Abstract
This chapter provides an intuitive, easy to read explanation of what geospatial abduction is. It uses a set of examples to explain what geospatial abduction is, and how it can be used to solve real-world problems in many different domains. Our examples show how geospatial abduction can be used to (i) identify the locations of weapons caches supporting improvised explosive device attacks by terrorists and armed insurgents from information about the locations of the attacks, (ii) identify the possible locations of tigers from information about locations of their kills, (iii) identify habitats that support host animals that carry certain viruses from information about where diseases caused by those viruses occurred, and (iv) identify the location(s) of a burglar from information about where burglaries he carried out occurred. These four examples are used continuously throughout the book to illustrate the mathematical foundations and definitions that are presented in later chapters.
Access provided by Autonomous University of Puebla. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Brantingham, P., Brantingham, P. 2008. Crime Pattern Theory. In Enviromental Criminology and Crime Analysis, R. Wortley and L. Mazerolle, Eds., pp. 78–93.
Rimoin, A. et al. Endemic Human Monkeypox, Democratic Republic of Congo, 2001–2004, Emerging Infectious Diseases, 13, 6, pp. 934–937, 2007.
Rossmo, D. K., Rombouts, S. 2008. Geographic Pro ling. In Enviromental Criminology and Crime Analysis, R. Wortley and L. Mazerolle, Eds. pages 136–149.
Shakarian, P., Subrahmanian, V.S., Sapino, M.L. SCARE: A Case Study with Baghdad, Proc. 2009 Intl. Conf. on Computational Cultural Dynamics (eds. D. Nau, A. Mannes), Dec. 2009, AAAI Press.
Shakarian, P., Subrahmanian, V.S., Sapino, M.L. 2012. GAPS: Geospatial Abduction Problems, ACM Transactions on Intelligent Systems and Technology (TIST), 3, 1, to appear.
Shakarian, P., Subrahmanian, V.S. Region-based Geospatial Abduction with Counter-IED Applications, accepted for publication in:Wiil, U.K. (ed.).Counterterrorism and Open Source Intelligence, Springer Verlag Lecture Notes on Social Networks, to appear, 2011.
Shakarian, P., Nagel, M., Schuetzle, B., Subrahmanian, V.S. 2011. Abductive Inference for Combat: Using SCARE-S2 to Find High-Value Targets in Afghanistan, in Proc. 2011 Intl. Conf. on Innovative Applications of Arti cial Intelligence, Aug. 2011, AAAI Press.
Shakarian, P., Dickerson, J., Subrahmanian, V.S. 2012. Adversarial Geospatial Abduction Problems, ACM Transactions on Intelligent Systems and Technology (TIST), to appear.
Shakarian, P., Otstott, C. What is Old is New: Countering IEDs by Disrupting the Weapon Supply, Military Review, pp. 46–52, 2011.
Singh, M., Joshi, P.K., Kumar, M., Dash, P.P., Joshi, B.D. Development of tiger habitat suitability model using geospatial tools—a case study in Achankmar Wildlife Sanctuary (AMWLS), Chhattisgarh India, Env. Monitoring and Assessment journal, Vol. 155, pp. 555– 567, 2009.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
Shakarian, P., Subrahmanian, V.S. (2011). Introduction. In: Geospatial Abduction. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-1794-1_1
Download citation
DOI: https://doi.org/10.1007/978-1-4614-1794-1_1
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-1793-4
Online ISBN: 978-1-4614-1794-1
eBook Packages: Computer ScienceComputer Science (R0)