Search Results
Showing 1 - 20 of 20 results.
- Search terms can be anywhere in the study: title, description, variables, etc.
- Because our holdings are large, we recommend using at least two query terms:
rural economy
home ownership
higher education
- Keywords help delimit the breadth of results. Therefore, use as many as required to achieve your desired results:
elementary education federal funding
- Our search will find studies with derivative expressions of your query terms: A search for
"nation"
will find results containing "national" - Use quotes to search for an exact expression:
"social mobility"
- You can combine exact expressions with loose terms:
"united states" inmates
- Exclude results by using a MINUS sign:
elections -sweden -germany
will exclude swedish and german election studies - On the results page, you will be able to sort and filter to further refine results.
Hidden
Study Title/Investigator
Released/Updated
1.
AI Enabled Community Supervision for Criminal Justice Services, 2020-2023 (ICPSR 38996)
Rogers, Marcus; Karabiyik, Umit; Aggarwal, Sudhir; Pettus, Carrie; Mukherjee, Tathagata; Chung, Haeyong
Rogers, Marcus; Karabiyik, Umit; Aggarwal, Sudhir; Pettus, Carrie; Mukherjee, Tathagata; Chung, Haeyong
This project aimed to revolutionize the reentry process for justice-involved individuals (JII) by harnessing the power of artificial intelligence (AI) and advanced technologies. The centerpiece of the endeavor is the AI-based Support and Monitoring System, or AI-SMS, a cutting-edge platform designed to assist JII and their dedicated caseworkers in their journey to reintegrate seamlessly into the community. While the primary focus is on JII, the researchers recognize the critical role played by caseworkers-clinically trained individuals who facilitate the reentry process from a community perspective.
AI-SMS was conceived to be a multifaceted tool that provides case workers with early warning indicators of risky behavior and equips JII with the means and strategies to mitigate these risks, aligning with best practices in hybrid supervision. At its core, the system is committed to delivering personalized resources and opportunities to JII, complementing the support offered by caseworkers.
2023-12-20
2.
Applying Artificial Intelligence to Person-Based Policing Practices, 2019-2023 (ICPSR 39074)
Dai, Mengyan
Dai, Mengyan
In this project, the research team developed and evaluated an artificial intelligence (AI) tool using agent-based modeling methods for crime analysis and risk evaluation (CARE): CAREsim. The purpose of this tool was to improve the effectiveness of person-based patrol strategies, where police take preemptive actions upon selected high-risk individuals (determined based on factors known to police such as violent crime history) when predicted risks of committing crimes are high. CARESim was developed and tested with a simulated randomized controlled experiment within the jurisdiction of Hampton, Virginia. 240 high-risk individuals (120 in each group) were followed for a 12-month period, with the simulation lasting 23 months. The treatment group received additional crime analyses using the AI tool and more focused patrols, while the control group received analyses as usual and random patrols in the simulated environment. The tool was evaluated on a series of outcomes (e.g., number of crimes and arrests) comparing the control and treatment groups. This collection contains the simulated high-risk individual data (DS1) and the simulated crimes data (DS2) used for the experiment.
2024-09-26
3.
C80 Computer Program: 1980 Census Data Retrieval Package (ICPSR 9055)
Inter-university Consortium for Political and Social Research
Inter-university Consortium for Political and Social Research
This C80 computer program was written by ICPSR to retrieve
and print data items from the 1980 Census Summary Tape Files (STFs).
Development of the program was supported by a grant from the
Administration on Aging, United States Department of Health and Human
Services, which was seeking easy-to-use software for utilization by
its state and area agencies on aging. C80 is written in Fortran IV and
includes its own database dictionary for the STF 1 data files. This
software can access any of the separate state or national data files
from the STF 1 series, and can retrieve from them any combination of
data items and geographical entities contained in those files. Output
options include several forms of printed tables as well as logical
record length data files. C80 automatically checks the "suppression
flags" included in the STF 1 data files and recodes the relevant
suppressed tabulations upon output. Code for the program and related
materials are available as 10 separate files. The C80 program only
accesses STF 1 files from the 1980 Census Summary Tape File series and
cannot be used with other Summary Tape Files.
2006-01-12
4.
Case Tracking and Mapping System Developed for the United States Attorney's Office, Southern District of New York, 1997-1998 (ICPSR 2929)
Reilly, Colin; Goldsmith, Victor
Reilly, Colin; Goldsmith, Victor
This collection grew out of a prototype case tracking and
crime mapping application that was developed for the United States
Attorney's Office (USAO), Southern District of New York (SDNY). The
purpose of creating the application was to move from the traditionally
episodic way of handling cases to a comprehensive and strategic method
of collecting case information and linking it to specific geographic
locations, and collecting information either not handled at all or not
handled with sufficient enough detail by SDNY's existing case
management system. The result was an end-user application designed to
be run largely by SDNY's nontechnical staff. It consisted of two
components, a database to capture case tracking information and a
mapping component to link case and geographic data. The case tracking
data were contained in a Microsoft Access database and the client
application contained all of the forms, queries, reports, macros,
table links, and code necessary to enter, navigate through, and query
the data. The mapping application was developed using Environmental
Systems Research Institute's (ESRI) ArcView 3.0a GIS. This collection
shows how the user-interface of the database and the mapping component
were customized to allow the staff to perform spatial queries without
having to be geographic information systems (GIS) experts. Part 1 of
this collection contains the Visual Basic script used to customize the
user-interface of the Microsoft Access database. Part 2 contains the
Avenue script used to customize ArcView to link the data maintained in
the server databases, to automate the office's most common queries,
and to run simple analyses.
2006-01-18
5.
Census of Population and Housing, 1980 [United States]: Census Software Package (CENSPAC) Version 3.2 with STF4 Data Dictionaries (ICPSR 7789)
United States. Bureau of the Census
United States. Bureau of the Census
This data collection contains the Census Software
Package (CENSPAC), a generalized data retrieval system that the
Census Bureau developed for use with its public use statistical
data files. CENSPAC primarily provides processing capabilities for
summary data files, but it also has some features that are
applicable to microdata files. The actual software provides sample
JCL for system installation, programs for system reconfiguration,
source code for CENSPAC, and machine-readable data dictionaries
for STF 1, STF 2, STF 3, and STF 4.
2006-01-12
6.
This data collection contains eight files of computer
program source code. All of these programs were written in
standard Fortran IV for a CDC 6600 system at Indiana University
for use with John Gillespie and Dina Zinnes, WORLD TRADE DATA,
1958-1968 (ICPSR 5402). The CLUST computer program (Parts 1 and 5)
finds clusters around nations using a trade index. It allows
input such as trade data for all nations in the system and for
primary nations around which clusters are built, and produces
several types of output data such as raw trade data, computed
trade scores, GINI indices of the trade scores, members of each
cluster and their cluster contribution scores, and nations that
belong to more than one cluster and their respective cluster
contribution scores. The INDEX computer program (Parts 2 and 6)
takes a score that can be computed from world trade data and
computes the score for all possible dyads and the GINI indices
of the score for each nation, rotates the matrix and computes
the GINI indexes again, finds the set of nations related to a
nation on the basis of the score between them being greater
than a certain value, and produces a frequency distribution
of the scores. The CONID computer program (Parts 3 and 7)
computes and prints the observed-expected trade scores between
all possible dyads of nations, GINI indices on those scores for
each score vis-a-vis the rest of the world, a GINI index on the
indices of all nations in the world, and dominance scores for
all dyads. The THRAN computer program (Parts 4 and 8) does a
"threshold analysis" on a set of paired values using the
correlation coefficient. This program breaks a set of ordered
pairs that are sorted on the independent variable (X) into subsets
so that the correlation coefficient in each subset is maximized.
1992-02-16
7.
This collection consists of a computer program designed to
reapportion a legislature or any other body of people representing
geographical districts. The program was built to produce the
districting pattern that would result from agreed-upon values or the
diverse patterns resulting from conflicting values. Input information
consists of descriptions of units that would make up the districts,
such as county, ward, and census tract, plus additional information
for each time an area within a state is redistricted, consisting of
both factual and value parameters. The output includes old and new
districts along with certain characteristics of each old and new
district. The program enables the user to adjust the relative weight
to be given to three significant considerations: the relative equality
of population among the districts (the one man-one vote requirement),
the contiguity and degree of compactness of the districts, and the
impact of redistricting on the political balance of power.
1992-02-16
8.
Continuity and Change in American National Elections, 1952-1996: [Instructional Materials] (ICPSR 3727)
Davison, Donald L.
Davison, Donald L.
These instructional materials were prepared for use with
AMERICAN NATIONAL ELECTION STUDIES CUMULATIVE DATA FILE, 1948-2000
(ICPSR 8475), compiled by Virginia Sapiro, Steven J. Rosenstone, and the
National Election Studies. The data file (a Stata data file) and
accompanying documentation are provided to assist educators in
instructing students in continuity and change over time in the major
determinants of American national elections. An instructors' handout
has also been included, containing the following sections, among others:
(1) an overview of the instructional module and an introduction to the
use of Stata, (2) a discussion of, and exercises on, the influences of
party identification on political behavior, including the sources of
partisan identification, partisan change over time, and partisanship and
voting, (3) a discussion of, and exercises on, the social
characteristics of the American electorate, including major social
groupings in the American electorate, who really votes, and the social
composition of the political parties, (4) a discussion of, and exercises
on, the influence of social and economic factors on political behavior,
including who votes, the question of class bias in American politics,
and the economic determinants of the vote, and (5) a bibliography of
related readings. The dataset is a collection of certain common
variables for selected federal elections between 1952 to 1996 taken from
the National Election Study Cumulative file. Variables in the dataset
include race, gender, religion, education level, other demographic
information, economic status indicators, media exposure, political
ideology, political behavior, attitudes toward salient public policies,
and partisan identification.
2004-03-03
9.
CrimeStat III: A Spatial Statistics Program for the Analysis of Crime Incident Locations (Version 3.3), United States, 2010 (ICPSR 2824)
Levine, Ned
Levine, Ned
CrimeStat III
is a spatial statistics program for the analysis of crime incident locations, developed by Ned Levine and Associates under the direction of Ned Levine, PhD, that was funded by grants from the National Institute of Justice (grants 1997-IJ-CX-0040, 1999-IJ-CX-0044, 2002-IJ-CX-0007, and 2005-IJ-CX-K037). The program is Windows-based and interfaces with most desktop GIS programs. The purpose is to provide supplemental statistical tools to aid law enforcement agencies and criminal justice researchers in their crime mapping efforts.
CrimeStat
is being used by many police departments around the country as well as by criminal justice and other researchers.
The program inputs incident locations (e.g., robbery locations) in 'dbf', 'shp', ASCII or ODBC-compliant formats using either spherical or projected coordinates. It calculates various spatial statistics and writes graphical objects to ArcGIS, MapInfo, Surfer for Windows, and other GIS packages.
CrimeStat
is organized into five sections:
Data Setup
Primary file
- this is a file of incident or point locations with X and Y coordinates. The coordinate system can be either spherical (lat/lon) or projected. Intensity and weight values are allowed. Each incident can have an associated time value.
Secondary file
- this is an associated file of incident or point locations with X and Y coordinates. The coordinate system has to be the same as the primary file. Intensity and weight values are allowed. The secondary file is used for comparison with the primary file in the risk-adjusted nearest neighbor clustering routine and the duel kernel interpolation.
Reference file
- this is a grid file that overlays the study area. Normally, it is a regular grid though irregular ones can be imported.
CrimeStat
can generate the grid if given the X and Y coordinates for the lower-left and upper-right corners.
Measurement parameters
- This page identifies the type of distance measurement (direct, indirect or network) to be used and specifies parameters for the area of the study region and the length of the street network.
CrimeStat III
has the ability to utilize a network for linking points. Each segment can be weighted by travel time, travel speed, travel cost or simple distance. This allows the interaction between points to be estimated more realistically.
Spatial Description
Spatial distribution
- statistics for describing the spatial distribution of incidents, such as the mean center, center of minimum distance, standard deviational ellipse, the convex hull, or directional mean.
Spatial autocorrelation
- statistics for describing the amount of spatial autocorrelation between zones, including general spatial autocorrelation indices - Moran's I , Geary's C, and the Getis-Ord General G, and correlograms that calculate spatial autocorrelation for different distance separations - the Moran, Geary, Getis-Ord correlograms. Several of these routines can simulate confidence intervals with a Monte Carlo simulation.
Distance analysis I
- statistics for describing properties of distances between incidents including nearest neighbor analysis, linear nearest neighbor analysis, and Ripley's K statistic., There is also a routine that assigns the primary points to the secondary points, either on the basis of nearest neighbor or point-in-polygon, and then sums the results by the secondary point values.
Distance analysis II
- calculates matrices representing the distance between points for the primary file, for the distance between the primary and secondary points, and for the distance between either the primary or secondary file and the grid.
'Hot spot' analysis I
- routines for conducting 'hot spot' analysis including the mode, the fuzzy mode, hierarchical nearest neighbor clustering, and risk-adjusted nearest neighbor hierarchical clustering. The hierarchical nearest neighbor hot spots can be output as ellipses or convex hulls.
'Hot spot' analysis II
- more routines for conducting hot spot analysis including the Spatial and Temporal Analysis of Crime (STAC), K-means clustering, Anselin's local Moran, and the Getis-Ord local G statistics. The STAC and K-means hot spots can be output as ellipses or convex hulls. All of these routines can simulate confidence intervals with a Monte Carlo simulation.
Spatial Modeling
Interpolation I
- a single-variable kernel density estimation routine for producing a surface or contour estimate of the density of incidents (e.g., burglaries) and a dual-variable kernel density estimation routine for comparing the density of incidents to the density of an underlying baseline (e.g., burglaries relative to the number of households).
Interpolation II
- a Head Bang routine for smoothing zonal data that can be applied to events (volumes), rates or can be used to create rates. In addition, there is an interpolated Head Bang routine for interpolating the smoothed Head Bang result to grid cells.
Space-time analysis
- a set of tools for analyzing clustering in time and in space. These include the Knox and Mantel indices, which look for the relationship between time and space, and the Correlated Walk Analysis module, which analyzes and predicts the behavior of a serial offender and a spatial-temporal moving average.
Journey to crime analysis
- a simple criminal justice method for estimating the likely location of a serial offender given the distribution of incidents and a model of travel distance. The routine allows the user to estimate a travel model with a calibration file and apply it to the serial events. It can be used to identify a likely location given the distribution of 'points' and assumptions about travel behavior. There is a routine for drawing lines between origins and destinations (crime trips).
Bayesian journey to crime analysis
- an advanced criminal justice method for estimating the likely location of a serial offender given the distribution of incidents, a model of travel distance, and an origin-destination matrix showing the relationship between where crimes were committed and where offenders lived. A diagnostics routine analyzes serial offenders for whom their residence is known and estimates which of several journey to crime estimates is most accurate. A selected method can be applied to identify a likely residence location of a single serial offender given the distribution of incidents, assumptions about travel behavior, and the origin of offenders who committed crimes in the same locatio,ns.
Regression modeling
- a module for analyzing a relationship between a dependent variable and one or more independent variables. The CrimeStat regression module includes both Ordinary Least Squares and Poisson-based regression models, estimated from Maximum Likelihood (MLE) or Markov Chain Monte Carlo (MCMC) algorithms. The current version includes six different models including OLS, Poisson with Linear Dispersion Correction, Poisson-Gamma and a Poisson-Gamma-Conditional Autoregressive (CAR) spatial regression model. The module can handle very large datasets through a Block Sampling approach. There is also a module for applying estimated coefficients to a new dataset to make predictions.
Crime Travel Demand Modeling
Crime travel demand modeling is a new module in
CrimeStat III
. It is an application of travel demand modeling, widely used in transportation planning, to crime analysis. The analysis is done by zones. First, crime 'trips' are defined as a link between an offender residence/origin location and a crime location. The number of crimes originating in each zone is counted as is the number of crimes ending in each zone. Second, the model is run sequentially in four separate stages with multiple routine in each stage:
Trip Generation
- Separate models are produced that predict the number of crimes originating in each zone (origins) and the number of crimes ending in each zone (destinations).
CrimeStat III
uses a multivariate Poisson regression model, with stepwise options, to create the prediction. Trips from outside the study area (external trips) can be added to the origin model to account for travel from outside the region. Once the models are created, a balancing procedure ensures that the number of origins equals the number of destinations.
Trip Distribution
- Using the predicted number of crime trips originating in each zone and the predicted number of trips occurring in each zone, the second stage distributes trips from each zone to every other zone using a gravity model. There are routines for calculating the actual (observed) distribution from individual data, for estimating the prediction coefficients, and for applying the predicted coefficients to the predicted origins and destinations. Another routine allows a comparison of the predicted trip distribution with the observed trip distribution.
Mode Split
- The predicted number of trips for each zone-to-zone pair can be split into likely travel modes using an accessibility function that approximates the utility of one mode relative to the others.
Network Assignment
- Finally, the predicted trips from each zone to every other zone by travel mode are assigned to a likely route based on the shortest path algorithm. The output includes the likely routes taken for each origin-destination zone pair and the total volume of trips on network links. This step requires a travel network, one for each travel mode. There are additional utilities for calculating transit networks from station/stop locations and for testing for one-way streets.
Options
Parameters
can be saved and re-loaded.
Tab colors
can be changed.
Monte Carlo simulation
data can be output.
CrimeStat,
is accompanied by sample datasets and a manual that gives the background behind the statistics and examples. The manual also discusses applications of
CrimeStat
developed by other analysts and researchers. The program and sample data sets are in Windows-based zipped files that can be downloaded. The manual is a set of individual chapters in PDF files. They can be viewed online or downloaded. If downloading the PDF chapters separately, they should be saved into the same directory as the
CrimeStat
program. If the PDF file names are not renamed, they can be accessed directly from the program's help menu.
CrimeStat Libraries
The CrimeStat Libraries (version 1.0) are component objects that allow for the functions of CrimeStat to be programmed directly into custom software or systems. The CrimeStat Libraries include all of the routines that were developed through version 2.0 of the regular CrimeStat program, including spatial description, hot spot analysis, and kernel density interpolation routines. Additional spatial autocorrelation routines have been included. The libraries can input dbf, shape, and Ascii text files and can output to shape file, MIF/MID files, ASCII text files, and KML files.
2023-03-30
10.
The Mapping and Analysis for Public Safety (MAPS) Program in
conjunction with the National Law Enforcement, Corrections and Technology
Center - Southeast (NLECTC-SE) in Charleston, South Carolina, announce the
free download of a CrimeStat workbook designed specifically for crime
analysts in the use of CrimeStat III. The data used in the workbook are
also provided. Further, a PowerPoint file covering the workbook and all
lessons is provided for download for those wanting to instruct a class.
CrimeStat III is a Windows-based spatial statistics software package used
for analyzing crime data from law enforcement and criminal justice
agencies. Output produced from the software can be used with a geographic
information system (GIS) to support and enhance the tactical and strategic
analysis efforts of police departments. The workbook covers how to prepare
data for CrimeStat, produce results and import them into ArcGIS 9.x for
further analysis or presentation. It also covers entering data into
CrimeStat III, basic descriptive statistics from Spatial Distribution,
measures of clustering in Distance Analysis, several 'Hot Spot' techniques,
and using both single and dual Kernel Density Interpolation. Upon
completion of the workbook and exercises, users are able to immediately
make use of CrimeStat at their own agencies in the analysis of crime
patterns and trends.
2008-10-16
11.
This data collection contains the DICTION program,
a multi-option, high-speed, content-analysis program that retrieves
cognitive, affective, and decisional data from speeches, documents,
or archival materials. This computer analysis of textual themes by
cluster-analysis technique is designed for use with Robert North
et al., BRITISH SPEECHES, 1870-1914, AND GERMAN SPEECHES, 1871-1912
(ICPSR 5902). DICTION is used to produce word-frequency dictionaries,
to substitute equivalent words into and delete unwanted words from
the text, and to count the co-occurrences of pairs of specified
keywords in text input. DICTION also includes routines to delete
common English suffixes from text words. It is written in Fortran
IV for use with the IBM H Compiler (OPT = 2).
1992-02-16
12.
Problem Behaviors in Maltreated Children and Youth: Influential Child, Peer, and Caregiver Characteristics, 1999-2000 [United States] (ICPSR 4258)
Wall, Ariana E.
Wall, Ariana E.
This project examined the problem behaviors of maltreated
children and adolescents and the predictors of changes in behavior
over an 18-month period. Problem behaviors included aggression,
delinquency, risky sexual practices, substance abuse, and suicidal
behaviors. The project used data from the National Survey of Child and
Adolescent Well-Being (NSCAW), a national probability survey of
children assessed following a child maltreatment report. This
collection consists of SAS code used to produce subsets of the NSCAW
data and the analyses for three chapters of the project's final
report. Chapter 2 examined aggression and changes in behavior over 18
months for children aged six to ten years at the time of the baseline
interview. Chapter 3 examined self-reported delinquency and
caregiver-reported aggressive and delinquent behavior and changes in
behavior over 18 months for youth aged 11 to 15 years at the time of
the baseline interview. Chapter 4 examined risky behavior changes
(risky sexual behavior, substance abuse, and suicidal risk behavior)
over 18 months for youth aged 11 to 15 years at the time of the
baseline interview.
2005-07-06
13.
This data collection contains a revised version of the
Simple Diplomatic Game, one of the first all-computer simulations
in the international relations field developed by Oliver Benson
in 1959. It represents an early attempt to articulate a number of
"loose" assumptions about international behavior into a set of
computer instructions such that high-speed computing equipment can
be used to simulate a variety of international crises situations.
The earlier computer simulation program is reconstructed in this
study for 25 nations in 1965 for the purpose of examining the
advantages and disadvantages inherent in these simulations and
gauging what might be expected of computer simulation methodology
in general. The main data matrix contains nine categories of
indicators of natural and technical resources used in computing
the war potential of each nation, values for nine indicators of
aggressiveness used for computing the propensity-to-act index, a
numeric code (0-4) indicating alliance membership, a one or zero
indicating the nuclear or non-nuclear status of each country, a
tally of losses suffered by each coalition member as a result of
an unsuccessful initiative on the part of the coalition leader, a
statistic for total exports and imports for each country, degrees
of longitude for a major industrial area in each country, and
degrees of latitude for these industrial areas. Benson's simulation
is reprogrammed in this collection in BASIC computer language for
use in an on-line, time-sharing environment. Seven additional
nations were added and the database for all nations was updated.
2006-01-18
14.
Regional Crime Analysis Geographic Information System (RCAGIS) (ICPSR 3372)
United States Department of Justice. Criminal Division Geographic Information Systems Staff. Baltimore County Police Department
United States Department of Justice. Criminal Division Geographic Information Systems Staff. Baltimore County Police Department
The Regional Crime Analysis GIS (RCAGIS) is an
Environmental Systems Research Institute (ESRI) MapObjects-based
system that was developed by the United States Department of Justice
Criminal Division Geographic Information Systems (GIS) Staff, in
conjunction with the Baltimore County Police Department and the
Regional Crime Analysis System (RCAS) group, to facilitate the
analysis of crime on a regional basis. The RCAGIS system was designed
specifically to assist in the analysis of crime incident data across
jurisdictional boundaries. Features of the system include: (1) three
modes, each designed for a specific level of analysis (simple queries,
crime analysis, or reports), (2) wizard-driven (guided) incident
database queries, (3) graphical tools for the creation, saving, and
printing of map layout files, (4) an interface with CrimeStat spatial
statistics software developed by Ned Levine and Associates for
advanced analysis tools such as hot spot surfaces and ellipses, (5)
tools for graphically viewing and analyzing historical crime trends in
specific areas, and (6) linkage tools for drawing connections between
vehicle theft and recovery locations, incident locations and suspects'
homes, and between attributes in any two loaded shapefiles. RCAGIS
also supports digital imagery, such as orthophotos and other raster
data sources, and geographic source data in multiple
projections. RCAGIS can be configured to support multiple incident
database backends and varying database schemas using a field mapping
utility.
2002-05-29
15.
RF Fingerprinting for Contraband Wireless Devices Identification, Detection and Tracking in Correctional Facilities, Starkville, Mississippi, 2020-2022 (ICPSR 38650)
Tang, Bo; Ball, John E.; Young, Maxwell
Tang, Bo; Ball, John E.; Young, Maxwell
The growing use of contraband wireless devices, particularly cell phones, smuggled in correctional facilities, is a significant problem across the country. Inmates behind bars may use these devices to organize gang activities, run drug operations, and even plan escapes, which may threaten the safety and welfare of other inmates, prison employees and the general public. To combat the use of contraband cell phones, some radio-based technologies have been investigated, which primarily fall into the following three categories:
radio jamming systems which disrupt the communication link between the wireless device and the transceiver outside of the prison by continuously transmitting on the same radio frequencies as the contraband wireless device, and thus make the device unusable behind bars;
managed access systems (MAS) which build a private micro-cellular network over the whole facility in which all radio transmissions to carrier networks, e.g., calls or messages originating from inside or outside prisons, are captured, and only those authorized transmissions from and/or to a "white list" of preregistered wireless devices are allowed; and
passive detection systems which identify and localize various sources of unapproved wireless transmissions from prisons.
It has been known that a jamming system may interfere with authorized calls including public safety communications (e.g., 9-1-1 calls), particularly when multiple frequency bands are involved, and a MAS is usually prohibitively expensive in its installation and operation due to the needs of covering many different commercial networks and frequency bands with an optimized footprint. In contrast, the detection system offers a passive solution in that detection systems do not transmit any radio signals and thus do not interfere with other transmissions. Therefore, the overall objective of this project is to develop an effective and low-cost contraband interdiction system (CIS) for identifying, localizing, and tracking unauthorized wireless devices such as cell phones and WiFi devices in correctional facilities, through the use and development of advanced machine learning algorithms for fingerprinting radio frequency (RF) signals originating from an unauthorized wireless device.
2023-07-13
16.
This collection of computer programs and test data files
was compiled by the Census Bureau for use with GEOGRAPHIC BASE
FILE/DUAL INDEPENDENT MAP ENCODING (GBF/DIME), 1980 (ICPSR 8378). This
collection consists of files grouped into five categories: Special
Program Information Tape (SPIT) Datasets, UNIMATCH System Datasets,
ADMATCH System Datasets, EASYMAP System Datasets, and EASYCORD System
Datasets. Some of the capabilities of the programs in this collection
include: mapping files for which complicated data manipulation is
required, generating individualized lists of candidates for carpools,
linking of records on the basis of street address, creating shaded
area maps for statistical display, and producing a map coordinate
system.
2006-01-12
17.
Trends in Substance Abuse and Treatment Needs Among Inmates in the United States, 1996-1997 (ICPSR 3714)
Belenko, Steven
Belenko, Steven
This data collection consists of the SPSS syntax used to
recode existing variables and create new variables from the SURVEY OF
INMATES OF LOCAL JAILS, 1996 [ICPSR 6858] and the SURVEY OF INMATES IN
STATE AND FEDERAL CORRECTIONAL FACILITIES, 1997 [ICPSR 2598]. Using
the data from these two national surveys on jail and prison inmates,
this study sought to expand the analyses of these data in order to
fully explore the relationship between type and intensity of substance
abuse and other health and social problems, analyze access to
treatment and services, and make estimates of the need for different
types of treatment services in correctional systems.
2006-01-18
18.
Union Army Recruits in Black Regiments in the United States, 1862-1865: [Instructional Materials] (ICPSR 3466)
Oberly, James W.
Oberly, James W.
These instructional materials were prepared for use with
UNION ARMY RECRUITS IN BLACK REGIMENTS IN THE UNITED STATES, 1862-1865
(ICPSR 9426), compiled by Jacob Metzer and Robert A. Margo. The data
file and accompanying documentation are provided to assist educators
in instructing students about the demographic, military, and medical
history of African-American men who volunteered for service in the
Union Army during the American Civil War. An instructor's handout has
also been included. This handout contains the following sections,
among others: (1) General goals for student analysis of quantitative
datasets, (2) Specific goals in studying this dataset, (3) Suggested
appropriate courses for use of the dataset, (4) Tips for using the
dataset, and (5) Related secondary source readings. This data
collection was designed to examine the characteristics of free Blacks
and ex-slaves mustered into the Union Army between 1862 and the end of
the Civil War. In addition to variables on personal characteristics
(such as skin, eye, and hair color, height, age, birthplace, and
occupation before enlistment), the data also contain Army-related
variables (such as regiment and company number, rank, enlistment date
and place, changes in rank, and date and cause of end of service).
2004-02-27
19.
Violence Against Women: Developmental Antecedents Among Black, Caucasian, and Hispanic Women in the United States, 1987-1988 and 1992-1994 (ICPSR 3293)
Jasinski, Jana L.
Jasinski, Jana L.
The aim of this study was to examine the factors related to
different patterns of male violence against women. Employing both
intra-individual and sociocultural perspectives, the project focused
on the relationship between violence against women and previously
established risk factors for intimate partner violence including
stressors related to work, economic status, and role transitions
(e.g., pregnancy), as well as family power dynamics, status
discrepancies, and alcohol use. The following research questions were
addressed: (1) To what extent do Caucasian, Black, and Hispanic
individuals engage in physical violence with their partners? (2) How
are socioeconomic stressors associated with violent relationships
among Caucasian, Black, and Hispanic couples? (3) To what extent are
changes in patterns of physical violence against women associated with
different stages of a relationship (e.g., cohabitation, early
marriage, pregnancy, marriage)? (4) To what extent do culturally
linked attitudes about family structure (family power dynamics)
predict violence among Caucasian, Black, and Hispanic couples? (5) To
what extent do family strengths and support systems contribute to the
cessation of violence among Caucasian, Black, and Hispanic couples?
(6) What is the role of alcohol use in violent relationships among
Caucasian, Black, and Hispanic couples? The data used for this project
came from the first and second waves of the National Survey of
Families and Households (NSFH) conducted by the Center for Demography
and Ecology at the University of Wisconsin-Madison [NATIONAL SURVEY OF
FAMILIES AND HOUSEHOLDS: WAVE I, 1987-1988, AND WAVE II, 1992-1994
(ICPSR 6906)]. The NSFH was designed to cover a broad range of family
structures, processes, and relationships with a large enough sample to
permit subgroup analysis. For the purposes of this study, the
analytical sample focused on only those couples who were cohabiting or
married at the time of the first wave of the study and still with the
same person at the time of the second wave (N=3,584). Since the study
design included oversamples of previously understudied groups (i.e.,
Blacks, Mexicans, Puerto Ricans), racial and ethnic comparisons were
possible. In both waves of the NSFH several identical questions were
asked regarding marital conflicts. Both married and cohabiting
respondents were asked how often they used various tactics including
heated arguments and hitting or throwing things at each other to
resolve their conflicts. In addition, respondents were asked if any of
their arguments became physical, how many of their fights resulted in
either the respondent or their partner hitting, shoving, or throwing
things, and if any injuries resulted as a consequence of these
fights. This data collection consists of the SPSS syntax used to
recode variables from the original NSFH dataset. In addition, new
variables, including both composite variables (e.g., self-esteem,
hostility, depression) and husband and wife versions of the variables
(using information from both respondent and partner), were
constructed. New variables were grouped into the following categories:
demographic, personality, alcohol and drug use, relationship stages,
gender role attitudes, division of labor, fairness in household
chores, social support, and isolation. Psychological well-being scales
were created to measure autonomy, positive relations with others,
purpose in life, self-acceptance, environmental mastery, and personal
grow,th. Additional scales were created to measure relationship
conflict, sex role gender attitudes, personal mastery, alcohol use,
and hostility. The Rosenberg Self Esteem Scale and the Center for
Epidemiological Studies Depression Scale (CES-D) were also utilized.
2002-05-14
20.
This study contains a user-oriented computer module
that focuses on 1,951 situations, decisions, and events relative to
seven issue areas that emerged from the interactions of ten nations:
China, Egypt, France, West Germany, East Germany, the Soviet Union,
Israel, Syria, the United Kingdom, and the United States. The module
was developed to explicate a number of propositions about war and
peace between nations and to combine these propositions into an
operating model of an international relations system. It is intended
to serve as a technical companion to and provide supplementary flow
charts and program listings for the War-Peace module developed in
Jeffrey A. Krend's "War and Peace in the International System:
Deriving an All-Computer Heuristic." Actors were assessed for their
response to perceived threats in either a cooperative or hostile
manner relative to each issue in seven key issue areas: German
reunification, Israeli survival, Soviet leadership in the communist
world, military support for Egypt, national survival and development,
international cooperation, and big power hegemony. In addition,
the technical aspects of the model were generalized into design
criteria for simulations of large-scale social systems in general.
1992-02-16