21 | 2010-10-14 | Daniar Hussain | Systems, methods, and devices for detecting security vulnerabilities in ip networks |
US20100191563A1 (en) | 2009-01-23 | 2010-07-29 | Doctors' Administrative Solutions, Llc | Physician Practice Optimization Tracking |
WO2010085773A1 (en) | 2009-01-24 | 2010-07-29 | Kontera Technologies, Inc. | Hybrid contextual advertising and related content analysis and display techniques |
US8601401B2 (en) | 2009-01-30 | 2013-12-03 | Navico Holding As | Method, apparatus and computer program product for synchronizing cursor events |
US8321509B2 (en) | 2009-02-02 | 2012-11-27 | Waldeck Technology, Llc | Handling crowd requests for large geographic areas |
US8473454B2 (en) | 2009-03-10 | 2013-06-25 | Xerox Corporation | System and method of on-demand document processing |
US8762971B2 (en) | 2009-04-02 | 2014-06-24 | International Business Machines Corporation | Servicing a production program in an integrated development environment |
US8719249B2 (en) | 2009-05-12 | 2014-05-06 | Microsoft Corporation | Query classification |
US20100321399A1 (en) | 2009-06-18 | 2010-12-23 | Patrik Ellren | Maps from Sparse Geospatial Data Tiles |
US20110022312A1 (en) | 2009-07-23 | 2011-01-27 | Fmr Llc | Generating and Tracking Activity Patterns for Mobile Devices |
US9280777B2 (en) | 2009-09-08 | 2016-03-08 | Target Brands, Inc. | Operations dashboard |
US20110078173A1 (en) | 2009-09-30 | 2011-03-31 | Avaya Inc. | Social Network User Interface |
US8595058B2 (en) | 2009-10-15 | 2013-11-26 | Visa U.S.A. | Systems and methods to match identifiers |
US8085268B2 (en) | 2009-10-20 | 2011-12-27 | Palantir Technologies, Inc. | Techniques for drawing geodetic polygons |
CN102054015B (en) | 2009-10-28 | 2014-05-07 | 财团法人工业技术研究院 | System and method of organizing community intelligent information by using organic matter data model |
US20110112995A1 (en) | 2009-10-28 | 2011-05-12 | Industrial Technology Research Institute | Systems and methods for organizing collective social intelligence information using an organic object data model |
IL202062A0 (en) | 2009-11-11 | 2010-11-30 | Dror Nadam | Apparatus, system and method for self orientation |
WO2011060388A1 (en) | 2009-11-13 | 2011-05-19 | Zoll Medical Corporation | Community-based response system |
US11122009B2 (en) | 2009-12-01 | 2021-09-14 | Apple Inc. | Systems and methods for identifying geographic locations of social media content collected over social networks |
US8645478B2 (en) | 2009-12-10 | 2014-02-04 | Mcafee, Inc. | System and method for monitoring social engineering in a computer network environment |
US20110153384A1 (en) | 2009-12-17 | 2011-06-23 | Matthew Donald Horne | Visual comps builder |
US8676597B2 (en) | 2009-12-28 | 2014-03-18 | General Electric Company | Methods and systems for mapping healthcare services analytics for volume and trends |
EP2524299A4 (en) | 2010-01-11 | 2013-11-13 | Panjiva Inc | Evaluating public records of supply transactions for financial investment decisions |
US8564596B2 (en) | 2010-01-12 | 2013-10-22 | Palantir Technologies, Inc. | Techniques for density mapping |
US9026552B2 (en) | 2010-01-18 | 2015-05-05 | Salesforce.Com, Inc. | System and method for linking contact records to company locations |
US20110218934A1 (en) | 2010-03-03 | 2011-09-08 | Jeremy Elser | System and methods for comparing real properties for purchase and for generating heat maps to aid in identifying price anomalies of such real properties |
US20110231296A1 (en) | 2010-03-16 | 2011-09-22 | UberMedia, Inc. | Systems and methods for interacting with messages, authors, and followers |
US20130021445A1 (en) | 2010-04-12 | 2013-01-24 | Alexandre Cossette-Pacheco | Camera Projection Meshes |
US8214232B2 (en) | 2010-04-22 | 2012-07-03 | Fair Isaac Corporation | Healthcare insurance claim fraud detection using datasets derived from multiple insurers |
US8874432B2 (en) | 2010-04-28 | 2014-10-28 | Nec Laboratories America, Inc. | Systems and methods for semi-supervised relationship extraction |
US8489331B2 (en) | 2010-04-29 | 2013-07-16 | Microsoft Corporation | Destination maps user interface |
US8799812B2 (en) | 2010-04-29 | 2014-08-05 | Cheryl Parker | System and method for geographic based data visualization and extraction |
US20110289397A1 (en) | 2010-05-19 | 2011-11-24 | Mauricio Eastmond | Displaying Table Data in a Limited Display Area |
US8756224B2 (en) | 2010-06-16 | 2014-06-17 | Rallyverse, Inc. | Methods, systems, and media for content ranking using real-time data |
US8489641B1 (en) | 2010-07-08 | 2013-07-16 | Google Inc. | Displaying layers of search results on a map |
US8554653B2 (en) | 2010-07-22 | 2013-10-08 | Visa International Service Association | Systems and methods to identify payment accounts having business spending activities |
US8775530B2 (en) | 2010-08-25 | 2014-07-08 | International Business Machines Corporation | Communication management method and system |
US20120066166A1 (en) | 2010-09-10 | 2012-03-15 | International Business Machines Corporation | Predictive Analytics for Semi-Structured Case Oriented Processes |
US20120084118A1 (en) | 2010-09-30 | 2012-04-05 | International Business Machines Corporation | Sales predication for a new store based on on-site market survey data and high resolution geographical information |
US8463036B1 (en) | 2010-09-30 | 2013-06-11 | A9.Com, Inc. | Shape-based search of a collection of content |
EP2444134A1 (en) | 2010-10-19 | 2012-04-25 | Travian Games GmbH | Methods, server system and browser clients for providing a game map of a browser-based online multi-player game |
US8781169B2 (en) | 2010-11-03 | 2014-07-15 | Endeavoring, Llc | Vehicle tracking and locating system |
US20120130937A1 (en) * | 2010-11-18 | 2012-05-24 | Twenty-Nine Palms Band of Mission Indians | Security at a facility |
JP5706137B2 (en) | 2010-11-22 | 2015-04-22 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Method and computer program for displaying a plurality of posts (groups of data) on a computer screen in real time along a plurality of axes |
CA2817576C (en) | 2010-11-24 | 2016-06-07 | Logrhythm, Inc. | Scalable analytical processing of structured data |
US8407180B1 (en) | 2010-11-29 | 2013-03-26 | Teradata Us, Inc. | Eliminating inner joins based on a temporal relationship constraint |
US8839133B2 (en) | 2010-12-02 | 2014-09-16 | Microsoft Corporation | Data visualizations including interactive time line representations |
CN102546446A (en) | 2010-12-13 | 2012-07-04 | 太仓市浏河镇亿网行网络技术服务部 | Email device |
US9141405B2 (en) | 2010-12-15 | 2015-09-22 | International Business Machines Corporation | User interface construction |
US20120159363A1 (en) | 2010-12-16 | 2012-06-21 | Microsoft Corporation | Z-order bands |
US9881257B2 (en) | 2010-12-29 | 2018-01-30 | Tickr, Inc. | Multi-dimensional visualization of temporal information |
US20120173381A1 (en) | 2011-01-03 | 2012-07-05 | Stanley Benjamin Smith | Process and system for pricing and processing weighted data in a federated or subscription based data source |
US20120206469A1 (en) | 2011-02-15 | 2012-08-16 | Tudor Hulubei | Efficient pre-computing of simplified vector data for rendering at multiple zoom levels |
KR101950529B1 (en) | 2011-02-24 | 2019-02-20 | 렉시스넥시스, 어 디비젼 오브 리드 엘서비어 인크. | Methods for electronic document searching and graphically representing electronic document searches |
US8819020B2 (en) * | 2011-04-29 | 2014-08-26 | Daniel Scott Jenkins | Career criminal and habitual violator (CCHV) intelligence tool |
JP5799586B2 (en) | 2011-05-27 | 2015-10-28 | 富士通株式会社 | Biometric authentication apparatus, biometric authentication method, and biometric authentication computer program |
US9104765B2 (en) | 2011-06-17 | 2015-08-11 | Robert Osann, Jr. | Automatic webpage characterization and search results annotation |
US20130006725A1 (en) | 2011-06-30 | 2013-01-03 | Accenture Global Services Limited | Tolling integration technology |
US8726379B1 (en) | 2011-07-15 | 2014-05-13 | Norse Corporation | Systems and methods for dynamic protection from electronic attacks |
US8533204B2 (en) | 2011-09-02 | 2013-09-10 | Xerox Corporation | Text-based searching of image data |
US8949164B1 (en) * | 2011-09-08 | 2015-02-03 | George O. Mohler | Event forecasting system |
US10140620B2 (en) | 2011-09-15 | 2018-11-27 | Stephan HEATH | Mobile device system and method providing combined delivery system using 3D geo-target location-based mobile commerce searching/purchases, discounts/coupons products, goods, and services, or service providers-geomapping-company/local and socially-conscious information/social networking (“PS-GM-C/LandSC/I-SN”) |
US8508533B2 (en) | 2011-09-28 | 2013-08-13 | Palantir Technologies, Inc. | Simplifying a polygon |
US20130096988A1 (en) | 2011-10-05 | 2013-04-18 | Mastercard International, Inc. | Nomination engine |
US20130101159A1 (en) | 2011-10-21 | 2013-04-25 | Qualcomm Incorporated | Image and video based pedestrian traffic estimation |
US8498984B1 (en) | 2011-11-21 | 2013-07-30 | Google Inc. | Categorization of search results |
US9159024B2 (en) | 2011-12-07 | 2015-10-13 | Wal-Mart Stores, Inc. | Real-time predictive intelligence platform |
US8412234B1 (en) | 2011-12-07 | 2013-04-02 | Sprint Communications Company L.P. | Clustering location and time for location prediction |
CN103167093A (en) | 2011-12-08 | 2013-06-19 | 青岛海信移动通信技术股份有限公司 | Filling method of mobile phone email address |
US9026480B2 (en) | 2011-12-21 | 2015-05-05 | Telenav, Inc. | Navigation system with point of interest classification mechanism and method of operation thereof |
US9189556B2 (en) | 2012-01-06 | 2015-11-17 | Google Inc. | System and method for displaying information local to a selected area |
EP2801083B1 (en) | 2012-01-06 | 2016-12-14 | 3M Innovative Properties Company | Released offender geospatial location information trend analysis |
US9116994B2 (en) | 2012-01-09 | 2015-08-25 | Brightedge Technologies, Inc. | Search engine optimization for category specific search results |
US8909648B2 (en) | 2012-01-18 | 2014-12-09 | Technion Research & Development Foundation Limited | Methods and systems of supervised learning of semantic relatedness |
US20130263019A1 (en) | 2012-03-30 | 2013-10-03 | Maria G. Castellanos | Analyzing social media |
US8983936B2 (en) | 2012-04-04 | 2015-03-17 | Microsoft Corporation | Incremental visualization for structured data in an enterprise-level data store |
US8792677B2 (en) | 2012-04-19 | 2014-07-29 | Intelligence Based Integrated Security Systems, Inc. | Large venue security method |
US9298856B2 (en) | 2012-04-23 | 2016-03-29 | Sap Se | Interactive data exploration and visualization tool |
US9043710B2 (en) | 2012-04-26 | 2015-05-26 | Sap Se | Switch control in report generation |
US8742934B1 (en) | 2012-04-29 | 2014-06-03 | Intel-Based Solutions, LLC | System and method for facilitating the execution of law enforcement duties and enhancing anti-terrorism and counter-terrorism capabilities |
US10304036B2 (en) | 2012-05-07 | 2019-05-28 | Nasdaq, Inc. | Social media profiling for one or more authors using one or more social media platforms |
US8698896B2 (en) | 2012-08-06 | 2014-04-15 | Cloudparc, Inc. | Controlling vehicle use of parking spaces and parking violations within the parking spaces using multiple cameras |
US20140068487A1 (en) | 2012-09-05 | 2014-03-06 | Roche Diagnostics Operations, Inc. | Computer Implemented Methods For Visualizing Correlations Between Blood Glucose Data And Events And Apparatuses Thereof |
US20140095509A1 (en) | 2012-10-02 | 2014-04-03 | Banjo, Inc. | Method of tagging content lacking geotags with a location |
CN104903799B (en) | 2012-10-08 | 2018-05-22 | 费希尔-罗斯蒙特系统公司 | Configurable user in Process Control System shows |
US9104786B2 (en) | 2012-10-12 | 2015-08-11 | International Business Machines Corporation | Iterative refinement of cohorts using visual exploration and data analytics |
US8688573B1 (en) | 2012-10-16 | 2014-04-01 | Intuit Inc. | Method and system for identifying a merchant payee associated with a cash transaction |
US8914886B2 (en) | 2012-10-29 | 2014-12-16 | Mcafee, Inc. | Dynamic quarantining for malware detection |
US10504127B2 (en) | 2012-11-15 | 2019-12-10 | Home Depot Product Authority, Llc | System and method for classifying relevant competitors |
US20140143009A1 (en) | 2012-11-16 | 2014-05-22 | International Business Machines Corporation | Risk reward estimation for company-country pairs |
US20140157172A1 (en) | 2012-11-30 | 2014-06-05 | Drillmap | Geographic layout of petroleum drilling data and methods for processing data |
US9497289B2 (en) | 2012-12-07 | 2016-11-15 | Genesys Telecommunications Laboratories, Inc. | System and method for social message classification based on influence |
US9294576B2 (en) | 2013-01-02 | 2016-03-22 | Microsoft Technology Licensing, Llc | Social media impact assessment |
US20140195515A1 (en) | 2013-01-10 | 2014-07-10 | I3 Analytics | Methods and systems for querying and displaying data using interactive three-dimensional representations |
US20140222793A1 (en) | 2013-02-07 | 2014-08-07 | Parlance Corporation | System and Method for Automatically Importing, Refreshing, Maintaining, and Merging Contact Sets |
US10140664B2 (en) | 2013-03-14 | 2018-11-27 | Palantir Technologies Inc. | Resolving similar entities from a transaction database |
GB2513720A (en) | 2013-03-15 | 2014-11-05 | Palantir Technologies Inc | Computer-implemented systems and methods for comparing and associating objects |
GB2513721A (en) | 2013-03-15 | 2014-11-05 | Palantir Technologies Inc | Computer-implemented systems and methods for comparing and associating objects |
US8924388B2 (en) | 2013-03-15 | 2014-12-30 | Palantir Technologies Inc. | Computer-implemented systems and methods for comparing and associating objects |
US9372929B2 (en) | 2013-03-20 | 2016-06-21 | Securboration, Inc. | Methods and systems for node and link identification |
US8799799B1 (en) | 2013-05-07 | 2014-08-05 | Palantir Technologies Inc. | Interactive geospatial map |
GB2516155B (en) | 2013-05-07 | 2017-01-18 | Palantir Technologies Inc | Interactive geospatial map |
US9576248B2 (en) | 2013-06-01 | 2017-02-21 | Adam M. Hurwitz | Record linkage sharing using labeled comparison vectors and a machine learning domain classification trainer |
US9041708B2 (en) | 2013-07-23 | 2015-05-26 | Palantir Technologies, Inc. | Multiple viewshed analysis |
US8938686B1 (en) | 2013-10-03 | 2015-01-20 | Palantir Technologies Inc. | Systems and methods for analyzing performance of an entity |
US8812960B1 (en) | 2013-10-07 | 2014-08-19 | Palantir Technologies Inc. | Cohort-based presentation of user interaction data |
US8832594B1 (en) | 2013-11-04 | 2014-09-09 | Palantir Technologies Inc. | Space-optimized display of multi-column tables with selective text truncation based on a combined text width |
US9021384B1 (en) | 2013-11-04 | 2015-04-28 | Palantir Technologies Inc. | Interactive vehicle information map |
US10356032B2 (en) | 2013-12-26 | 2019-07-16 | Palantir Technologies Inc. | System and method for detecting confidential information emails |
US20150187036A1 (en) | 2014-01-02 | 2015-07-02 | Palantir Technologies Inc. | Computer-implemented methods and systems for analyzing healthcare data |
US8832832B1 (en) | 2014-01-03 | 2014-09-09 | Palantir Technologies Inc. | IP reputation |
-
2014
- 2014-06-30 US US14/319,161 patent/US9129219B1/en active Active
-
2015
- 2015-06-25 EP EP15173930.7A patent/EP2963595A1/en not_active Ceased
- 2015-09-02 US US14/843,734 patent/US9836694B2/en active Active
-
2017
- 2017-06-21 US US15/628,832 patent/US20170293847A1/en not_active Abandoned
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019152945A1 (en) * | 2018-02-02 | 2019-08-08 | Findo, Inc. | Method of using machine learning to predict problematic actions within an organization |
US11288616B2 (en) | 2018-02-02 | 2022-03-29 | Yva.Ai, Inc. | Method of using machine learning to predict problematic actions within an organization |
US11615695B2 (en) | 2018-06-12 | 2023-03-28 | Intergraph Corporation | Coverage agent for computer-aided dispatch systems |
US11735028B2 (en) | 2018-06-12 | 2023-08-22 | Intergraph Corporation | Artificial intelligence applications for computer-aided dispatch systems |
US12106657B2 (en) | 2018-06-12 | 2024-10-01 | Intergraph Corporation | Similarity agent for computer-aided dispatch systems |
US12125368B2 (en) | 2018-06-12 | 2024-10-22 | Intergraph Corporation | Statistic agent for computer-aided dispatch systems |
CN109829055A (en) * | 2019-02-22 | 2019-05-31 | 苏州大学 | User's law article prediction technique based on filtering door machine |
US11270129B2 (en) | 2019-06-25 | 2022-03-08 | William Holloway Petrey, JR. | System and method for correlating electronic device identifiers and vehicle information |
US11610405B2 (en) | 2019-06-25 | 2023-03-21 | William Holloway Petrey, JR. | System and method for correlating electronic device identifiers and vehicle information |
US11915485B2 (en) | 2019-06-25 | 2024-02-27 | William Holloway Petrey, JR. | System and method for correlating electronic device identifiers and vehicle information |
WO2021262213A1 (en) * | 2020-06-24 | 2021-12-30 | Petrey Jr William Holloway | System and method for using artificial intelligence to determine a probability of occurrence of a subsequent incident |
WO2024028637A1 (en) * | 2022-08-03 | 2024-02-08 | Dubai Police General Headquarters | Computer-implemented event tracking and forecasting system and method of using the system |
Also Published As
Publication number | Publication date |
---|---|
EP2963595A1 (en) | 2016-01-06 |
US20150379413A1 (en) | 2015-12-31 |
US9836694B2 (en) | 2017-12-05 |
US9129219B1 (en) | 2015-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9836694B2 (en) | Crime risk forecasting | |
US10810695B2 (en) | Methods and systems for security tracking and generating alerts | |
US20210216928A1 (en) | Systems and methods for dynamic risk analysis | |
US11449568B2 (en) | Customizable weather analysis system for providing weather-related warnings | |
US11790766B2 (en) | Predictive analytics for emergency detection and response management | |
JP6770125B2 (en) | Estimated damage prevention due to building renovation | |
US11436510B1 (en) | Event forecasting system | |
US10977097B2 (en) | Notifying entities of relevant events | |
RU2721176C2 (en) | Systems and methods for predicting user behavior based on location data | |
US8515673B2 (en) | Crime risk assessment system | |
RU2686022C2 (en) | Crime prediction system | |
US20190034820A1 (en) | Method, system and program product for forecasted incident risk | |
Xing et al. | Crowdsourced social media and mobile phone signaling data for disaster impact assessment: A case study of the 8.8 Jiuzhaigou earthquake | |
US20230015261A1 (en) | Data processing systems and methods for providing relocation alerts | |
US10915829B1 (en) | Data model update for structural-damage predictor after an earthquake | |
US20210096935A1 (en) | Notifying entities of relevant events removing private information | |
US10642855B2 (en) | Utilizing satisified rules as input signals | |
WO2019191176A1 (en) | Systems and methods for generating an assessment of safety parameters using sensors and sensor data | |
Doherty et al. | Georeferencing incidents from locality descriptions and its applications: a case study from Yosemite National Park search and rescue | |
CN112308325B (en) | Thermodynamic diagram generation method and device | |
Royer et al. | Rapid evaluation and response to impacts on critical end-use loads following natural hazard-driven power outages: A modular and responsive geospatial technology | |
US20240127385A1 (en) | Systems and methods for analyzing and mitigating community-associated risks | |
US20230088328A1 (en) | System and method for crime risk forecasting using cyber security and deep learning | |
US20240320755A1 (en) | Systems and methods for generating a home score for a user |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS ADMINISTRATIVE AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:PALANTIR TECHNOLOGIES INC.;REEL/FRAME:051713/0149 Effective date: 20200127 Owner name: ROYAL BANK OF CANADA, AS ADMINISTRATIVE AGENT, CANADA Free format text: SECURITY INTEREST;ASSIGNOR:PALANTIR TECHNOLOGIES INC.;REEL/FRAME:051709/0471 Effective date: 20200127 |
|
AS | Assignment |
Owner name: PALANTIR TECHNOLOGIES INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:ROYAL BANK OF CANADA;REEL/FRAME:052856/0382 Effective date: 20200604 Owner name: MORGAN STANLEY SENIOR FUNDING, INC., NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:PALANTIR TECHNOLOGIES INC.;REEL/FRAME:052856/0817 Effective date: 20200604 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PRE-INTERVIEW COMMUNICATION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: PALANTIR TECHNOLOGIES INC., CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE ERRONEOUSLY LISTED PATENT BY REMOVING APPLICATION NO. 16/832267 FROM THE RELEASE OF SECURITY INTEREST PREVIOUSLY RECORDED ON REEL 052856 FRAME 0382. ASSIGNOR(S) HEREBY CONFIRMS THE RELEASE OF SECURITY INTEREST;ASSIGNOR:ROYAL BANK OF CANADA;REEL/FRAME:057335/0753 Effective date: 20200604 |
|
AS | Assignment |
Owner name: WELLS FARGO BANK, N.A., NORTH CAROLINA Free format text: ASSIGNMENT OF INTELLECTUAL PROPERTY SECURITY AGREEMENTS;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC.;REEL/FRAME:060572/0640 Effective date: 20220701 Owner name: WELLS FARGO BANK, N.A., NORTH CAROLINA Free format text: SECURITY INTEREST;ASSIGNOR:PALANTIR TECHNOLOGIES INC.;REEL/FRAME:060572/0506 Effective date: 20220701 |