scispace - formally typeset
Search or ask a question
Author

Nahida Sultana Chowdhury

Bio: Nahida Sultana Chowdhury is an academic researcher from Indiana University – Purdue University Indianapolis. The author has contributed to research in topics: Harm & Social work. The author has an hindex of 3, co-authored 13 publications receiving 23 citations. Previous affiliations of Nahida Sultana Chowdhury include University of Asia and the Pacific.

Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors explored the impact of a dynamic place-based policing strategy on social harm in Indianapolis and found that proactive policing in dynamic harmspots can reduce aggregated social harm.

5 citations

Proceedings ArticleDOI
01 Sep 2018
TL;DR: This paper proposes a system, CDASH, for synthesizing heterogeneous social harm data from multiples sources, identifying social harm risks in space and time, and communicating the risk to the relevant community resources best equipped to intervene.
Abstract: Communities are adversely affected by heterogeneous social harm events (e.g., crime, traffic crashes, medical emergencies, drug use) and police, fire, health and social service departments are tasked with mitigating social harm through various types of interventions. Smart cities of the future will need to leverage IoT, data analytics, and government and community human resources to most effectively reduce social harm. Currently, methods for collection, analysis, and modeling of heterogeneous social harm data to identify government actions to improve quality of life are needed. In this paper we propose a system, CDASH, for synthesizing heterogeneous social harm data from multiples sources, identifying social harm risks in space and time, and communicating the risk to the relevant community resources best equipped to intervene. We discuss the design, architecture, and performance of CDASH. CDASH allows users to report live social harm events using mobile hand-held devices and web browsers and flags high risk areas for law enforcement and first responders. To validate the methodology, we run simulations on historical social harm event data in Indianapolis illustrating the advantages of CDASH over recently introduced social harm indices and existing point process methods used for predictive policing.

5 citations

Proceedings ArticleDOI
01 Dec 2017
TL;DR: Trust based rating and ranking (TRR) as discussed by the authors uses programmatic artifacts to compute a trust tuple (Belief, Disbelief, Uncertainty, B, D, U) for each app based on the internal view and use it to rank the order apps offering similar functionality.
Abstract: User perception in any mobile-app ecosystem, is represented as user ratings of apps. Unfortunately, the user ratings are often biased and do not reflect the actual usability of an app. To address the challenges associated with selection and ranking of apps, we need to use a comprehensive and holistic view about the behavior of an app. In this paper, we present and evaluate Trust based Rating and Ranking (TRR) approach. It relies solely on an apps' internal view that uses programmatic artifacts. We compute a trust tuple (Belief, Disbelief, Uncertainty — B, D, U) for each app based on the internal view and use it to rank the order apps offering similar functionality. Apps used for empirically evaluating the TRR approach are collected from the Google Play Store. Our experiments compare the TRR ranking with the user review-based ranking present in the Google Play Store. Although, there are disparities between the two rankings, a slightly deeper investigation indicates an underlying similarity between the two alternatives.

4 citations

Journal ArticleDOI
TL;DR: An IP (Internet Protocol) -based Remote Combat Robot is conversed, namely VECTOR (Vigorous Efficient Combatant Tactical Operative Robot), designed and developed to operate remote combat.
Abstract: In this paper, an IP (Internet Protocol) -based Remote Combat Robot is conversed, namely VECTOR (Vigorous Efficient Combatant Tactical Operative Robot). The name VECTOR is chosen to depict the concrete physiognomies of the Robot which is assembled. This project is designed and developed to operate remote combat. IP communication is enforced to control every single state of VECTOR. Advantage over other system is that VECTOR can rotate up to 180 angle with respect to the 2-D axes both in clockwise and counter clockwise direction as per need. Moreover, the other prospects of this project are that VECTOR can be deployed to carry out Armored Hefty Freight, Rescue Mission during Natural Calamities, Safekeeping Tasks, Social Services and many more to name.

2 citations


Cited by
More filters
01 May 2019
TL;DR: This study provides the first spatial concentration estimation of opioid-related deaths and applies a recent method, corrected Gini coefficient, to best specify low-N incident concentrations and proposes a novel method for improving upon a shortcoming of this approach.
Abstract: The law of crime concentration at place has become a criminological axiom and the foundation for one of the strongest evidence-based policing strategies to date. Using longitudinal data from three ...

16 citations

Journal ArticleDOI
TL;DR: Efficiency is achieved through property-based slicing, which reduces the complexity of verification, and guided test sequence generation, which limits the input space to a set of representative test sequences selected from legal as well as illegal input spaces.

13 citations

01 Oct 2018
TL;DR: In this article, a penalized likelihood approach for introducing fairness into point process models of crime is proposed, which adds a penalty term to the likelihood function that encourages the amount of police patrol received by each demographic groups to be proportional to the representation of that group in the total population.
Abstract: Racial bias of predictive policing algorithms has been the focus of recent research and, in the case of Hawkes processes, feedback loops are possible where biased arrests are amplified through self-excitation, leading to hotspot formation and further arrests of minority populations. In this article we develop a penalized likelihood approach for introducing fairness into point process models of crime. In particular, we add a penalty term to the likelihood function that encourages the amount of police patrol received by each of several demographic groups to be proportional to the representation of that group in the total population. We apply our model to historical crime incident data in Indianapolis and measure the fairness and accuracy of the two approaches across several crime categories. We show that fairness can be introduced into point process models of crime so that patrol levels proportionally match demographics, though at a cost of reduced accuracy of the algorithms.

12 citations

Journal ArticleDOI
TL;DR: In this article , the authors highlight the role of simulation in business analytics and show that simulation remains an indispensable mechanism for adding value to analytics project and the coupling between the two techniques is in its embryonic phase.

7 citations

01 Apr 2017
TL;DR: In this article, the authors present two parallel versions (i.e., batch processing and stream processing) of these algorithms and empirically validate their performance using publically available datasets from the Amazon and Android marketplaces.
Abstract: With the popularity of various online software marketplaces, third-party vendors are creating many instances of software applications ('apps') for mobile and desktop devices targeting the same set of requirements. This abundance makes the task of selecting and recommending (S&R) apps, with a high degree of assurance, for a specific scenario a significant challenge. The S&R process is a precursor for composing any trusted system made out of such individually selected apps. In addition to feature-based information, about these apps, these marketplaces contain large volumes of user reviews. These reviews contain unstructured user sentiments about app features and the onus of using these reviews in the S&R process is put on the user. This approach is ad-hoc, laborious and typically leads to a superficial incorporation of the reviews in the S&R process by the users. However, due to the large volumes of such reviews and associated computing, these two techniques are not able to provide expected results in real-time or near real-time. Therefore, in this paper, we present two parallel versions (i.e., batch processing and stream processing) of these algorithms and empirically validate their performance using publically available datasets from the Amazon and Android marketplaces. The results of our study show that these parallel versions achieve near real-time performance, when measured as the end-to-end response time, while selecting and recommending apps for specific queries.

7 citations