skip to main content
10.1145/2983323.2983346acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

MIST: Missing Person Intelligence Synthesis Toolkit

Published: 24 October 2016 Publication History

Abstract

Each day, approximately 500 missing persons cases occur that go unsolved/unresolved in the United States. The non-profit organization known as the Find Me Group (FMG), led by former law enforcement professionals, is dedicated to solving or resolving these cases. This paper introduces the Missing Person Intelligence Synthesis Toolkit (MIST) which leverages a data-driven variant of geospatial abductive inference. This system takes search locations provided by a group of experts and rank-orders them based on the probability assigned to areas based on the prior performance of the experts taken as a group. We evaluate our approach compared to the current practices employed by the Find Me Group and found it significantly reduces the search area - leading to a reduction of 31 square miles over 24 cases we examined in our experiments. Currently, we are using MIST to aid the Find Me Group in an active missing person case.

References

[1]
B. Akinkunmi and P. C. Bassey. A Logic of Spatial Qualification Using Qualitative Reasoning Approach. International Journal of Artificial Intelligence & Applications, 4(2):45, 2013.
[2]
T. Bylander, D. Allemang, M. C. Tanner, and J. R. Josephson. The Computational Complexity of Abduction. Artif. Intell., 49(1--3):25--60, 1991.
[3]
L. Console, L. Portinale, and D. T. Dupré. Focussing Abductive Diagnosis. AI Commun., 4(2/3):88--97, 1991.
[4]
L. Console, M. L. Sapino, and D. T. Dupré. The Role of Abduction in Database View Updating. J. Intell. Inf. Syst., 4(3):261--280, 1995.
[5]
S. do Lago Pereira and L. N. de Barros. Planning with abduction: A logical framework to explore extensions to classical planning. In Brazilian Symposium on Artificial Intelligence, pages 62--72. Springer, 2004.
[6]
T. Eiter and G. Gottlob. The complexity of logic-based abduction. Journal of the ACM, 42:3--42, 1995.
[7]
S. George, X. Wang, J. Lin, B. Qu, and J.-C. Liu. MECH: Algorithms and Tools for Automated Assessment of Potential Attack Locations. Technical report, Texas A & M University, College Station, 2015.
[8]
A. C. Kakas and P. Mancarella. Database updates through abduction. In VLDB, volume 90, pages 650--661, 1990.
[9]
A. Koutsioumpas. Abductive reasoning in 2d geospatial problems. In Applications of Mathematics and Informatics in Science and Engineering, pages 333--347. Springer, 2014.
[10]
A. Krause, J. Leskovec, C. Guestrin, J. Vanbriesen, and C. Faloutsos. Efficient sensor placement optimization for securing large water distribution networks. Journal of Water Resources Planning and Management, 2008.
[11]
M. Pagnucco. The Role of Abductive Reasoning within the Process of Belief Revision. PhD thesis, Basser Department of Computer Science, University of Sydney, 1996.
[12]
C. S. Peirce. Philosophical writings of Peirce, selected and edited with an introd. by Justus Buchler. Dover Publications New York, 1955.
[13]
Y. Peng and J. Reggia. Abductive inference models for diagnostic problem-solving. Symbolic computation. Springer-Verlag, New York, 1990.
[14]
Y. Peng and J. A. Reggia. Plausibility of Diagnostic Hypotheses: The Nature of Simplicity. In Proceedings of the 5th National Conference on Artificial Intelligence. Philadelphia, PA, August 11-15, 1986. Volume 1: Science., pages 140--147, 1986.
[15]
A. Sadilek and H. Kautz. Modeling Success, Failure, and Intent of Multi-Agent Activities Under Severe Noise.
[16]
A. Sadilek and H. Kautz. Location-based Reasoning About Complex Multi-agent Behavior. J. Artif. Int. Res., 43(1):87--133, Jan. 2012.
[17]
A. Sadilek and H. A. Kautz. Recognizing multi-agent activities from gps data. In AAAI, volume 39, page 109, 2010.
[18]
P. Santos and M. Shanahan. Hypothesising object relations from image transitions. In ECAI, pages 292--296, 2002.
[19]
P. Shakarian, J. P. Dickerson, and V. Subrahmanian. Adversarial geospatial abduction problems. ACM Transactions on Intelligent Systems and Technology (TIST), 3(2):34, 2012.
[20]
P. Shakarian, M. K. Nagel, B. E. Schuetzle, and V. Subrahmanian. Abductive inference for combat: using scare-s2 to find high-value targets in afghanistan. Technical report, DTIC Document, 2011.
[21]
P. Shakarian and V. Subrahmanian. Region-based Geospatial Abduction with Counter-IED Applications. In U. K. Wiil, editor, Counterterrorism and Open Source Intelligence. Springer, 2010.
[22]
P. Shakarian and V. Subrahmanian. Geospatial Abduction: Principles and Practice. SpringerLink: Bücher. Springer New York, 2011.
[23]
P. Shakarian, V. Subrahmanian, and M. L. Spaino. SCARE: A Case Study with Baghdad. In Proceedings of the Third International Conference on Computational Cultural Dynamics. AAAI, 2009.
[24]
P. Shakarian, V. Subrahmanian, and M. L. Spaino. GAPs: Geospatial Abduction Problems. ACM Transactions on Intelligent Systems and Technology, 2010.
[25]
M. Shanahan. Noise and the Common Sense Informatic Situation for a Mobile Robot.
[26]
J. F. Stollsteimer. A working model for plant numbers and locations. Journal of Farm Economics, 45(3):631--645, 1963.

Cited By

View all
  • (2022)Ethical Tensions in Applications of AI for Addressing Human Trafficking: A Human Rights PerspectiveProceedings of the ACM on Human-Computer Interaction10.1145/35551866:CSCW2(1-29)Online publication date: 11-Nov-2022
  • (2021)A Smart City Application Design for Efficiently Tracking Missing Person in Large Gatherings in Madinah Using Emerging IoT Technologies2021 Mohammad Ali Jinnah University International Conference on Computing (MAJICC)10.1109/MAJICC53071.2021.9526244(1-7)Online publication date: 15-Jul-2021

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '16: Proceedings of the 25th ACM International on Conference on Information and Knowledge Management
October 2016
2566 pages
ISBN:9781450340731
DOI:10.1145/2983323
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 October 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. abductive inference
  2. geospatial abduction
  3. law enforcement
  4. missing person

Qualifiers

  • Research-article

Funding Sources

  • Find Me Group

Conference

CIKM'16
Sponsor:
CIKM'16: ACM Conference on Information and Knowledge Management
October 24 - 28, 2016
Indiana, Indianapolis, USA

Acceptance Rates

CIKM '16 Paper Acceptance Rate 160 of 701 submissions, 23%;
Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

CIKM '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 08 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2022)Ethical Tensions in Applications of AI for Addressing Human Trafficking: A Human Rights PerspectiveProceedings of the ACM on Human-Computer Interaction10.1145/35551866:CSCW2(1-29)Online publication date: 11-Nov-2022
  • (2021)A Smart City Application Design for Efficiently Tracking Missing Person in Large Gatherings in Madinah Using Emerging IoT Technologies2021 Mohammad Ali Jinnah University International Conference on Computing (MAJICC)10.1109/MAJICC53071.2021.9526244(1-7)Online publication date: 15-Jul-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media