Next Article in Journal
Cloud-Based Architectures for Auto-Scalable Web Geoportals towards the Cloudification of the GeoVITe Swiss Academic Geoportal
Previous Article in Journal
A Two-Step Method for Missing Spatio-Temporal Data Reconstruction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Prediction of Suspect Location Based on Spatiotemporal Semantics

1
School of Geographical Sciences and Planning, Guangxi Teachers Education University, Nanning 530001, China
2
Education Ministry Key Laboratory of Environment Evolution and Resources Utilization in Beibu Bay, Guangxi Teachers Education University, Nanning 530001, China
3
Department of Geography and Computational Social Science Lab, Kent State University, Kent, OH 44240, USA
4
State Key Laboratory of Information Engineering in Surveying, Mapping and Remote Sensing, Wuhan University, Wuhan 430079, China
5
Collaborative Innovation Center of Geospatial Technology, Wuhan University, Wuhan 430079, China
6
School of Library and Information Science, Kent State University, Kent, OH 44240, USA
*
Authors to whom correspondence should be addressed.
ISPRS Int. J. Geo-Inf. 2017, 6(7), 185; https://doi.org/10.3390/ijgi6070185
Submission received: 8 March 2017 / Revised: 14 May 2017 / Accepted: 18 June 2017 / Published: 23 June 2017

Abstract

:
The prediction of suspect location enables proactive experiences for crime investigations and offers essential intelligence for crime prevention. However, existing studies have failed to capture the complex social location transition patterns of suspects and lack the capacity to address the issue of data sparsity. This paper proposes a novel location prediction model called CMoB (Crime Multi-order Bayes model) based on the spatiotemporal semantics to enhance the prediction performance. In particular, the model groups suspects with similar spatiotemporal semantics as one target suspect. Then, their mobility data are applied to estimate Markov transition probabilities of unobserved locations based on a KDE (kernel density estimating) smoothing method. Finally, by integrating the total transition probabilities, which are derived from the multi-order property of the Markov transition matrix, into a Bayesian-based formula, it is able to realize multi-step location prediction for the individual suspect. Experiments with the mobility dataset covering 210 suspects and their 18,754 location records from January to June 2012 in Wuhan City show that the proposed CMoB model significantly outperforms state-of-the-art algorithms for suspect location prediction in the context of data sparsity.

1. Introduction

Benefiting from the rapid developments of positioning and monitoring technology, along with the extensive real-time collection of registering data in banks, restaurants, recreation venues, mobile telecoms and transportation sites [1], law enforcement has been endowed with the capability to monitor the location information of suspects’ social activities in recent years. These mobility data can be utilized to not only reveal suspects’ social and offending behavior preferences but also probe multiple crime incentives under different geographical environments. Furthermore, the ability to predict suspect location by mining spatiotemporal patterns from such mobility data can serve as a valuable source of knowledge for law enforcement from both tactical and strategic perspectives, such as assessing the correlation of suspects and crime locations, discovering gang members, and detecting “crime dark figures” [2,3].
Location prediction of an individual offender is known as Crime Geographic Profiling (CGP), which is increasingly utilized by police and law enforcements to make predictions regarding the spatial distribution of the anchor point (residence or next crime place) where the perpetrator of a series of offences might be most likely to stay [3] on the basis of historical crime locations [4], land-use types [5], crime categories [5] or road networks [6], with the models originating from the distance decay function [6], Bayesian theorem [7], logistic regression [8], and least-effort principle and kinetic theorem [9].
However, the existing research on CGP still has the following deficiencies. First, most research in this field has only described the adjacent spatial relations between the anchor point and offending locations. However, in reality, suspects could display complex transition patterns among different categories of places that are wildly distributed in space [10]. For example, a suspect may commit crimes between two places (e.g., residential communities) that are far away from each other and carry out other social activities (e.g., entertainment, shopping) in different venues (e.g., Internet bars, stores) at short distances. Existing CGP models have focused on limited types of locations (crime location and address) that lie within a narrow hunting area, resulting in the inability to comprehensively characterize the diverse movement patterns of offenders [3], and they are therefore not practical for the location prediction of suspects who have complicated commuting or itinerant paths.
Second, existing CGP models have seldom considered the problem of mobility data sparsity, which seriously degrades location prediction performance [11]. Suspect mobility data captured by a limited number of monitoring sensors (e.g., hotel registration system, port registration system), are typically not only sparse but also distributed unevenly spatiotemporally. Therefore, the mobility data can merely reflect part of suspects’ social lives. For example, if a suspect takes the subway and goes into a cybercafé without any other behaviors (such as hotel registration, cellphone use or ATM use, etc.) being observed, the mobility data for him that day simply contains three points, and the majority of his social movements are unknown. However, the movement modes are difficult to discover from the sparse geo-data of criminals [12]. Some studies have also demonstrated that data sparsity undermines the accuracy of geographic profiling [13]. Even some state-of-the-art approaches are far below the theoretical estimation because of the data sparsity problem [14]. In the domain of LBSN (Location-based Social Networks), researchers address this issue by utilizing the trajectory data of all or relevant users to create “synthesized” trajectories or integrating heterogeneous mobility data sources (e.g., check-in data, bus and taxi trajectories data) to boost prediction performances. However, it is impractical to synthesize trajectory data of all suspects since suspects might have different mobility patterns from the public. Moreover, there is no other type of mobility data or relationship data regarding suspects that can be analyzed.
To address the above challenges, this paper proposes a novel model called CMoB (Crime Multi-order Bayes model), aiming to explore the social environment and mobility patterns of suspects for the task of individual location prediction. That is, two underlying signals inferred from suspects’ mobility data that reveal the socio-economic activities of suspects need to be taken into account:
Spatial semantics. As we know, a suspect’s mobility data imply his preferences regarding social environments in different regions. This paper terms the factors of such a social environment in a region as spatial semantics, described by POI categories, population and crime intensities, etc. [15,16]. For example, a region containing a number of bars has a high probability of being a high crime risk area. Suspects who share similar social activity characteristics can be obtained by calculating the similarities of spatial semantics between regions where they have stayed. Thus, the robustness of the prediction model is enhanced by synthesizing the mobility data of similar suspects. Alternately, as offenders tend to commit crimes at places that are near or similar to their own daily living areas with familiar geographical environments [17,18,19], we believe that the two nearby regions with similar social environments will cause a high transition probability between them for suspects. Thus, the transition probabilities for the unobserved locations (locations not recorded in the dataset) can be estimated based on the spatial proximities and the spatial semantics similarities to further mitigate the data sparsity problem.
Temporal semantics. As social persons, suspects arrive at and leave regions usually according to certain time rhythms, whether for ordinary or illegal activities. This paper terms such time rhythms that reflect the social routine as temporal semantics, in terms of day hours and weekday, etc. For example, some suspects like to visit cybercafé at midnight, and others perform the same behaviors at noon. Though they tend to stay at the same POI categories, the difference of temporal activities patterns between them in fact presents their divergences in social backgrounds, statuses, habits or interests. Therefore, in our study, two suspects are considered more strongly associated with the mobility patterns in the similar spatial and temporal semantic spaces [18] rather than only share the similar spatial semantics.
In summary, the contributions of this paper are defined by the following aspects:
(1)
A Bayes probability model that is able to uncover the moving preferences among a large numbers of locations instead of being confined to describe the relations of the address and crime locations is proposed to represent the complex location transition patterns for the individual suspect.
(2)
A ranking algorithm is developed to measure the similarities of social movement preferences between suspects relying on the spatiotemporal semantics to fuse the mobility data of similar suspects together to cope with the data sparsity problem.
(3)
The availability and robustness of the proposed model are enhanced by exploring KDE smoothing techniques on both spatial semantics and spatial proximity so that the transition frequencies between unobserved locations and other locations can be obtained.
(4)
Extensive experiments were conducted using suspect mobility data, crime events data and other urban data in Wuhan city to investigate the performance of the proposed model on metrics of top-k error, top-k precision and missing percentiles. The results validate that the proposed model significantly outperformed other baseline methods with greater robustness and effectiveness.
The remainder of this paper is organized as follows. It first surveys related work in Section 2; Section 3 illustrates the specific design process of the proposed CMoB model; Section 4 makes a performance assessment for CMoB on real datasets; finally, conclusions and future work are drawn in Section 5.

2. Related Work

2.1. Criminal Geographic Profiling (CGP)

Existing research studies in criminal geographic profiling have mainly relied on morphology and propinquity [20]. Morphology, which is the tendency for the residence of the individual offender to be distributed around historical offence locations in certain geometric forms. Propinquity is also called journal-to-crime and is the tendency for the probabilities of residential or crime locations to vary following certain underlying patterns within different environment contexts, often characterized as aggregate decay functions. A common implication of this theory is that criminals do not unjustifiably expend time and resources in traveling to offend [3]. This paper describes each stream in more detail below.

2.1.1. Morphology

One of the earliest geographic profiling models, often known as the circle model [21], was ideographic, utilizing only the two crimes furthest from each other to predict the base of the offender. Then, stronger distance geometry techniques emerged and have leveraged the central tendency (e.g., geographic mean, median, and center of minimum distance) and diffusion (e.g., areal circle, standard deviational ellipse, and convex hull) to types of specific crime series [5]. These approaches have been demonstrated to be fast, intuitive, and cost-effective investigative tools because they capitalize on spatial behaviors characterized by the principle of least effort [7]. Snook et al. [22] compared six different morphology strategies: centroid, center of the circle, median, geometric mean, harmonic mean and center of minimum distance. The centroid method is the simplest of these strategies, and it calculates the mean of the x and y coordinates. It was also found that even the simple method can provide useful predictions. Luini et al. [23] created the geographic profiling of an offender by verifying the accuracy of predicting the spatial mobility for a group of 30 non-criminal subjects through the techniques of standard deviation ellipse, mean center and standard distance. A geographical profile model can also be constructed based on the tree topology model consisting of space, time and other factors, with the purpose of predicting the suspect’s residence and the time and location of the next crime [12]. Furthermore, those methods were often presented as diagnostic routines that provide benchmarks for assessing the performance of multiple methods [24]. However, these descriptive measures in Morphology were susceptible to outliers and are also often criticized for their inability to provide an efficient search strategy since they cannot give any advice where to continue the search if the offender is not found at the predicted location [1]. The second constraints of these approaches were due to the absence of a general principle to determine the choice of different geometry types and geometric parameters used for forecasting the anchor point, which impairs the reliability of prediction models.

2.1.2. Propinquity

Propinquity, also referred to as journey-to-crime estimation [25] to assess the criminal commute, provides a prioritized search strategy that can give people a significant advantage over the spatial distribution of an individual offender’s address. Propinquity is based on distance decay functions that characterize the distribution of distances between the anchor point and the previous crime scenes. Popular decay functions include negative exponential, lognormal, normal, truncated negative exponential, and linear functions [25,26]. David et al. [27] used a ‘Dragnet’ system to explore the utility and value of geographical offender profiling methodologies with 101 New Zealand sex offence series and demonstrated that CGP methods are less efficient and accurate at predicting the anchor location if focused crime dispersion patterns of commuters generate larger search areas. Bache [28] constructed generative decay models, which ranks suspects by distance from the crime, by methods of negative exponential and power, to assign probabilities to suspects from past crime dataset of a set of known offenders. Probabilities can then be used to prioritize suspects in an investigation and calculate the probability of being the culprit. Qian et al. [6] studied traffic-network–based geographic profiling, which was derived from the Rossmo’s formula by replacing the original Euclidean distance with the shortest path between nodes for future serial crime location prediction. Comparison of different decay functions has been conducted by Taylor et al. [25], Canter and Hammond [29] and Snook et al. [22]. Although many researchers have pursued, with notable success, multiple heuristics for profiling offender behavior in space [25], these techniques continue to omit the environmental factors associated with criminal opportunity and target attractiveness [17]. Another criticism is that distance decay functions do not apply to individual offenders but are general characteristics of populations and so can only provide crude approximations for any particular crime series [30]. The opportunities for crime and the directions in which an offender are likely to move are equally probable all around the offender’s home/base [13]. In reality, there is a large amount of asymmetry in the direction of crime travel because attractions are more concentrated toward certain types of areas (e.g., the center of a metropolitan area).
The methodological advantage of the Bayesian formulation is that it provides a natural way to include environmental properties (e.g., by excluding uninhabitable areas from the search area) as conditional factors associated with the distance decay models used in journey-to-crime estimates according to the principles of environmental criminology. A Bayesian formulation for modeling spatial behaviors of individual serial offender was first operationalized by Levine [31]. Kent and Leitner [32] demonstrated that land cover characteristics can be used as a proxy for the physical and cultural features that define the offender’s activity space. Kent et al. [7] incorporated land cover classes within a Bayesian CGP framework for fifty-two burglary, robbery, and larceny serial offenses. The experiment indicated that these models performed significantly better than non-enhanced techniques for measures of search costs and probability estimation. While the Bayesian JTC framework makes up for the absence of environmental features in the previous JTC framework, it suffers from two fundamental limitations. First, the product of the JTC prior and conditional likelihood functions mainly comes from the knowledge regarding the interactions of other offenders’ historical anchor points and environment, so they may be vulnerable to over- and underestimation errors that can mislead an investigation for a specified category of offences or target individual offender. The second limitation of the Bayesian JTC approaches relates to their inability to include more types of locations for exploring the actual geographical distribution of offenders, instead only focusing on probabilities of relationships between the anchor point and their previous offence places [33].

2.2. Location Prediction

Over the past decade, the proliferation of smartphones and the development of positioning technologies have profoundly changed the way people live, from route planning to dining and even social networking, providing a marvelous potential to study human mobility patterns in which location prediction plays an important part in urban planning, traffic forecasting, advertising, and recommendations. Existing applications and studies in this ongoing trend give us a broad view of location prediction and referential experience for suspect location prediction. However, the problem induced from mobility data sparsity, which dramatically accounts for the impairment of prediction performance, has been studied in recent years. People manage to conquer this issue by concentrating on methods mainly in terms of multiple data integrated models, recommendation models and geographic proximity models. Next, we will summarize relevant existing approaches from the view of alleviating the mobile data sparsity problem and their differences with our solutions.

2.2.1. Multiple Data Integrated Models

Plenty of location prediction research studies have exploited social network data or multiple mobility data to find socially correlated users or users with similar movement patterns to facilitate individual location prediction accuracy. For example, Xue et al. [34] decomposed historical trajectories of all users into sub-trajectories and then connects the sub-trajectories into “synthesized” trajectories to predict an individual location. Cho et al. [35] proposed a periodical and social-based model to predict the next location. Sadilek et al. [36] proposed a Dynamic Bayesian Network model to predict users’ future locations based on their friends’ with the presence of temporal information. Noulas et al. [37] and Chang and Sun [38] built a prediction model using feature engineering and took into consideration plenty of features, including location popularity, users’ self and friends’ preferences, etc. However, our work considers a generic setting where no information about the suspects’ relations is assumed. Therefore, the above studies are not applicable to our problem.
The other way is to find correlating users building on the similarity of regularity characterized by their check-in frequency or the visiting sequences, physical or semantic distance between trajectories [37,39,40]. However, these approaches do not consider the effect of temporal influence, ignoring the bias from the sparsity of mobility data and the trajectory spatiotemporal semantics to compensate for this the bias. Moreover, existing spatial semantic-based methods [41], which merely introduced the POI type as spatial semantics, not only lack sufficient information to depict region social environment but also cause large discrepancies in the physical mobility patterns between similar users as well as limiting the physical location prediction accuracy.
Moreover, the employment of environmental information in addition to historical mobility data can often enhance the prediction performances [34]. For example, land covering types, travel time, trajectory length [42,43], accident reports, road condition, and driving habits [44] have been incorporated into Bayesian inference to compute the probabilities of predicted destinations. Similarly, context information, such as time-of day, day-of-week, and velocity, has been incorporated as the features in training the Bayesian network model for prediction [45]. Therefore, our work was inspired by the thoughts in these studies that spatial semantics drawn from the external urban datasets can be fitted into mobility data to represent the movement patterns of suspects.

2.2.2. Location Recommendation

To seek preferable places for an individual user in a large scale of spatial scope, researchers have appealed to recommendation techniques for taking out location exploration history and concentrated on the prediction of them. In [46,47], matrix factorization has evolved as a critical algorithm in location recommendation, where a user’s preference of a venue is modeled as an inner product of latent factors. To take advantage of mutually exploring the latent features of users and locations with implicit incorporation of external information beyond users’ check-in data to alleviate the data sparsity problem, Ye et al. [48], Gao et al. [49], and Noulas et al. [37] employed collaborative filtering models, leveraging the similarity between users on mobility patterns and social relationships, for POI recommendations. Liu and Xiong [50] enhanced POI recommendation with textual information, such as tips and categories, of POIs. Lian et al. [51] introduced a location recommendation model considering both users’ latent preferences and the geographical influence of locations. Wang et al. [52] proposed a hybrid predictive model incorporating both regularity and conformity of human mobility in a unified prediction model. Cheng et al. [46] captured the geographical influence by modeling the probability of a user’s check-in on a location as a Multi-center Gaussian Model and then including social information and fusing the geographical influence into a generalized matrix factorization framework. However, the existing location recommendation algorithms tend to find unvisited but tailored locations for users, and it is difficult for them to capture regularity and periodism in users’ mobility patterns. Furthermore, their solutions are of little interest in our prediction type—multi-orders location prediction based on a query trajectory whose destinations need to be predicted.

2.2.3. Geographic Proximity Models

To infer the visiting information of unobserved locations, researchers applied spatial proximity-based smoothing techniques to prevent the model overfitting problem from arising due to mobility data sparsity. For instance, Lian et al. [53] not only used a Gaussian kernel smoothing function to transform the visiting probability between neighbor hours of the day and neighbor days of the week but also inferred the geographical influences of POIs by the two-dimensional kernel density estimation. Wang et al. [52] estimated the transition probability by adapting a gravity model in which the commuting flows between pairs of locations with respect to a certain mobility type are determined by the number of people leaving and going towards the involved locations and the distance between them. Cheng et al. [46] adopted a Gaussian distribution to model users’ check-in probability at the certain location by giving the multicenter set. Tayebi and et al. [54] presented a personalized random walk approach integrating neighbor road selection probabilities to predict individual crime locations. However, the antecedent research studies gave little care to the social environment effect on the visiting probability estimation or only modeled the nearby location transition patterns. Moreover, some work estimated the transition probabilities among locations using the mobility data of all users and is subsequently not suitable for individual-based location prediction. Unlike these existing works, we propagate both spatial adjacency and social environment influence into a KDE-based smoothing model to estimate the transition probabilities among locations with the specific mobile data of similar suspects. This way gives great rise to the accuracy of individual-based prediction without sufficient mobility data.

3. Methodology

This section first formalizes the location prediction problem and briefly describes the location prediction workflow. Then, the exposition for each step in the workflow is presented.

3.1. Overview

As shown in Figure 1, the prediction process consists of four major parts:
Mobility data fusing: The suspects with a similar mobility pattern to the target suspect are selected. Then, their mobility data are collected as the one of the target suspects.
First-order location transition probabilities estimation: This stage focuses on the transition frequencies estimation for unobserved locations according to the target suspect’s fused mobility data. After that, the transition probabilities in each pair of locations are calculated.
Total location transition probabilities estimation: The total transition probabilities, which are used to model the transition pattern of all possible paths in each pair of locations [34], is indispensable for the multi-step location prediction. The total transition probabilities are obtained by multiplying first-order location transition probabilities.
Bayes-based location prediction: By integrating the first-order location transition probabilities and total location transition probabilities into a Bayes formula, the multi-step location prediction for the target suspect is realized.

3.2. Formal Statement of Problem

Our study aims to predict destinations for the individual suspect using historical trajectories from the suspect’s mobility data. This location prediction problem can be formally expressed as:
Given:
(1) Location set: G = {g1, g2,…,g|G|}, gi denotes a location (region);
(2) Query trajectory: Tp = {n1 = gk+1, n2 = gk+2,…, nj-1 = gk+t}, ni denotes a trajectory point, k , ( k + t ) [ 1 , | G | ] ;
Solve: Obtaining the probability of the next point nj of Tp being gd:
P ( n j = g d | T p )

3.3. Basic Concepts and Definitions

Definition 1
(Trajectory location). The observed location that one or more than one mobility points fall in.
Definition 2
(Peripheral location). The unobserved location near a trajectory location without any mobility point falling in.
Definition 3
(Semantic Vector). The semantic vector is: sr = <sr1, sr2, …>, where sri is the ith social environment feature of the location r, including crime rate, population, house density, occupation, road density and POI categories, etc.
Definition 4
(Density function). Given a d-dimension space Fd, points px and py ∈ Fd, the density function that represent the influence of py to px can be determined by the product of the attribute value cy in py and the kernel function K ( ) :
f B y ( p x ) = c y × K ( p x , p y )
where B represents the kernel function type.
Definition 5
(Density attracting set and Density attracting point). Given the spatial distance function d ( ) , pi and px ∈ Fd, if { pi| pi ∈ D, d(px,pi) ≤ ε}, we call D the density attracting set of px and call pi the density attracting point that is attracted by px.
Definition 6
(Density value). Given px∈ Fd, the density attracting set D = {p1, p2, …, pN} ∈ Fd of px, the density value of px is the average of the aggregating density function values of all the density attracting points in D:
f B D ( p x ) = i = 0 N f B i ( p x ) N
Definition 7
(Transition). Given px and py∈ Fd, px is the start point and py is the end point, we denote the movement from px to py as a transition.

3.4. Suspects Mobility Data Fusion

This part aims to estimate the movement similarities between suspects, thereby enabling the model to overcome the data sparsity problem and represent a rich social movement characteristic for the target suspect, by exploring the trajectory data of similar suspects. Two essential steps are:
(1)
Mobility Points Clustering: To make movement patterns of different suspects comparable according to the sparse individual mobility data, we cluster the mobility points of the entire dataset into multiple regions based on spatial semantics similarity and spatial proximity.
(2)
Top-n Similar Suspects: The similarity scores between suspects are measured by overlaps among the spatiotemporal distributions of the regions created in step (1). Therefore, we can easily find the top-n similar suspects of the target suspect by ranking the similarity scores.
The spatial semantics similarity used in step (1) is able to convey social behavior similarity between suspects. Moreover, this rank method gains the advantage of a self-adaption spatial scale for movement similarity calculation.

3.4.1. Mobility Points Clustering

The spatial semantic distance between two trajectory points i and j can be represented by the Cosine applied on their semantic vector si and sj:
ρ i j = c o s i n ( s i , s j )
The unified distance ω i j between i and j is determined by
ω i j = { d i j × ( 1 ρ i j ) ,   d i j δ ,   d i j > δ
where d i j is the spatial distance between i and j. δ controls the maximum distance that, if d i j > δ, the points i and j will never be clustered together.
With Formula (5), all of the trajectory points are clustered into different regions using the DBSCAN [55] clustering algorithm. Figure 2 exhibits the regions in a local area, where each colored cluster and/or overlapping points (seen as a single point) denote a region.

3.4.2. Top-n Similar Suspects

The similarity between a pair of suspects is calculated by their temporal visiting distribution of all regions in terms semantic times. Temporal semantics are designed according to the social routine and are classify as the following three-fold.
(1)
Hour bins of day, HBOD ∈ {< 0–6>, < 7–12>, <12–19>, < 20–24>}, denoting before-dawn, morning, afternoon and night, respectively.
(2)
Day of week, DOW = {1 ,..., 7}, representing Monday to Sunday, respectively.
(3)
Rest of Day, ROD = {0, 1}, where 0 express the current day is a rest day, and 1 is a working day.
Intuitively, if location b is visited many times by suspect u, then b must be important for suspect u. Furthermore, a location b that is visited rarely by others will be more representative for suspect u than other common locations. Thus, combining these two ideas, we design the region visiting vector by visiting intensity as follows.
tu= ≤ qt,u,1,qt,u,2,…, qt,u,s …, >
where qt,u,s is the visiting intensity of region s for suspect u in a semantic time t as,
q t , u , s = c t , u , s × log | U | I t { s } ,   c t , u , s = b t , u , s b t , u
where bt,u is the total visiting number of all the regions at semantic time t for suspect u, bt,u,s stands for the visiting number of region s at semantic time t for suspect u, and It{s} represents the number of suspects that visit the region s at semantic time t.
Relying on q t , u , s , the region visiting multinomial distribution of semantic time t for suspect u is defined as:
z t , u ~ m u l t i ( z t , u , 1 ,   z t , u , 2 , , z t , u , | S | ) , z t , u , i = q t , u , i j q t , u , j
Then, we use the Jensen-Shannon formula to convey the diversity of the region visiting multinomial distribution between suspects u and v.
JSD ( z t , u , z t , v ) = K L ( z t , u | | l ) + K L ( z t , v | | l ) 2 ,   l = z t , u + z t , v 2
where KL(.) denotes Kullback-Leibler Divergence.
The similarity score between suspects u and v can be defined according to the diversities in all of semantic time T:
Δ Q u , v = [ t T JSD ( z t , u , z t , v ) ] 1
Consequently, by Formula (10), we are able to choose the top-n most similar suspects for the target suspect.

3.5. First-Order Transition Probabilities Estimation

Fusing the trajectory data of similar suspects is an applicable way to alleviate the data sparsity problem. However, these trajectory data are usually insufficient since the visiting information among a number of unobserved locations is unknown. As a consequence, the prediction model will fail to unveil comprehensive mobility patterns among more locations, cause the model to suffer from the overfitting problem [53], and further make it incapable of meeting the prediction requirement when the query trajectory contains the unobserved locations. For example, as shown in Figure 3a, given that we already know the transition frequencies (blue arrows) among trajectory locations A, B and C (green grids), we can make a prediction for the query trajectory consisting of any of them. However, we are unable to make a prediction for any query trajectory consisting of the unobserved (peripheral) location (red grids with “?”) because there is no transition information for these locations in the mobility dataset.
Therefore, to improve the generalization capability of the prediction model, this section will estimate the transition frequencies in three instances as shown in Figure 3b: (1) transition frequencies from peripheral locations to trajectory locations; (2) transition frequencies from trajectory locations to peripheral locations; and (3) transition frequencies from peripheral locations to peripheral locations. These transition frequency estimations follow the principles below.
(1)
A significant characteristic of human activity is that the transition probability from one location to another one is inversely proportional to the distance between them [46]. Therefore, we can exploit such a geographical characteristic to build the transition patterns for an unobserved location from its spatially adjacent observed locations.
(2)
The similarity in social environment between locations that are nearby each other may lead to similar crime spatial activity patterns and transition patterns for them [56,57]. Thus, it can be leveraged such spatial semantic similarity to help us estimate the transition probabilities for unobserved locations.
The challenge is how to quantify and utilize the influences of both spatial adjacency and spatial semantics to estimate the transition frequencies for peripheral locations. This research addressed the challenge via a KDE-based smoothing technique. To the best of our knowledge, this is the first attempt to infer the transition patterns for unobserved locations by jointly exploring geographical influence and spatial semantics. In the following, we elaborate this procedure.

3.5.1. Transition Frequencies from Trajectory Location to Peripheral Location

We assume that px is the peripheral location, that the trajectory location p0 is the starting point of N transitions Ʈ = { 𝓉 1 , ,   𝓉 N }, and that D = { p1, p2, …, pN } is the density attracting set of px. The trajectory locations p1, p2, …, pN are the end points of transitions in Ʈ. Given the transition frequency c i 0 from p0 to every pi ∈ D, the transition frequency from p0 to px can be obtained by aggregating c i 0 and dividing it by N according to Formula (3) when only considering the spatial proximity:
c ´ x 0 = f g a u s s D ( p x ) d = i = 0 N f g a u s s i ( p x ) N = 1 2 π h d i = 1 N c i 0 × e x p [ d ( p x , p i ) 2 h d ] 2 N
where gauss means that we use a Gaussian kernel function, d(px,pi) indicates the spatial distance between px and py, and hd is the bandwidth for spatial distance in the kernel function.
If we only consider the spatial semantics closeness, the above Formula (11) transforms to:
c ` x 0 = f g u a s s D ( p x ) s = 1 2 π h s N i = 1 N c i 0 × e x p [ c o n s i n ( s x , s i ) 2 h s ] 2 N
where hs is the bandwidth for spatial semantics closeness in the kernel function.
When both spatial distance and semantics closeness are considered simultaneously, we will obtain the unified transition frequency by combining Formulas (11) and (12)):
c x 0 = a 1 c ´ x 0 + ( 1 a 1 ) c ` x 0
where a1 [ 0 , 1 ] is a weight controlling the influences of spatial proximity and spatial semantics on the transition frequency.
For example, as shown in Figure 4a, px is a peripheral location (red grid), and its density attracting set D is composed of the trajectory locations p5, p6 and p7 (green grids located in the green eclipse). Meanwhile, c5, c6 and c7 (blue arrows) denote the known transition frequencies from p0 to p5, p6 and p7, respectively. Then, we can estimate the unknown transition frequency (red dotted arrow) from p0 to px by importing c5, c6 and c7 into Formulas (11)–(13).

3.5.2. Transition Frequencies from Peripheral Location to Trajectory Location

By the same process mentioned above, we are able to estimate the transition frequency from a peripheral location to a trajectory location. Formally, assume that the trajectory location p0 is the end point of N transitions Ʈ = { 𝓉 1 , ,   𝓉 N }, D = { p1, p2, …, pN } is the density attracting set of the peripheral location px, and the trajectory locations in D are the starting points of the transitions in Ʈ. Given the transition frequency c 0 i from pi ∈ D to p0 in each transition of Ʈ, the transition frequencies from px to p0 can be obtained by Formulas (11) and (12) as c ´ 0 x and c ` 0 x , respectively. Therefore, the final transition frequencies from px to p0 are
c 0 x = a 2 c ´ 0 x + ( 1 a 2 ) c ` 0 x
where a2   [ 0 , 1 ] is a weight.
The corresponding example plot is shown in Figure 4b with almost the same processing as in Figure 4a. Its description is omitted to avoid repetition.

3.5.3. Transition Frequencies from Peripheral Location to Peripheral Location

We learn of the transition frequency from peripheral location px to another peripheral location py through two aspects: (1) deeming py as the trajectory location as in Section 3.5.2 and (2) regarding px as the trajectory location as in Section 3.5.3. Then, we combined the two estimated visiting frequencies, denoted as cxy and cyx, respectively, to produce the final result c y x :
c y x = a 3 c x y + ( 1 a 3 ) c y x
where a3   [ 0 , 1 ] is a weight.
It should be noted that only by estimating all the transition frequencies between peripheral locations and trajectory locations can we obtain the transition frequencies between peripheral locations.

3.5.4. Markov Location Transition Matrix

Thus far, we are able to compute the first-order transition probabilities, which are utilized to build the Markov transition matrix M:
M = [ p 00 p 0 G p i j p G 0 p G G ] , p i j = c j i k G c k i
where G denotes all of the locations.

3.6. Total Transition Probability Estimation

Next, we need to calculate the total transition probability pi→j that expresses the transition probability between a pair of locations through all possible paths, each of which is made up of a number of bypass locations. Luckily, this total transition probability can be generated from M by multiplying itself. In general, M1+r (r ∈ [0, ∞)) holds the probabilities of transition from one location to another one in exactly r steps (bypass locations). The following example demonstrates the concept of the total transition probability. By referring to Figure 5 and Figure 6a, the probability of travelling from g0 to g3 is found to be zero ( M 03 1 = 0) because M only stores the probability of movement from one location to another through exactly zero steps (bypass locations). Nevertheless, when M is multiplied by itself 2 times to form M3, each entry in it indicates the transition probability from one location to another in two steps. Hence, the transition probability from g0 to g3 through 2 steps is 0.729 ( M 03 3 = 0.729 ), as shown in Figure 6c.
According to the multi-step products of M, we can obtain the total transition probability pi→j by the sum of r-step transition probabilities of all possible paths between pi and pj. Formally [34]:
p i j = r M i j r + 1
However, two problems also arise:
(1)
The paths with different numbers of steps do not necessarily have the same influences on the total transition probability. For instance, the pair of locations with short spatial distance prefers a small number of steps rather than many bypass locations. Therefore, how are we to capture various influences of different Mr on the total transition probability?
(2)
How do we define the maximum value of r since the number of paths from one location to another is infinitely large without restrictions?
For the first question, people including suspects usually travel in a short path to make the cost (e.g., time, expense or energy) as small as possible even though a detour distance may be taken sometimes. Therefore, the shortest path generally makes the greatest contribution to the total transition probability, and the path with more bypass locations makes a lesser contribution to the total transition probability. Thus, we can give different weights to different r-step transition probabilities and sum them up as the total transition probability p ˜ i j , formally,
p ˜ i j = r r m a x w r M i j r + 1    w r = k r j k j ,    k r = f ( r ) = exp ( r d i j )
where dij is the spatial distance between locations i and j. When dij is fixed, a large r will cause a small wr, reflecting the fact that a path with too many bypass locations is seldom chosen by suspects.
For the second question, the existing study of [34] gives the answer that the maximum step rmax is usually 1.2 times the shortest steps between the start and end locations. However, this idea only fits specific trajectory datasets. Furthermore, it may yield an irrelevant rmax when focusing on a different individual suspect. It is suggested that rmax should account for the shortest steps of the target suspect as well as the spatial distance between the two locations. The procedure to compute the rmax for an individual suspect is shown as below.
(1)
Give a constant value q > 1, assuming it equals to 2.
(2)
Build a transition weight matrix H. If there is no transition between locations gi and gj, the entry Hij = ∞; if the target suspect is involved in this transition, Hij = 1; else, Hij = q.
(3)
Obtain the top-k shortest paths [56] based on H in which the entries are considered to be the distances among locations;
(4)
Computer the conformity tm for every path m in the top-k shortest paths by
t m = a 4 e m + ( 1 a 4 ) l m r m
where a4 is a fixed coefficient larger than zero, lm denotes the distance of path m, rm denotes the number of bypass locations in path m, and em denotes the number of locations visited by the target suspect in path m. Therefore, a path with more locations that the target suspect has visited and fewer bypass locations has more power to describe the r that the target suspect prefers.
The number of bypass locations rmax in the path with the largest conformity tmax is what we need.
Once wr and rmax are obtained, we can efficiently compute the total transition probability matrix for all pairs of locations by a dynamic programming method [34].

3.7. Bayes-Based Location Prediction

The probability of a location g d being the destination can be computed as the probability that nj contains the destination location g d conditioning on the query trajectory Tp. This probability was previously given in Formula (1) and is extended using Bayer’s inference here as:
P ( n j = g d | T p ) = P ( T p | n j = g d ) × P ( n j = g d ) k = 1 g × g P ( T p | n j = g k ) × P ( n j = g k )
The prior probability P ( n j = g d ) is easily obtained through
P ( n j = g d ) = | D d | | D |
where | D d | is the visiting times of g d and | D | is the visiting times of all locations.
The posterior probability P ( T p | n j = g k ) is calculated as [34],
P ( T p | n j = g d ) = P ( T p ) × p ( j 1 ) j p 1 j
where P(Tp) is the path probability of the query trajectory Tp; p(j-1)→j is the total transition probability of moving from n(j-1), the end location of Tp, to the predicted destination nj = g d ; and p1→j is the total transition probability of travelling from n1, the starting location of Tp, to nj = g d .
The path probability P(Tp) can be obtained by:
P ( T p ) = k = 1 j 1 p k ( k + 1 )
where pk(k+1) is the first-order transition probability between locations nk and n(k+1).
Now, the first-order transition probabilities coming from Formula (16) and the total transition probabilities coming from Formula (17) can be inserted into Formulas (23) and (22), respectively, to fulfill the location prediction task. The complete location prediction algorithm is shown in Algorithm 1.
Algorithm 1. Location Prediction Algorithm.
Input: query trajectory Tp = {n1,…,n(j−1)}
Output: top-k predicted locations.
1 list = ∅;
2 construct path probability P(Tp) from M;
3 Foreach nj in G do
4  Retrieve p1→j and p(j-1)→j from Mr;
5  Compute P ( n j = g d ) ;
6  Compute P(Tp | nj = g d );
7  Compute P(nj = g d | Tp);
8  Store P(nj = g d | Tp) in list;
9 sort list;
10 return: top-k elements in list.

4. Experimental Section

In this section, we conduct an extensive experimental study to evaluate the performance of our CMoB.

4.1. Data Preparation

4.1.1. Study Area

Wuhan is the capital of Hubei province and is one of the largest cities in central China. It lies in the eastern Jianghan Plain at the intersection of the middle reaches of the Yangtze and Han rivers. The city of Wuhan has a population of 10,766,200 people as of 2016, and its urban administration consists of 7 central districts (Qiaokou, Jianhan, Jiangan, Hanyang, Wuchang, Hongshan, and Qiangshan) and 6 suburban and rural districts (Dongxihu, Hannan, Caidian, Jiangxia, Huangpi and Xinzhou).
This paper built 100 × 100 grids to cover the 570-km2 urban areas of Wuhan City as shown in Figure 7, and each of grid (256 m × 224 m) denotes a location as the basic spatial unit.

4.1.2. Data Sources

Four types of datasets are used to test the location predictions, including a suspect mobility dataset, criminal dataset, POI dataset, and demographic dataset. The detailed information of each dataset is described below.
(1) Suspect Mobility Dataset
This dataset, which was reported to the Wuhan Police Department, includes 18,754 records of 210 suspects within 6 months (January–June 2012) in Wuhan city, distributed across 1083 different venues. A trajectory can be represented as the sequence of grids that cover the locations of a suspect recorded in the dataset according to the temporal order in one day. There are 10,537 trajectories in total. A large number of locations in the records are described as text addresses, such as "Yinxing Drifting Wood shop, No. 557 Liberty Avenue Wuhan City", “Changxin Digital Hongyuan Shop the 1st floor Ya’an Garden, science museum road” etc. Therefore, we converted these text addresses into longitudes and latitudes by Geocoding web services from Baidu [57] and Geopy [58]. It should be noted that the geocoding web services will randomly introduce artificial errors. However, by checking some results of geocoding services with real coordinates, we found that these artificial errors are so small that they will not lead to a venue transfer from one grid to another grid, which means that these artificial errors will not influence the effects of our model and baseline methods.
After data cleaning processing, 65 records were filtered out because their text addresses were unresolvable in geocoding web services, and together with records referring to suspects who have fewer than 10 records in dataset. At last, 179 suspects with 17,516 records (containing 1050 venues and 10,195 trajectories) are left as the final dataset. The spatial distribution of suspects is shown in Figure 8, where the colors in grids denote the different accessing intensities by all suspects.
There are several characteristics about the final dataset:
  • The mobility data for each suspect is extremely sparse. For example, there are 70% of suspects with fewer than 50 records, 83% of suspects with fewer than 50 trajectories, and 80% of them with fewer than 8 different venues. It can also be inferred that each suspect was frequently detected in several limited areas.
  • The distances between continuous trajectory points varied from 0 km to 10 km.
  • The visiting distribution of venue types is shown in Figure 9, where the suspects accessed banks (mostly ATM machines) up to 9207 times. The second highest accessing place is cybercafés, followed by hotels, rental housing, recreation, traffic sites (airports and bus stations, etc.) and other types (such as shopping malls, etc.).
(2) Criminal Dataset: It includes 105,347 criminal incidents of Wuhan city from January–December 2012, with the offense type and coordinates for each incident.
(3) POI Dataset: This dataset consists of 102,641 POIs in 12 categories, containing restaurant, traffic station, hotel, residential community, education, entertainment, shop, government, factory, company, hospital and bank.
Demographic dataset: There are 3602 communities with demographic information for each community. The demographic information contains population, education, sex, birth date, nationality and occupation. The datasets from (2) to (4) are all obtained from the Wuhan Police Department and are utilized as the spatial semantics to find similar suspects (in Section 3.4.1) and estimate transition frequencies for the unobserved locations (in Section 3.5.1, Section 3.5.2 and Section 3.5.3).

4.2. Evaluation Metrics

We use three metrics to measure the performance of location prediction models:
(1)
Top-k Precision [54] (TP): If the correct destination falls within the top-k predicted locations, this time is considered to be the correct time. Thus, the ratio of correct times to the total times is called top-k precision. The higher this metric value is, the better performance the model has.
(2)
Top-k Error (TE): The shortest distance between the top-k predicted locations and the correct destination. If k = 1, it is called Accuracy Measures [27]. This metric is used to indicate how far the prediction results deviate from the true destinations. A better algorithm has a lower distance deviation.
(3)
Missing Percentiles (MP): The percentage of occurrences for which a model cannot give any result. This metric is used to evaluate the impact of the data sparsity on the robustness of the models. A better algorithm has a lower missing percentile.
k in the metrics of (1) and (2) specifies the number of locations (grids) that have to be searched to identify the correct destination. A large k relates to more locations needing to be searched by police forces, as well as more resources needing to be consumed. Therefore, k should be adjusted according to the compromise between consumable resources and preferable metric performance in the actual application. If it is not specified, we define k = 9.
In this work, we define the distance of the two grids as the distance between their centers.

4.3. Baselines

In experiments, we randomly chose ten suspects with m similar suspects for each of them. Hence, we carried out eleven experiments to evaluate the performance for each model as m increases from 0 to 20.
As discussed in Section 1, no related work has been proposed to the multi-order location prediction for individual suspects based on the query trajectory. However, we use the following LBSN-related methods, which are equivalent to state-of-the-art methods as baselines.
Markov: it employs the first-order location transition matrix to predict the location. Most existing location prediction methods are actually variants of the Markov model. Particularly, [54] employed the Markov model to model the neighbor road selection probabilities for individual offenders, though the probabilities were not used to present the transition patterns between arbitrary distance locations as this paper did. The Markov model therefore represents the general class of location prediction models without dealing with the data sparsity problem.
ZMDB [44]: This method is used for the multi-order location prediction. It first counts the number of trajectories satisfying two conditions: (i) it is partially matched by the query trajectory Tp; (ii) it terminates at a location in nj. The count is then divided by the number of trajectories that terminate at a location in nj to serve as the posterior probability. Formally,
P ( T p | d = n j ) = | { T d = n j | T p T d = n j } | | T d = n j |
where | { T d = n j | T p T d = n j } | denotes the number of trajectories that satisfy both aforementioned conditions and | T d = n j | denotes the number of trajectories that terminate at a location nj. Afterwards, Formula (24) is substituted into Formula (20), thus yielding the probability of nj as the destination. Compared with Markov, ZMDB holds the advantage of modeling multi-order location transitions.
SubSyn [34]: This approach realizes the multi-order location prediction by decomposing suspects’ trajectories into a Markov matrix and total transition probabilities. However, the difference between it and our approach lies in two aspects: it does not estimate the transition patterns for unobserved locations, and the number of bypass locations when computing the total transition probability is a fixed value. In addition, this model is trained using the trajectory data of all of ten suspects in each experiment to simulate the way of synthesizing the mobility data of all users in [34].
For the proposed CMoB, the gridding-searching method [59] is involved to search for the optimal parameters for the proposed CMoB. To illustrate the step, a numbers of parameter sets were sampled from the space in Table 1.
Then, top-k precision was used as a criteria for selecting the optimal parameter sets, which were finally assigned as: ε = 650 m, hd = 300 m, hs = 0.1, a1 = 0.5, a2 = 0.5, a3 = 0.5 and a4 = 0.7.
For all of the models, if any of them fails to find the predicted destination, we use the last point in the query trajectory as the predicted one.

4.4. Results Evaluation of Top-k Error

As shown from the curves in Figure 10, the performance of our CMoB on TE (top-k error) is outstanding among the four models. In particular, with the increase of m, the TEs of the other three baseline methods are all higher than 800 m, while that of CMoB is below 800 m most of the time. When m = 0, which means there is no external trajectory data to be leveraged, the TE of CMoB is lower than those of SubSyn, ZMDB and Markov by 20%, 20% and 40%, respectively, yielding a significant improvement in performance, because CMoB is capable of alleviating the data sparsity by the estimation of transition frequency for unobserved locations. As m continues to increase, the TEs of all models decrease since more external trajectory data weaken the data sparsity problem. For instance, when m increases from 0 to 6, the TE of CMoB keeps decreasing, and that of SubSyn keeps decreasing when m increases from 0 to 10. The best TE of each model is also obtained during the processing, where the best TE of our proposed model is 527 m and those of the other three models stay in the 800–1000 m range, which means that the performance of our model is better than the others by approximately 80–100%. However, when the value of m is beyond a certain threshold, the performances of all the models decline owing to the difference of mobility patterns between the target suspect and later employed similar suspects growing wider. For example, when m > 6, the TE of CMoB and Markov start to increase. With m is beyond a certain threshold, the new employed trajectories become geographically far away from those of target suspects, thus posing lower and lower impacts on the transition patterns of the focus areas where the targeted suspect stayed. Therefore, the TEs of all models tends to be a constant value at this stage. For instance, the TEs of CMoB and Markov tend to 800 m and 1200 m, respectively, when m > 6. This situation also suggests that a large value of m (too many similar suspects) will have little influence on the performance of the prediction model. Here, when m increases to 20, the performance of the proposed CMoB still excels compared to the other baseline models by approximately 20–50%.
Figure 11 gives the histogram of the occurrences for different TEs during experiments, where the high occurrence at low TE represents excellent performance. From the plot, we can find that the occurrences of CMoB at TE < 500 m accounted for 50% of the total occurrences, showing that most predicted locations of CMoB are close to the correct destinations compared to other baseline methods. As TE increased, the occurrences of CMoB reduced dramatically, with approximately 90% of the total occurrences being concentrated in TE < 1000 m. For SubSyn, the occurrences demonstrate a decreasing tendency as TE increases, and approximately 40% of the occurrences are allocated in TE < 500 m, while approximately 68% are located with TE < 1000 m. For ZMDB and Markov, the discrepancies of occurrences along with different TD are inconspicuous. Their 50% of occurrences remained at TE > 1000 m, implying extremely low performances when they confront the data sparsity problem. Moreover, for Markov, there are 82 occurrences appearing for TE between 750 m and 1800 m, which is the largest value among all models, indicating the worst performance among all models.

4.5. Evaluation of Top-k Precision

From Figure 12, we can discover that with the growth of m, the TP (top-k precision) of our CMoB are distributed in 12–23%, higher than those of the three baseline methods, in which the performance of ZMDB is the lowest, with its best TP being only 7%. When m = 0, our CMoB achieves 12% on TP, which is higher than those of the others by 100–200%, implying that CMoB has the ability to reveal transition patterns for more locations. With the growth of m, more newly employed mobility data are located in the areas where the target suspect concentrated on so that all prediction models are able to obtain the transition patterns for more locations, resulting in the improvement in their performances on TP. For example, as m increased from 0 to 10, the best TP of CMoB reached 23%, with the improvement rate being beyond 90%, higher than the other three baseline methods by 100–300%. Along with the growth of m, more mobility data of un-similar suspects are introduced, which makes TPs of the four models gradually decline to some fixed values, according to the same reason explained in Section 4.4, when the performances of TE also declined to fixed values as m increased beyond a certain threshold.

4.6. Evaluation of Missing Percentiles

Figure 13 shows that the missing percentiles (MP) of all models decrease along with the increase of m. Specifically, CMoB achieves the best performance among them with the MP below 10% most of the time. Compared with CMoB, the performance of ZMBD remains the lowest at all times, with its MP up to 45%, while the MPs of SubSyn and Markov are all higher than 30% for the most part. Moreover, for the metric of average MP, CMoB is five times lower than SubSyn, eight times lower than ZMDB and four times lower than Markov, indicating that data sparsity is fatal to the robustness of the model, which lacks appropriate solutions to address the issue.

4.7. Evaluation of k

With the rise of k, the variations of prediction performances on TE and TP are shown in Figure 14 and Figure 15 when m = 20. It can be observed that the performances of CMoB are much better than the other 3 baseline methods at any k value. Meanwhile, as k reaches a critical value, the performances of SubSyn, ZMDB and Markov on TP and TE no longer changed. For example, when k > 24, the TE of ZMDB and Markov stopped at 976 m and 1091 m, respectively. Similarly, when k > 24, the TP of Markov and SubSyn no longer change, staying at 14% and 12%, respectively. However, with the increase of k, the performances of CMoB continued improving, where its TE falls down from 1072 m to 392 m and TP increases from 6% to 27%. Moreover, the improvement rates of CMoB on the two metrics are still the largest among these four models. This is because CMoB can obtain the transition patterns for more locations so there were more candidate predicted locations in its results. With the growth of k, the opportunities for observing shorter distances between the correct destination and the top-k candidate locations increase, and the correct destination is more likely to be found in the top-k candidate results. However, for the other three baseline methods, the numbers of candidate predicted locations in their results are very small or even equal to zero due to the data sparsity. Consequently, once k is beyond a critical value, there is no other candidate predicted location left to improve their performances on TP and TE.
It will not detail the sensitivities of k using different m since the results were similar. Therefore, regardless of how k and m varied, CMoB achieved better prediction performances compared to the other 3 baseline methods.

4.8. Visualizations of Prediction Results

This section gives visualization examples of the four models for one prediction test using the same dataset.
The predicted result of CMoB is shown in Figure 16, where the little green dots represent the visiting venues of the target suspect and his/her similar suspects (some dots overlap with each other), the query trajectory is composed of blue “+” and black arrows, and the colored grid denotes the predicted locations with the probabilities in decreasing order according to red-orange-yellow-green. The symbol “*” denotes the predicted location with highest probability, and the correct destination is represented as the black “+”, which is included in the predicted result set as the 8th highest probability. In this experiment, when k ≥ 8, this can be considered as a correct time with its TE = 0 m. From the plot, we can discover that the correct destination was an unobserved location that is never visited by the suspects, though it was still selected among the candidate predicted locations due to the outstanding ability of our model to learn transition frequencies of unobserved locations from sparse mobility data.
With the same prediction condition, the predicted results of SubSyn are shown in Figure 17. From the plot, we can see that this model is unable to include the correct destination (black “+”) into its prediction result set (no color in that grid). Therefore, when k ≥ 8, this cannot be considered as a correct time, and its TE is 300 m (the distance between the grids of black “+” and “*”).
With the same prediction condition, the predicted results of ZMDB are shown in Figure 18. Because there is no trajectory in the dataset containing the query trajectory (2 blue symbols of “+” ) with the number of trajectory points being greater than 2, the prediction result set is empty (no grid is colored). Thus, the grid of the last point (the grid covering both blue “+” and “*”) in the query trajectory was considered as the unique candidate predicted location. Hence, when k ≥ 8, it would not be a correct time, and its TE is 700 m (the distance between the grid covering black “+” and the grid covering both of blue “+” and “*”).
The predicted result of Markov is shown in Figure 19. Due to the sparse data, the number of candidate predicted locations (colored grid) is merely four. The model did not incorporate the correct destination (grid of black “+”) into its result set. Therefore, when k ≥ 8, it would not be a correct time, and its TE = 300 m (the distance between the yellow grid and grid of black “+”).

5. Conclusions

This study presents an approach to effectively help police break cases by searching for the spatial correlation of crime locations with the predicted movements of numerous suspects, or it can be used to obtain an early warning of suspects’ abnormal movements if some individual suspects are predicted to leave for high risk areas. However, subject to the sparsity of mobile data, it is challenging to develop an effective location prediction model for an individual suspect using the existing algorithms [60,61,62,63]. In this paper, we propose a novel CMoB model to address this issue based on the spatiotemporal semantics. In particular, this model obtains the suspect group with similar movement preferences according to spatiotemporal semantics. Then, the mobility data of suspects in this group are fused together to learn the transition frequencies of peripheral locations surrounding trajectory locations by a KDE smoothing method based on spatial proximities and spatial semantics. The first-order transition matrix and total transition probabilities between locations are formulated, and the Bayes-based location prediction is realized.
Experiments using real datasets showed that the proposed CMoB has outstanding predictive power compared with other methods on the metrics of top-k error, top-k precision, and missing percentiles, confirming that the proposed model is better and applicable to suspect location prediction. The declining effectiveness of the baseline methods relies mainly on two aspects. First, the sparsity of mobile data seriously undermines their robustness such that they cannot generalize to predict locations in unobserved areas. Most of the time, they can only consider the last point in the query trajectory as a single prediction result. Although SubSyn employs the trajectory data from more suspects and has better robustness compared with ZMDB and Markov, the incorporation of mobility data of un-similar suspects makes the transition patterns largely deviate from those of the target suspect, which has a negative effect on the precision of SubSyn. In comparison, our CMoB effectively lowers the negative impact caused by the sparsity of data by forcing the combination of the trajectory data of similar suspects as data sources and revealing the transition frequencies for unobserved locations based on the spatiotemporal semantics. Such efforts help reveal the comprehensive transition patterns of the target suspect and thus maintain a stable performance to advance its effectiveness by obtaining more predicted candidate locations close to the correct destinations.
The ideas suggested in this paper also play important roles in a large number of applications that require the prediction of locations from sparse observed data, such as prediction of the next terrorist attack, estimation of the commercial venue for users, prediction of the locations of enemy troops or discovery of victims in earthquake disasters. In the future, this study needs to be extended to other cities and areas where the size of the individual geo-crime data is small and thus could be biased. In this manner, the flexibility of the proposed model can further be explored. Further improvement could be achieved by employing more features, for example, leveraging suspects’ temporal preferences, personalized information, dynamical geo-social data or urban ubiquitous data, such as 110 calling data (emergence-request service data in China). A second possible improvement could be resorting to more complex prediction models, such as deep neural networks, which can conduct automatic feature abstraction and represent the strong non-linear correlation among original features. In addition, the predicted location profiles can be further enriched, which will be beneficial for the semantic locations (e.g., POI type) prediction or the next offending location estimation.

Acknowledgments

This study has primarily been funded by National Natural Science Foundation of China (Grant No. 41401524), Guangxi Natural Science Foundation (Grant No. 2015GXNSFBA139191), Scientific Project of Guangxi Education Department (Grant No. KY2015YB189), Open Research Program of Key Laboratory of Police Geographic Information Technology, Ministry of Public Security (Grant No. 2016LPGIT03), Open Research Program of Key Laboratory of Environment Change and Resources Use in Beibu Gulf (Guangxi Teachers Education University), Ministry of Education (Grant No. 2014BGERLXT14), Open Research Program of Key Laboratory of Mine Spatial Information Technologies of National Administration of Surveying, Mapping and Geoinformation (Grant No. KLM201409), National Science Foundation (Grant No. 1535031, 1637242), the Fundamental Research Funds for the Central Universities (Grant No. 413000010), the Open Foundation of State Key Laboratory of Information Engineering in Surveying, Mapping and Remote Sensing (Grant No. 16(03)), and National Science Foundation (1637242, 1535031).

Author Contributions

Lian Duan performed the research, analyzed the data and wrote the paper. Xinyue Ye co-designed the research and extensively updated the paper. Tao Hu and Xinyan Zhu were involved in the system design and code tests. All authors read and approved the final manuscript.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Sun, N. Design and implementation of multi-source data track analysis system based on PGIS. Sci. Surv. Mapp. 2013, 38, 51–53. [Google Scholar]
  2. Office of the Privacy Commissioner of Canada. Available online: https://www.priv.gc.ca/en/ (accessed on 10 March 2016).
  3. Shiode, S.; Shiode, N.; Block, R.; Block, C.R. Space-time characteristics of micro-scale crime occurrences: An application of a network-based space-time search window technique for crime incidents in Chicago. Int. J. Geogr. Inf. Sci. 2015, 29, 697–719. [Google Scholar] [CrossRef]
  4. Hammond, L. Geographical profiling in a novel context: prioritizing the search for New Zealand sex offenders. Psychol. Crime Law 2014, 20, 358–371. [Google Scholar] [CrossRef]
  5. Chen, N.C.; Shi, W.; Song, D.W. Prediction of series criminals: An Approach based on modeling. In Proceedings of the 2010 International Conference on Computational and Information Sciences, Chengdu, China, 17–19 December 2010; pp. 72–75. [Google Scholar]
  6. Qian, C.; Wang, Y.B.; Cao, J.D.; Lu, J.Q.; Kurths, J. Weighted-traffic-network–based geographic profiling for serial crime location prediction. EPL 2011, 93, 68006. [Google Scholar] [CrossRef]
  7. Kent, J.D.; Leitner, M. Incorporating Land cover within bayesian journey-to-crime estimation models. Int. J. Psychol. Stud. 2012, 4, 120–140. [Google Scholar] [CrossRef]
  8. Martineau, M.; Beauregard, E. Journey to murder: Examining the correlates of criminal mobility in sexual homicide. Police Pract. Res. 2016, 17, 68–83. [Google Scholar] [CrossRef]
  9. Mohler, G.O.; Short, M.B. Geographic profiling from kinetic models of criminal behavior. SIAM J. Appl. Math. 2012, 72, 163–180. [Google Scholar] [CrossRef]
  10. Rossmo, D.K. Geographic Profiling; CRC Press: Boca Raton, FL, USA, 2000. [Google Scholar]
  11. Song, C.; Koren, T.; Wang, P.; Barabási, A.L. Modelling the scaling properties of human mobility. Nat. Phys. 2010, 6, 818–823. [Google Scholar] [CrossRef]
  12. Yang, A.; Wu, R.; Wu, H.M.; Liu, X. The research of tree topology model for growth of natural selection and application in geographical profile for criminal. Inf. Comput. Appl. 2010, 106, 383–390. [Google Scholar]
  13. Van, K.M.V.; Elffers, H.; Ruiter, S. When to refrain from using likelihood surface methods for geographical offender profiling: An ex ante test of assumptions. J. Investig. Psychol. Offender Profiling 2011, 8, 242–256. [Google Scholar]
  14. Song, C.; Qu, Z.; Blumm, N.; Barabási, A.L. Limits of predictability in human mobility. Science 2010, 327, 1018–1021. [Google Scholar] [CrossRef] [PubMed]
  15. Xiao, X.Y.; Zheng, Y.; Luo, Q.; Xie, X. Inferring social ties between users with human location history. ACM Trans. Intell. Syst. Technol. 2012, 6, 2–27. [Google Scholar] [CrossRef]
  16. Yuan, N.J.; Zheng, Y.; Xie, X.; Wang, Y.Z.; Zheng, K.; Xiong, H. Discovering urban functional zones using latent activity trajectories. IEEE Trans. Knowl. Data Eng. 2015, 27, 712–725. [Google Scholar] [CrossRef]
  17. Mburu, L.; Helbich, M. Evaluating the accuracy and effectiveness of criminal geographic profiling methods: The case of Dandora, Kenya. Prof. Geogr. 2015, 67, 110–120. [Google Scholar] [CrossRef]
  18. Bernasco, W.; Block, R. Robberies in Chicago: A block-level analysis of the influence of crime generators, crime attractors and offender anchor points. J. Res. Crime Delinq. 2011, 48, 33–57. [Google Scholar] [CrossRef]
  19. Iwanski, N.; Frank, R.; Reid, A.; Dabbaghian, V. A Computational Model for Predicting the Location of Crime Attractors on a Road. In Proceedings of the European Intelligence and Security Informatics Conference, Odense, Denmark, 22–24 August 2012; pp. 60–67. [Google Scholar]
  20. Canter, D.; Youngs, D. Investigative Psychology: Offender Profiling and the Analysis of Criminal Action; Wiley: Chichester, UK, 2009. [Google Scholar]
  21. Canter, D.; Larkin, P. The Environmental Range of Serial Rapists. J. Environ. Psychol. 1993, 13, 63–69. [Google Scholar] [CrossRef]
  22. Snook, B.; Zito, M.; Bennell, C.; Taylor, P.J. On the complexity and accuracy of geographic profiling strategies. J. Quant. Criminol. 2005, 21, 1–26. [Google Scholar] [CrossRef]
  23. Luini, L.P.; Scorzelli, M.; Mastroberardino, S.; Marucci, F.S. Spatial cognition and crime: The study of mental models of spatial relations in crime analysis. Cogn. Process. 2012, 13 (Suppl. 1), S253–S255. [Google Scholar] [CrossRef] [PubMed]
  24. Levine, N. Introduction to the special issue on Bayesian journey-to-crime modelling. J. Investig. Psychol. Offender Profiling 2009, 6, 167–185. [Google Scholar] [CrossRef]
  25. Taylor, P.J.; Bennell, C.; Snook, B. The bounds of cognitive heuristic performance on the geographic profiling task. Appl. Cogn. Psychol. 2009, 23, 410–430. [Google Scholar] [CrossRef]
  26. Hammond, L.; Youngs, D. Decay functions and criminal spatial processes: Geographical offender profiling of volume crime. J. Investig. Psychol. Offender Prof. 2011, 9, 90–102. [Google Scholar] [CrossRef]
  27. David, C.; Laura, H.; Donna, Y.; Juszczak, P. The Efficacy of ideographic models for geographical offender profiling. J. Quant. Criminol. 2013, 29, 423–446. [Google Scholar]
  28. Bache, R. A Generative Model of Offenders’ Spatial Behaviour. Int. J. Uncertain. Fuzziness Knowl.Based Syst. 2011, 19, 825–842. [Google Scholar] [CrossRef]
  29. Canter, D.; Hammond, L. A comparison of the efficacy of different decay functions in geographical profiling for a sample of US serial killers. J. Investig. Psychol. Offender Prof. 2006, 3, 91–103. [Google Scholar] [CrossRef]
  30. Smith, W.; Bond, J.W.; Townsley, M. Determining how journeys-to-crime vary measuring inter- and intra-offender crime trip distributions. In Putting Crime in Its Place; Weisburd, D., Bernasco, W., Gerben, J., Bruinsma, N., Eds.; Filiquarian: London, UK, 2009. [Google Scholar]
  31. Levine, N. CrimeStat: A Spatial Statistics Program for the Analysis of Crime Incident Locations (V 3.3); Ned Levine & Associates: Houston, TX, USA; The National Institute of Justice: Washington, DC, USA, 2010.
  32. Kent, J.; Leitner, M. Utilizing land cover characteristics to enhance journey-to-crime estimation models. Crime Mapp. J. Res. Pract. 2009, 1, 33–54. [Google Scholar]
  33. Paulsen, D. Human versus machine: A comparison of the accuracy of geographic profiling methods. J. Investig. Psychol. Offender Prof. 2006, 3, 77–89. [Google Scholar] [CrossRef]
  34. Xue, A.Y.; Zhang, R.; Zheng, Y.; Xie, X.; Huang, J.; Xu, Z.H. Destination Prediction by Sub-Trajectory Synthesis and Privacy Protection Against Such Prediction. In Proceedings of the IEEE International Conference on Data Engineering, Brisbane, Australia, 8–12 April 2013; pp. 254–265. [Google Scholar]
  35. Cho, E.; Myers, S.A.; Leskovec, J. Friendship and Mobility: User Movement in Location-Based Social Networks. In Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining, San Diego, CA, USA, 21–24 August 2011; pp. 1082–1090. [Google Scholar]
  36. Sadilek, A.; Kautz, H.; Bigham, J.P. Finding Your Friends and Following Them to Where You Are. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining, Seattle, WA, USA, 8–12 February 2012; pp. 723–732. [Google Scholar]
  37. Noulas, A.; Scellato, S.; Lathia, N.; Mascolo, C. Mining User Mobility Features for Next Place Prediction in Location-Based Services. In Proceedings of the 2012 IEEE 12th International Conference on Data Mining, Brussels, Belgium, 10–13 December 2012; pp. 1038–1043. [Google Scholar]
  38. Chang, J.; Sun, E. Location3: How Users Share and Respond to Location-Based Data on Social. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, Barcelona, Spain, 17–21 July 2011; pp. 74–80. [Google Scholar]
  39. Gao, H.; Tang, J.; Liu, H. Exploring Social-Historical Ties on Location-Based Social Networks. In Proceedings of the Sixth International AAAI Conference on Weblogs and Social Media, Toronto, ON, Canada, 22–26 July 2012; pp. 114–121. [Google Scholar]
  40. Cheng, Z.; Caverlee, J.; Lee, K.; Sui, D.Z. Exploring Millions of Footprints in Location Sharing Services. In Proceedings of the Fifth International AAAI Conference on Weblogs and Social Media, Barcelona, Spain, 17–21 July 2011; pp. 81–88. [Google Scholar]
  41. Xiao, X.Y.; Zheng, Y.; Luo, Q.; Xie, X. Finding Similar Users Using Category-Based Location History. In Proceedings of the 18th ACM SIGSPATIAL Conference on Advances in Geographical Information Systems, San Jose, CA, USA, 2–5 November 2010; pp. 442–445. [Google Scholar]
  42. Horvitz, E.; Krumm, J. Some Help on the Way: Opportunistic Routing Under Uncertainty. In Proceedings of the ACM Conference on Ubiquitous Computing, Pittsburgh, PA, USA, 5–8 September 2012; pp. 371–380. [Google Scholar]
  43. Krumm, J.; Horvitz, E. Predestination: Where do you want to go today? IEEE Comput. 2007, 40, 105–107. [Google Scholar] [CrossRef]
  44. Ziebart, B.D.; Maas, A.L.; Dey, A.K.; Bagnell, J.A. Navigate Like A Cabbie: Probabilistic Reasoning From Observed Context-Aware Behavior. In Proceedings of the 10th International Conference on Ubiquitous Computing, Seoul, Korea, 21–24 September 2008; pp. 322–331. [Google Scholar]
  45. Gogate, V.; Dechter, R.; Bidyuk, B. Modeling Transportation Routines Using Hybrid Dynamic Mixed Networks. In Proceedings of the Twenty-First Conference on Uncertainty in Artificial Intelligence, Edinburgh, UK, 26–29 July 2005; pp. 217–224. [Google Scholar]
  46. Cheng, C.; Yang, H.; King, I.; Lyu, M.R. Fused Matrix Factorization with Geographical and Social Influence in Location-Based Social Networks. In Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, Toronto, ON, Canada, 22–26 July 2012; pp. 17–23. [Google Scholar]
  47. Liu, Y.; Wei, W.; Sun, A.; Miao, C. Exploiting Geographical Neighborhood Characteristics for Location Recommendation. In Proceedings of the 23rd ACM International Conference on Information and Knowledge Management, Shanghai, China, 3–7 November 2014; pp. 739–748. [Google Scholar]
  48. Ye, M.; Yin, P.; Lee, W.C.; Lee, D.L. Exploiting Geographical Influence for Collaborative Point of Interest Recommendation. In Proceedings of the 34th International ACM SIGIR Conference on Research and Development in Information Retrieval, Beijing, China, 24–28 July 2011; pp. 325–334. [Google Scholar]
  49. Gao, H.; Tang, J.; Liu, H. gSCorr: Modeling Geo-Social Correlations for New Check-Ins on Location based Social Networks. In Proceedings of the 21st ACM International Conference on Information and Knowledge Management, Maui, HI, USA, 29 November–2 October 2012; pp. 1582–1586. [Google Scholar]
  50. Liu, B.; Xiong, H. Point-of-Interest Recommendation in Location Based Social Networks with Topic and Location Awareness. In Proceedings of the 2013 SIAM International Conference on Data Mining, Austin, TX, USA, 2013; pp. 396–404. [Google Scholar]
  51. Lian, D.; Zhao, C.; Xie, X.; Sun, G.; Chen, E.; Rui, Y. Geomf: Joint Geographical Modeling and Matrix Factorization for Point-of-Interest Recommendation. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, 24–27 August 2014; pp. 831–840. [Google Scholar]
  52. Wang, Y.; Yuan, N.J.; Lian, D.; Xu, L.; Xie, X.; Chen, E.; Rui, Y. Regularity and conformity: Location prediction using heterogeneous mobility data. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Sydney, Australia, 10–13 August 2015; pp. 1275–1284. [Google Scholar]
  53. Lian, D.; Xie, X.; Zheng, V.W.; Yuan, N.J.; Zhang, F.; Chen, E. CEPR: A collaborative exploration and periodically returning model for location prediction. ACM Trans. Intell. Syst. Technol. 2015, 6, 8. [Google Scholar] [CrossRef]
  54. Tayebi, M.A.; Glasser, U.; Ester, M.; Brantingham, P.L. Personalized crime location prediction. Eur. J. Appl. Math. 2016, 27, 422–450. [Google Scholar] [CrossRef]
  55. Ester, M.; Kriegel, H.P.; Sander, J.; Xu, X.W. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise. In Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining, Portland, OR, USA, 2–4 August 1996; pp. 226–231. [Google Scholar]
  56. Aljazzar, H.; Leue, S. K: A heuristic search algorithm for finding the k shortest paths. Artif. Intell. 2011, 175, 2129–2154. [Google Scholar] [CrossRef]
  57. Baidu Geocoding API. Available online: http://lbsyun.baidu.com/index.php?title=webapi/guide/webservice-geocoding (accessed on 10 June 2015).
  58. Geopy. Available online: https://github.com/geopy/geopy (accessed on 10 June 2015).
  59. Wikipedia. Hyperparameter Optimization. Available online: https://en.wikipedia.org/wiki/Hyperparameter_optimization (accessed on 15 June 2015).
  60. Wells, W.; Wu, L.; Ye, X. Patterns of near-repeat gun assaults in Houston. J. Res. Crime Delinq. 2012, 49, 186–212. [Google Scholar] [CrossRef]
  61. Chen, N.; Chen, Y.; Song, S.; Huang, C.T.; Ye, X. Smart Urban Surveillance Using Fog Computing. IEEE/ACM Symp. Edge Comput. (SEC) 2016, 95–96. [Google Scholar]
  62. Ye, X.; Huang, Q.; Li, W. Integrating big social data, computing and modeling for spatial social science. Cartogr. Geogr. Inf. Sci. 2016, 43, 377–378. [Google Scholar] [CrossRef]
  63. Ye, X.; Liu, L. Spatial Crime Analysis and Modeling. Ann. GIS 2012, 18, 157. [Google Scholar] [CrossRef]
Figure 1. Overall workflow of location prediction.
Figure 1. Overall workflow of location prediction.
Ijgi 06 00185 g001
Figure 2. Local clustered points.
Figure 2. Local clustered points.
Ijgi 06 00185 g002
Figure 3. (a) No transition information for unobserved location (b) Transition information for unobserved location.
Figure 3. (a) No transition information for unobserved location (b) Transition information for unobserved location.
Ijgi 06 00185 g003
Figure 4. (a) trajectory location to peripheral location (b) peripheral location to trajectory location.
Figure 4. (a) trajectory location to peripheral location (b) peripheral location to trajectory location.
Ijgi 06 00185 g004
Figure 5. Transitions between locations.
Figure 5. Transitions between locations.
Ijgi 06 00185 g005
Figure 6. (a) M (b) M × M (c) M × M × M.
Figure 6. (a) M (b) M × M (c) M × M × M.
Ijgi 06 00185 g006
Figure 7. (a) Wuhan city (b) Grids of the Study Area.
Figure 7. (a) Wuhan city (b) Grids of the Study Area.
Ijgi 06 00185 g007
Figure 8. Visiting Intensities of All Suspects.
Figure 8. Visiting Intensities of All Suspects.
Ijgi 06 00185 g008
Figure 9. Visiting Intensities of Venue Types.
Figure 9. Visiting Intensities of Venue Types.
Ijgi 06 00185 g009
Figure 10. Top-k Errors.
Figure 10. Top-k Errors.
Ijgi 06 00185 g010
Figure 11. Top-k Error Histogram.
Figure 11. Top-k Error Histogram.
Ijgi 06 00185 g011
Figure 12. Top-k Precision.
Figure 12. Top-k Precision.
Ijgi 06 00185 g012
Figure 13. Missing Percentiles.
Figure 13. Missing Percentiles.
Ijgi 06 00185 g013
Figure 14. Top-k Error with different k.
Figure 14. Top-k Error with different k.
Ijgi 06 00185 g014
Figure 15. Top-k Precision with different k.
Figure 15. Top-k Precision with different k.
Ijgi 06 00185 g015
Figure 16. Result of CMoB.
Figure 16. Result of CMoB.
Ijgi 06 00185 g016
Figure 17. Result of SubSyn.
Figure 17. Result of SubSyn.
Ijgi 06 00185 g017
Figure 18. Result of ZMDB.
Figure 18. Result of ZMDB.
Ijgi 06 00185 g018
Figure 19. Result of Markov.
Figure 19. Result of Markov.
Ijgi 06 00185 g019
Table 1. Parameters spaces.
Table 1. Parameters spaces.
ParameterParameter Space
ε{300, 350, …, 800}
hd{100, 200, …, 500}
hs{0.1, 0.2, …, 0.5}
a1{0, 0.1, …, 1}
a2,{0, 0.1, …, 1}
a3{0, 0.1, …, 1}
a4{0, 0.1, …, 1}

Share and Cite

MDPI and ACS Style

Duan, L.; Ye, X.; Hu, T.; Zhu, X. Prediction of Suspect Location Based on Spatiotemporal Semantics. ISPRS Int. J. Geo-Inf. 2017, 6, 185. https://doi.org/10.3390/ijgi6070185

AMA Style

Duan L, Ye X, Hu T, Zhu X. Prediction of Suspect Location Based on Spatiotemporal Semantics. ISPRS International Journal of Geo-Information. 2017; 6(7):185. https://doi.org/10.3390/ijgi6070185

Chicago/Turabian Style

Duan, Lian, Xinyue Ye, Tao Hu, and Xinyan Zhu. 2017. "Prediction of Suspect Location Based on Spatiotemporal Semantics" ISPRS International Journal of Geo-Information 6, no. 7: 185. https://doi.org/10.3390/ijgi6070185

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop