SlideShare a Scribd company logo
1 of 29
Download to read offline
LOGO

A Comparative Study of Data
Mining Methods to Analyzing
Libyan National Crime Data
Presented by:
Dr.Zakaria Suliman Zubi
Associate Professor
Computer Science Department
Faculty of Science
Sirte University
Sirte, Libya
Contents

www.themegallery.com

 Abstract.
 Introduction.
 Data Mining Categories.
 Why Analyze Crime?
 Data Mining Task.
 Data Set.
 The MLCR Proposed Model.
 Comparison Between Algorithms Used.
 Conclusion.
Company Logo
Abstract
 Law enforcement agencies represented in the police today faced a
large volume of data every day. These data can be processed and
transformed into useful information. In this since, Data mining can be
applied to greatly improve crime analysis. Which can help to reduce
and preventing crime as much as possible.
 Crime reports and data are used as an input for the formulation of the
crime prevention policies and strategic plans.

www.themegallery.com

 This work will apply some data mining methods to analyses Libyan
national criminal record data to help the Libyan government to make
a strategically decision regarding prevention the increasing of the high
crime rate these days.
 The data was collected manually from Benghazi, Tripoli, and AlJafara Supremes Security Committee (SSC).
 Our proposed model will be able to extract crime patterns by using
association rule mining and clustering to classify crime records on the
basis of the values of crime attributes.
 A comparison between both algorithms was discussed in this work as
well.
Company Logo
www.themegallery.com
Contents

www.themegallery.com

 Abstract.
 Introduction.
 Data Mining Categories.
 Why Analyze Crime?
 Data Mining Task.
 Data Set.
 The MLCR Proposed Model.
 Comparison Between Algorithms Used.
 Conclusion.
Company Logo
Introduction
 Data Mining or Knowledge Discovery in Databases (KDD) in simple
words is nontrivial extraction of implicit, previously unknown, and
potentially useful information from data.
 KDD is the process of identifying a valid, potentially, useful and
ultimately understandable structure in data..

www.themegallery.com

 Crime analyzes is an emerging field in law enforcement without
standard definitions. This makes it difficult to determine the crime
analyzes focus for agencies that are new to the field.
 Crime analysis is act of analyzing crime. More specifically, crime
analysis is the breaking up of acts committed in violation of laws into
their parts to find out their nature and reporting, some analysis.
 The role of the crime analysts varies from agency to agency.
Statement of these findings, The objective of most crime analysis is to
find meaningful information in vast amounts of data and disseminate
this information to officers and investigators in the field to assist in
their efforts to apprehend criminals and suppress criminal activity.
Company Logo
Contents

www.themegallery.com

 Abstract.
 Introduction.
 Data Mining Categories.
 Why Analyze Crime?
 Data Mining Task.
 Data Set.
 The MLCR Proposed Model.
 Comparison Between Algorithms Used.
 Conclusion.
Company Logo
Data Mining Categories
 The Data Mining models are categorized into different leaves. Further,
each leaf signifies the relationship, if any, that is highlighted from the
database. The Data Mining Models can be put into one of the six main
categories: 1) Association, 2) Classification, 3) Clustering, 4)

www.themegallery.com

Prediction, 5) Sequence Discovery, and 6) Generalization

Company Logo
www.themegallery.com
data Mining Categories Cont…
 Table 2 classifies the various Data Mining algorithms according to
problem type, namely, Association, Classification, Clustering,

www.themegallery.com

Prediction, Discovery, and Summarization.

Company Logo
www.themegallery.com
data Mining Categories Cont…

www.themegallery.com

 Cont….

Company Logo
www.themegallery.com
Contents

www.themegallery.com

 Abstract.
 Introduction.
 Data Mining Categories.
 Why Analyze Crime?

 Data Mining Task.
 Data Set.
 The MLCR Proposed Model.
 Comparison Between Algorithms Used.
 Conclusion.
Company Logo
Why Analyze Crime?
Crime Analysts usually tend to justify their existence as crime analysts in
what is known as law enforcement agency. It makes sense to analyze
crime. Some good reasons are listed as follow:
1. Analyze crime to inform law enforcers about general and specific crime
trends, patterns, and series in an ongoing, timely manner.
2. Analyze crime to take advantage of the abundance of information existing in
law enforcement agencies, the criminal justice system, and public domain.
3. Analyze crime to maximize the use of limited law enforcement resources.

www.themegallery.com

4. Analyze crime to have an objective means to access crime problems locally,
regionally, nationally within and between law enforcement agencies.
5. Analyze crime to be proactive in detecting and preventing crime.
6. Analyze crime to meet the law enforcement needs of a changing society.

Company Logo
www.themegallery.com
www.themegallery.com

Why Analyze Crime? Cont…
 In general there are four different techniques
for analyzing crimes, as follow:
1. Linkage Analysis
2. Statistical Analysis
3. Profiling
4. Spatial Analysis
 Each of the above techniques has its own
advantages and drawbacks and can be used
in specific cases.
Company Logo
www.themegallery.com
Contents

www.themegallery.com

 Abstract.
 Introduction.
 Data Mining Categories.
 Why Analyze Crime?
 Data Mining Task.

 Data Set.
 The MLCR Proposed Model.
 Comparison Between Algorithms Used.
 Conclusion.
Company Logo
Data Mining Task
A. Data collection Phase.
In this phase, the dataset that we used as training and testing
data were extracted from the police departments. These data
contain data about both Crimes and Criminals with the following
main attributes:

1.
2.

Crime ID: Individual crimes are designated by unique crime id.
Crime type: indicates crime type.

www.themegallery.com

3.

Date: Indicate when a crime happened.

4.

Gender: Male or Female.

5.

Age: age of individual Criminal.

6.

Crime Address: location of the crime.

7.

Marital status: status of the Criminal.

Figure2: Raw Data
Company Logo
www.themegallery.com
Data Mining Task Cont…
B. Data Preprocessing


Real world usually have the following drawbacks:
Incompleteness, Noisy, and Inconsistence. So these data need to

be preprocessed to get the data suitable for analysis purpose. The
preprocessing includes the following tasks :
1. Data cleaning.

www.themegallery.com

2. Data integration
3. Data transformation.
4. Data reduction.
Figure (3): attributes for crime and criminal. It also shows the distribution of
5. Data discretization.
offenses versus different crime and criminal attributes.
Company Logo
www.themegallery.com
Contents

www.themegallery.com

 Abstract.
 Introduction.
 Data Mining Categories.
 Why Analyze Crime?
 Data Mining Task.
 Data Set.

 The MLCR Proposed Model.
 Comparison Between Algorithms Used.
 Conclusion.
Company Logo
Data Set
We will consider crime database as a training dataset
used in our model. The mentioned database contains a
real data values from crime and criminal attributes. We
will also consider 70 percent as training value of the
proposed model and 30 percent for testing. The
www.themegallery.com

following table shows the data we used in our model.

Company Logo
www.themegallery.com
Contents

www.themegallery.com

 Abstract.
 Introduction.
 Data Mining Categories.
 Why Analyze Crime?
 Data Mining Task.
 Data Set.
 The MLCR Proposed Model.

 Comparison Between Algorithms Used.
Company Logo
The MLCR proposed model
The Mining Libyan Criminal Record (MLCR) proposed model will be implemented to conduct and interact with two types of mining algorithms to overcome with two
different types of results effectively. Those two approaches are considered as a sub-prototypes of the proposed MLCR model. Those prototypes will be illustrated as follows:
A. ining Libyan Criminal Record-using Association rules (MLCR-AR).
M

www.themegallery.com

B.Mining Libyan Criminal Record-using Clustering (MLCR-C).

Company Logo
www.themegallery.com
The MLCR proposed model Cont…
A. Mining Libyan Criminal Record-using
Association rules (MLCR-AR).
 Association rule mining is a method used to generate rules from
crime dataset based on frequents occurrence of patterns to help the
decision makers of our security society to make a prevention
action.

www.themegallery.com

 One of the most popular algorithm are called Apriori and FPgrowth Association rule mining classically intends at discovering
association between items in a transactional database.
 The Apriori algorithm called also as “Sequential Algorithm”
developed by [Agrawal1994]. Is a great accomplishment in the
history of mining association rules[Cheung1996c]. It is also the
most well known association rules algorithm. This technique uses
to perform association analyze on the attributes of crimes.
Company Logo
www.themegallery.com
The MLCR proposed model Cont…

www.themegallery.com

1. MARRIED=NO Apriori Algorithm we’ve got the following [0] conv:
After applying the12 ==> GENDER=M 12<conf:(1)> lift:(1) lev:(0)results:
(0)
Apriori
2.CRIMEADDRESS=TRIPOLI 5 ==> GENDER=M 5 <conf:(1)> lift:(1) lev:
======
(0) [0] conv:(0) support: 0.3 (4 instances)
Minimum
3. CRIMEADDRESS=TRIPOLI 5 0.9 MARRIED=NO 5 <conf:(1)> lift:
Minimum metric <confidence>: ==>
(1.08) lev:(0.03) [0] conv:(0.38)
Number of cycles performed: 14
4.CRIMEADDRESS=TRIPOLI MARRIED=NO 5 ==> GENDER=M 5 <conf:
Generated sets of large itemsets:
(1)> lift:(1) lev:(0) [0] conv:(0)
Size of set of large itemsets L(1): 5
5. CRIMEADDRESS=TRIPOLI GENDER=M 5 ==> MARRIED=NO 5
Size of set of large itemsets [0] conv:(0.38)
<conf:(1)> lift:(1.08) lev:(0.03) L(2): 6
Size of set of large itemsets L(3): 2
6. CRIMEADDRESS=TRIPOLI 5 ==> GENDER=M MARRIED=NO 5
Best rules found:
<conf:(1)> lift:(1.08) lev:(0.03) [0] conv:(0.38)
7. CRIMEADDRESS=BENGHAZI 4 ==> GENDER=M 4 <conf:(1)> lift:(1)
lev:(0) [0] conv:(0)
8. CRIMEADDRESS=JAFARA 4 ==> GENDER=M 4 <conf:(1)> lift:(1) lev:
(0) [0] conv:(0)
9. CRIMEADDRESS=JAFARA 4 ==> MARRIED=NO 4 <conf:(1)> lift:
(1.08) lev:(0.02) [0] conv:(0.31)
10. CRIMEADDRESS=JAFARA MARRIED=NO 4 ==> GENDER=M 4
<conf:(1)> lift:(1) lev:(0) [0] conv:(0)
Company Logo
www.themegallery.com
The MLCR proposed model Cont…
B. Mining Libyan Criminal Record-using Clustering
(MLCR-C).


This prototype will use the same dataset indicated in MLCR_AR
prototype. But with Clustering Analysis.

Clustering is the technique that is used to group objects (crime and
K-mean algorithm clusters the data members groups
criminals) without having predefined specification for their attributes.
were m is predefined. Input-Crime type. Number of
 clusters, Number unsupervised classification: no predefined classes. Simple KClustering is of Iteration Initial seeds might
means important role in the final results.
produce anclustering algorithm is used in this work.

www.themegallery.com



Step1: Randomly choose cluster centers.
Step2: Assign instance to cluster based on their
Distance to the cluster centers.
Step3: Centers of clusters are adjusted.
Step4: go to Step1 until convergence.
Step5: output X0 ,X1,X2 ,X3.

Fig4: criminal age vs. Number of crimes After
applying K-means algorithm

Company Logo
www.themegallery.com
The MLCR proposed model Cont…

www.themegallery.com

After Applying K-means Algorithm we’ve got this result
 === Clustering model (full training set) ===
 K-Means======
 Number of iterations: 3
 Within cluster sum of squared errors: 43.0
 Missing values globally replaced with mean/mode













Cluster centroids:



Time taken to build model (full training data) : 0 seconds



=== Model and evaluation on training set ===



Clustered Instances




0
1

Cluster#
Attribute
Full Data
0
1
(13)
(9)
(4)
===================================================
CRIMEID
13
13
65
CRIMETYPE
MOLESTATION MOLESTATION
DACOITY
CRIMEADDRESS
TRIPOLI JAFARA
TRIPOLI
CRIMEDATE
12OCT12 05NOV12
12OCT12
GENDER
M
M
M
MARRIED
NO
NO
NO
AGE
19
19
30

9 ( 69%)
4 ( 31%)

Company Logo
www.themegallery.com
Contents

www.themegallery.com

 Abstract.
 Introduction.
 Data Mining Categories.
 Why Analyze Crime?
 Data Mining Task.
 Data Set.
 The MLCR Proposed Model.
 Comparison Between Algorithms Used.

 Conclusion.

Company Logo
A comparison between both algorithms
K-MEAN Algorithm

Aprioir Algorithm

Clustering techniques by using K-

Association rules by using Aprioir
algorithm mine frequent data

into classes based on

patterns by treating them as rules.

characteristics like age, gender.

The recognized benefits include an

For example, we can identify

improvement in the accuracy of

suspect and analyze those conduct

results over current semi-manual

crimes in similar fashion or the
www.themegallery.com

mean algorithm group data items

Processes and a reduction in the

same manner.

time taken to achieve those results
.

Company Logo
www.themegallery.com
www.themegallery.com

Contents

 Abstract.
 Introduction.
 Data Mining Categories.
 Why Analyze Crime?
 Data Mining Task.
 Data Set.
 The MLCR Proposed Model.
 Comparison Between Algorithms Used.
 Conclusion.

Company Logo
Conclusion



Clustering and association rules were defined as a data mining techniques to
automatically retrieve, extract and evaluate information for knowledge




discovery from crime data.
This information was collected from many police department.

Association rules Mining is one of the data mining techniques for data to be
used to identify the relationship and to generate rules from crime dataset based
on frequents occurrence of patterns to help the decision makers of our security
society to make a prevention action.

www.themegallery.com



Clustering is one of the data mining techniques also used to group objects
(crime and criminals) without having predefined specification for their
attributes.



The algorithms such as K-means algorithm and Aproir algorithm are used in
this paper.


Those algorithms were expressed in details and a comparative study were
Company Logo
www.themegallery.com
Thank you !!!
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime Data

More Related Content

What's hot

Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction SystemBigDataCloud
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET Journal
 
Crime prediction-using-data-mining
Crime prediction-using-data-miningCrime prediction-using-data-mining
Crime prediction-using-data-miningmohammed albash
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime PredictionProdapt Solutions
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalAashri Tandon
 
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...ijaia
 
Machine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern DetectionMachine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern DetectionAPNIC
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisIOSR Journals
 
Crime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningCrime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningAnavadya Shibu
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crimeJim Gilmer
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticseSAT Journals
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesHeta Parekh
 
IRJET- Crime Prediction System
IRJET-  	  Crime Prediction SystemIRJET-  	  Crime Prediction System
IRJET- Crime Prediction SystemIRJET Journal
 
Database and Analytics Programming - Project report
Database and Analytics Programming - Project reportDatabase and Analytics Programming - Project report
Database and Analytics Programming - Project reportsarthakkhare3
 
Crime prediction based on crime types
Crime prediction based on crime typesCrime prediction based on crime types
Crime prediction based on crime typesIJDKP
 

What's hot (20)

Crime Analysis & Prediction System
Crime Analysis & Prediction SystemCrime Analysis & Prediction System
Crime Analysis & Prediction System
 
U24149153
U24149153U24149153
U24149153
 
CRIME DETECTION
CRIME DETECTIONCRIME DETECTION
CRIME DETECTION
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data Analytics
 
Crime prediction-using-data-mining
Crime prediction-using-data-miningCrime prediction-using-data-mining
Crime prediction-using-data-mining
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime Prediction
 
Chicago Crime Dataset Project Proposal
Chicago Crime Dataset Project ProposalChicago Crime Dataset Project Proposal
Chicago Crime Dataset Project Proposal
 
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
 
Machine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern DetectionMachine Learning Approaches for Crime Pattern Detection
Machine Learning Approaches for Crime Pattern Detection
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
Crime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data MiningCrime Data Analysis, Visualization and Prediction using Data Mining
Crime Data Analysis, Visualization and Prediction using Data Mining
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crime
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
 
Crime analysis
Crime analysisCrime analysis
Crime analysis
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
 
Crime
CrimeCrime
Crime
 
IRJET- Crime Prediction System
IRJET-  	  Crime Prediction SystemIRJET-  	  Crime Prediction System
IRJET- Crime Prediction System
 
Database and Analytics Programming - Project report
Database and Analytics Programming - Project reportDatabase and Analytics Programming - Project report
Database and Analytics Programming - Project report
 
Crime prediction based on crime types
Crime prediction based on crime typesCrime prediction based on crime types
Crime prediction based on crime types
 

Viewers also liked

Data mining slides
Data mining slidesData mining slides
Data mining slidessmj
 
Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Zakaria Zubi
 
I- Extended Databases
I- Extended DatabasesI- Extended Databases
I- Extended DatabasesZakaria Zubi
 
Data Mining In Market Research
Data Mining In Market ResearchData Mining In Market Research
Data Mining In Market Researchkevinlan
 
A comparative analysis of predictve data mining techniques
A comparative analysis of predictve data mining techniquesA comparative analysis of predictve data mining techniques
A comparative analysis of predictve data mining techniquesMintu246
 
Arabic Text mining Classification
Arabic Text mining Classification Arabic Text mining Classification
Arabic Text mining Classification Zakaria Zubi
 
Data mining java titles adrit solutions
Data mining java titles adrit solutionsData mining java titles adrit solutions
Data mining java titles adrit solutionsAdrit Techno Solutions
 
Ieee 2010 java data mining projects sbgc
Ieee 2010 java data mining projects sbgcIeee 2010 java data mining projects sbgc
Ieee 2010 java data mining projects sbgcSBGC
 
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data MiningAn Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data MiningWaqas Tariq
 
2014 IEEE JAVA DATA MINING PROJECT Data mining with big data
2014 IEEE JAVA DATA MINING PROJECT Data mining with big data2014 IEEE JAVA DATA MINING PROJECT Data mining with big data
2014 IEEE JAVA DATA MINING PROJECT Data mining with big dataIEEEMEMTECHSTUDENTSPROJECTS
 
IEEE 2014 JAVA DATA MINING PROJECTS Mining statistically significant co locat...
IEEE 2014 JAVA DATA MINING PROJECTS Mining statistically significant co locat...IEEE 2014 JAVA DATA MINING PROJECTS Mining statistically significant co locat...
IEEE 2014 JAVA DATA MINING PROJECTS Mining statistically significant co locat...IEEEFINALYEARSTUDENTPROJECTS
 
JavaDayKiev'15 Java in production for Data Mining Research projects
JavaDayKiev'15 Java in production for Data Mining Research projectsJavaDayKiev'15 Java in production for Data Mining Research projects
JavaDayKiev'15 Java in production for Data Mining Research projectsAlexey Zinoviev
 
IEEE Final Year Project Titles 2016-17 - Java - Data Mining
IEEE Final Year Project Titles 2016-17 - Java - Data MiningIEEE Final Year Project Titles 2016-17 - Java - Data Mining
IEEE Final Year Project Titles 2016-17 - Java - Data MiningCTech Projects
 
Data Mining - Classification Of Breast Cancer Dataset using Decision Tree Ind...
Data Mining - Classification Of Breast Cancer Dataset using Decision Tree Ind...Data Mining - Classification Of Breast Cancer Dataset using Decision Tree Ind...
Data Mining - Classification Of Breast Cancer Dataset using Decision Tree Ind...Sunil Nair
 
Predictive Analytics - An Overview
Predictive Analytics - An OverviewPredictive Analytics - An Overview
Predictive Analytics - An OverviewMachinePulse
 
Data Mining and Business Intelligence Tools
Data Mining and Business Intelligence ToolsData Mining and Business Intelligence Tools
Data Mining and Business Intelligence ToolsMotaz Saad
 

Viewers also liked (18)

Data mining slides
Data mining slidesData mining slides
Data mining slides
 
Data mining
Data miningData mining
Data mining
 
Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)
 
I- Extended Databases
I- Extended DatabasesI- Extended Databases
I- Extended Databases
 
Edi text
Edi textEdi text
Edi text
 
Data Mining In Market Research
Data Mining In Market ResearchData Mining In Market Research
Data Mining In Market Research
 
A comparative analysis of predictve data mining techniques
A comparative analysis of predictve data mining techniquesA comparative analysis of predictve data mining techniques
A comparative analysis of predictve data mining techniques
 
Arabic Text mining Classification
Arabic Text mining Classification Arabic Text mining Classification
Arabic Text mining Classification
 
Data mining java titles adrit solutions
Data mining java titles adrit solutionsData mining java titles adrit solutions
Data mining java titles adrit solutions
 
Ieee 2010 java data mining projects sbgc
Ieee 2010 java data mining projects sbgcIeee 2010 java data mining projects sbgc
Ieee 2010 java data mining projects sbgc
 
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data MiningAn Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
 
2014 IEEE JAVA DATA MINING PROJECT Data mining with big data
2014 IEEE JAVA DATA MINING PROJECT Data mining with big data2014 IEEE JAVA DATA MINING PROJECT Data mining with big data
2014 IEEE JAVA DATA MINING PROJECT Data mining with big data
 
IEEE 2014 JAVA DATA MINING PROJECTS Mining statistically significant co locat...
IEEE 2014 JAVA DATA MINING PROJECTS Mining statistically significant co locat...IEEE 2014 JAVA DATA MINING PROJECTS Mining statistically significant co locat...
IEEE 2014 JAVA DATA MINING PROJECTS Mining statistically significant co locat...
 
JavaDayKiev'15 Java in production for Data Mining Research projects
JavaDayKiev'15 Java in production for Data Mining Research projectsJavaDayKiev'15 Java in production for Data Mining Research projects
JavaDayKiev'15 Java in production for Data Mining Research projects
 
IEEE Final Year Project Titles 2016-17 - Java - Data Mining
IEEE Final Year Project Titles 2016-17 - Java - Data MiningIEEE Final Year Project Titles 2016-17 - Java - Data Mining
IEEE Final Year Project Titles 2016-17 - Java - Data Mining
 
Data Mining - Classification Of Breast Cancer Dataset using Decision Tree Ind...
Data Mining - Classification Of Breast Cancer Dataset using Decision Tree Ind...Data Mining - Classification Of Breast Cancer Dataset using Decision Tree Ind...
Data Mining - Classification Of Breast Cancer Dataset using Decision Tree Ind...
 
Predictive Analytics - An Overview
Predictive Analytics - An OverviewPredictive Analytics - An Overview
Predictive Analytics - An Overview
 
Data Mining and Business Intelligence Tools
Data Mining and Business Intelligence ToolsData Mining and Business Intelligence Tools
Data Mining and Business Intelligence Tools
 

Similar to A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime Data

Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...IJARIIT
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningIRJET Journal
 
IRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data MiningIRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data MiningIRJET Journal
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET Journal
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...gerogepatton
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisInvestigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisZhongLI28
 
A proposed model_for_cybercrime_detectio
A proposed model_for_cybercrime_detectioA proposed model_for_cybercrime_detectio
A proposed model_for_cybercrime_detectioHossam Al-Ansary
 
PhiKitA Phishing Kit Attacks Dataset for Phishing Websites Identification.docx
PhiKitA Phishing Kit Attacks Dataset for Phishing Websites Identification.docxPhiKitA Phishing Kit Attacks Dataset for Phishing Websites Identification.docx
PhiKitA Phishing Kit Attacks Dataset for Phishing Websites Identification.docxShakas Technologies
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting SystemIRJET Journal
 
Techniques for predicting dark web events focused on the delivery of illicit ...
Techniques for predicting dark web events focused on the delivery of illicit ...Techniques for predicting dark web events focused on the delivery of illicit ...
Techniques for predicting dark web events focused on the delivery of illicit ...IJECEIAES
 
Using machine learning algorithms to
Using machine learning algorithms toUsing machine learning algorithms to
Using machine learning algorithms tomlaij
 
A Machine Learning Approach For Emotions Classification
A Machine Learning Approach For Emotions ClassificationA Machine Learning Approach For Emotions Classification
A Machine Learning Approach For Emotions ClassificationJennifer Campbell
 
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET Journal
 
Chicago Crime Analysis
Chicago Crime AnalysisChicago Crime Analysis
Chicago Crime AnalysisTom Donoghue
 
Disadvantages Of Intelligence Led Policing
Disadvantages Of Intelligence Led PolicingDisadvantages Of Intelligence Led Policing
Disadvantages Of Intelligence Led PolicingChristina Ramirez
 
Improving misspelled word solving for human trafficking detection in online a...
Improving misspelled word solving for human trafficking detection in online a...Improving misspelled word solving for human trafficking detection in online a...
Improving misspelled word solving for human trafficking detection in online a...IJECEIAES
 
Improved Navigation Pattern By Association Rule Mining
Improved Navigation Pattern By Association Rule MiningImproved Navigation Pattern By Association Rule Mining
Improved Navigation Pattern By Association Rule MiningDiana Meza
 
FEATURE SELECTION-MODEL-BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM
FEATURE SELECTION-MODEL-BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM FEATURE SELECTION-MODEL-BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM
FEATURE SELECTION-MODEL-BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM cscpconf
 

Similar to A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime Data (20)

Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
Case.pptx
Case.pptxCase.pptx
Case.pptx
 
IRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data MiningIRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data Mining
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisInvestigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysis
 
A proposed model_for_cybercrime_detectio
A proposed model_for_cybercrime_detectioA proposed model_for_cybercrime_detectio
A proposed model_for_cybercrime_detectio
 
PhiKitA Phishing Kit Attacks Dataset for Phishing Websites Identification.docx
PhiKitA Phishing Kit Attacks Dataset for Phishing Websites Identification.docxPhiKitA Phishing Kit Attacks Dataset for Phishing Websites Identification.docx
PhiKitA Phishing Kit Attacks Dataset for Phishing Websites Identification.docx
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting System
 
Techniques for predicting dark web events focused on the delivery of illicit ...
Techniques for predicting dark web events focused on the delivery of illicit ...Techniques for predicting dark web events focused on the delivery of illicit ...
Techniques for predicting dark web events focused on the delivery of illicit ...
 
Using machine learning algorithms to
Using machine learning algorithms toUsing machine learning algorithms to
Using machine learning algorithms to
 
A Machine Learning Approach For Emotions Classification
A Machine Learning Approach For Emotions ClassificationA Machine Learning Approach For Emotions Classification
A Machine Learning Approach For Emotions Classification
 
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
 
Chicago Crime Analysis
Chicago Crime AnalysisChicago Crime Analysis
Chicago Crime Analysis
 
Disadvantages Of Intelligence Led Policing
Disadvantages Of Intelligence Led PolicingDisadvantages Of Intelligence Led Policing
Disadvantages Of Intelligence Led Policing
 
Improving misspelled word solving for human trafficking detection in online a...
Improving misspelled word solving for human trafficking detection in online a...Improving misspelled word solving for human trafficking detection in online a...
Improving misspelled word solving for human trafficking detection in online a...
 
Improved Navigation Pattern By Association Rule Mining
Improved Navigation Pattern By Association Rule MiningImproved Navigation Pattern By Association Rule Mining
Improved Navigation Pattern By Association Rule Mining
 
FEATURE SELECTION-MODEL-BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM
FEATURE SELECTION-MODEL-BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM FEATURE SELECTION-MODEL-BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM
FEATURE SELECTION-MODEL-BASED CONTENT ANALYSIS FOR COMBATING WEB SPAM
 

More from Zakaria Zubi

applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...Zakaria Zubi
 
Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases Zakaria Zubi
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
 
Applying web mining application for user behavior understanding
Applying web mining application for user behavior understandingApplying web mining application for user behavior understanding
Applying web mining application for user behavior understandingZakaria Zubi
 
Ibtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesIbtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesZakaria Zubi
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposesZakaria Zubi
 

More from Zakaria Zubi (9)

applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
 
Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
 
Ismail&&ziko 2003
Ismail&&ziko 2003Ismail&&ziko 2003
Ismail&&ziko 2003
 
Applying web mining application for user behavior understanding
Applying web mining application for user behavior understandingApplying web mining application for user behavior understanding
Applying web mining application for user behavior understanding
 
Model
ModelModel
Model
 
Ibtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesIbtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital images
 
Deep Web mining
Deep Web miningDeep Web mining
Deep Web mining
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposes
 

Recently uploaded

The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...Aggregage
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 
Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Alexander Turgeon
 
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...Daniel Zivkovic
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideHironori Washizaki
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IES VE
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Commit University
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Adtran
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDELiveplex
 
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdfPaige Cruz
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 

Recently uploaded (20)

The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
The Data Metaverse: Unpacking the Roles, Use Cases, and Tech Trends in Data a...
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 
Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024Valere | Digital Solutions & AI Transformation Portfolio | 2024
Valere | Digital Solutions & AI Transformation Portfolio | 2024
 
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
All in AI: LLM Landscape & RAG in 2024 with Mark Ryan (Google) & Jerry Liu (L...
 
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK GuideIEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
IEEE Computer Society’s Strategic Activities and Products including SWEBOK Guide
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
IESVE Software for Florida Code Compliance Using ASHRAE 90.1-2019
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)Crea il tuo assistente AI con lo Stregatto (open source python framework)
Crea il tuo assistente AI con lo Stregatto (open source python framework)
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™Meet the new FSP 3000 M-Flex800™
Meet the new FSP 3000 M-Flex800™
 
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDEADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
ADOPTING WEB 3 FOR YOUR BUSINESS: A STEP-BY-STEP GUIDE
 
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf99.99% of Your Traces  Are (Probably) Trash (SRECon NA 2024).pdf
99.99% of Your Traces Are (Probably) Trash (SRECon NA 2024).pdf
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 

A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime Data

  • 1. LOGO A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime Data Presented by: Dr.Zakaria Suliman Zubi Associate Professor Computer Science Department Faculty of Science Sirte University Sirte, Libya
  • 2. Contents www.themegallery.com  Abstract.  Introduction.  Data Mining Categories.  Why Analyze Crime?  Data Mining Task.  Data Set.  The MLCR Proposed Model.  Comparison Between Algorithms Used.  Conclusion. Company Logo
  • 3. Abstract  Law enforcement agencies represented in the police today faced a large volume of data every day. These data can be processed and transformed into useful information. In this since, Data mining can be applied to greatly improve crime analysis. Which can help to reduce and preventing crime as much as possible.  Crime reports and data are used as an input for the formulation of the crime prevention policies and strategic plans. www.themegallery.com  This work will apply some data mining methods to analyses Libyan national criminal record data to help the Libyan government to make a strategically decision regarding prevention the increasing of the high crime rate these days.  The data was collected manually from Benghazi, Tripoli, and AlJafara Supremes Security Committee (SSC).  Our proposed model will be able to extract crime patterns by using association rule mining and clustering to classify crime records on the basis of the values of crime attributes.  A comparison between both algorithms was discussed in this work as well. Company Logo www.themegallery.com
  • 4. Contents www.themegallery.com  Abstract.  Introduction.  Data Mining Categories.  Why Analyze Crime?  Data Mining Task.  Data Set.  The MLCR Proposed Model.  Comparison Between Algorithms Used.  Conclusion. Company Logo
  • 5. Introduction  Data Mining or Knowledge Discovery in Databases (KDD) in simple words is nontrivial extraction of implicit, previously unknown, and potentially useful information from data.  KDD is the process of identifying a valid, potentially, useful and ultimately understandable structure in data.. www.themegallery.com  Crime analyzes is an emerging field in law enforcement without standard definitions. This makes it difficult to determine the crime analyzes focus for agencies that are new to the field.  Crime analysis is act of analyzing crime. More specifically, crime analysis is the breaking up of acts committed in violation of laws into their parts to find out their nature and reporting, some analysis.  The role of the crime analysts varies from agency to agency. Statement of these findings, The objective of most crime analysis is to find meaningful information in vast amounts of data and disseminate this information to officers and investigators in the field to assist in their efforts to apprehend criminals and suppress criminal activity. Company Logo
  • 6. Contents www.themegallery.com  Abstract.  Introduction.  Data Mining Categories.  Why Analyze Crime?  Data Mining Task.  Data Set.  The MLCR Proposed Model.  Comparison Between Algorithms Used.  Conclusion. Company Logo
  • 7. Data Mining Categories  The Data Mining models are categorized into different leaves. Further, each leaf signifies the relationship, if any, that is highlighted from the database. The Data Mining Models can be put into one of the six main categories: 1) Association, 2) Classification, 3) Clustering, 4) www.themegallery.com Prediction, 5) Sequence Discovery, and 6) Generalization Company Logo www.themegallery.com
  • 8. data Mining Categories Cont…  Table 2 classifies the various Data Mining algorithms according to problem type, namely, Association, Classification, Clustering, www.themegallery.com Prediction, Discovery, and Summarization. Company Logo www.themegallery.com
  • 9. data Mining Categories Cont… www.themegallery.com  Cont…. Company Logo www.themegallery.com
  • 10. Contents www.themegallery.com  Abstract.  Introduction.  Data Mining Categories.  Why Analyze Crime?  Data Mining Task.  Data Set.  The MLCR Proposed Model.  Comparison Between Algorithms Used.  Conclusion. Company Logo
  • 11. Why Analyze Crime? Crime Analysts usually tend to justify their existence as crime analysts in what is known as law enforcement agency. It makes sense to analyze crime. Some good reasons are listed as follow: 1. Analyze crime to inform law enforcers about general and specific crime trends, patterns, and series in an ongoing, timely manner. 2. Analyze crime to take advantage of the abundance of information existing in law enforcement agencies, the criminal justice system, and public domain. 3. Analyze crime to maximize the use of limited law enforcement resources. www.themegallery.com 4. Analyze crime to have an objective means to access crime problems locally, regionally, nationally within and between law enforcement agencies. 5. Analyze crime to be proactive in detecting and preventing crime. 6. Analyze crime to meet the law enforcement needs of a changing society. Company Logo www.themegallery.com
  • 12. www.themegallery.com Why Analyze Crime? Cont…  In general there are four different techniques for analyzing crimes, as follow: 1. Linkage Analysis 2. Statistical Analysis 3. Profiling 4. Spatial Analysis  Each of the above techniques has its own advantages and drawbacks and can be used in specific cases. Company Logo www.themegallery.com
  • 13. Contents www.themegallery.com  Abstract.  Introduction.  Data Mining Categories.  Why Analyze Crime?  Data Mining Task.  Data Set.  The MLCR Proposed Model.  Comparison Between Algorithms Used.  Conclusion. Company Logo
  • 14. Data Mining Task A. Data collection Phase. In this phase, the dataset that we used as training and testing data were extracted from the police departments. These data contain data about both Crimes and Criminals with the following main attributes: 1. 2. Crime ID: Individual crimes are designated by unique crime id. Crime type: indicates crime type. www.themegallery.com 3. Date: Indicate when a crime happened. 4. Gender: Male or Female. 5. Age: age of individual Criminal. 6. Crime Address: location of the crime. 7. Marital status: status of the Criminal. Figure2: Raw Data Company Logo www.themegallery.com
  • 15. Data Mining Task Cont… B. Data Preprocessing  Real world usually have the following drawbacks: Incompleteness, Noisy, and Inconsistence. So these data need to be preprocessed to get the data suitable for analysis purpose. The preprocessing includes the following tasks : 1. Data cleaning. www.themegallery.com 2. Data integration 3. Data transformation. 4. Data reduction. Figure (3): attributes for crime and criminal. It also shows the distribution of 5. Data discretization. offenses versus different crime and criminal attributes. Company Logo www.themegallery.com
  • 16. Contents www.themegallery.com  Abstract.  Introduction.  Data Mining Categories.  Why Analyze Crime?  Data Mining Task.  Data Set.  The MLCR Proposed Model.  Comparison Between Algorithms Used.  Conclusion. Company Logo
  • 17. Data Set We will consider crime database as a training dataset used in our model. The mentioned database contains a real data values from crime and criminal attributes. We will also consider 70 percent as training value of the proposed model and 30 percent for testing. The www.themegallery.com following table shows the data we used in our model. Company Logo www.themegallery.com
  • 18. Contents www.themegallery.com  Abstract.  Introduction.  Data Mining Categories.  Why Analyze Crime?  Data Mining Task.  Data Set.  The MLCR Proposed Model.  Comparison Between Algorithms Used. Company Logo
  • 19. The MLCR proposed model The Mining Libyan Criminal Record (MLCR) proposed model will be implemented to conduct and interact with two types of mining algorithms to overcome with two different types of results effectively. Those two approaches are considered as a sub-prototypes of the proposed MLCR model. Those prototypes will be illustrated as follows: A. ining Libyan Criminal Record-using Association rules (MLCR-AR). M www.themegallery.com B.Mining Libyan Criminal Record-using Clustering (MLCR-C). Company Logo www.themegallery.com
  • 20. The MLCR proposed model Cont… A. Mining Libyan Criminal Record-using Association rules (MLCR-AR).  Association rule mining is a method used to generate rules from crime dataset based on frequents occurrence of patterns to help the decision makers of our security society to make a prevention action. www.themegallery.com  One of the most popular algorithm are called Apriori and FPgrowth Association rule mining classically intends at discovering association between items in a transactional database.  The Apriori algorithm called also as “Sequential Algorithm” developed by [Agrawal1994]. Is a great accomplishment in the history of mining association rules[Cheung1996c]. It is also the most well known association rules algorithm. This technique uses to perform association analyze on the attributes of crimes. Company Logo www.themegallery.com
  • 21. The MLCR proposed model Cont… www.themegallery.com 1. MARRIED=NO Apriori Algorithm we’ve got the following [0] conv: After applying the12 ==> GENDER=M 12<conf:(1)> lift:(1) lev:(0)results: (0) Apriori 2.CRIMEADDRESS=TRIPOLI 5 ==> GENDER=M 5 <conf:(1)> lift:(1) lev: ====== (0) [0] conv:(0) support: 0.3 (4 instances) Minimum 3. CRIMEADDRESS=TRIPOLI 5 0.9 MARRIED=NO 5 <conf:(1)> lift: Minimum metric <confidence>: ==> (1.08) lev:(0.03) [0] conv:(0.38) Number of cycles performed: 14 4.CRIMEADDRESS=TRIPOLI MARRIED=NO 5 ==> GENDER=M 5 <conf: Generated sets of large itemsets: (1)> lift:(1) lev:(0) [0] conv:(0) Size of set of large itemsets L(1): 5 5. CRIMEADDRESS=TRIPOLI GENDER=M 5 ==> MARRIED=NO 5 Size of set of large itemsets [0] conv:(0.38) <conf:(1)> lift:(1.08) lev:(0.03) L(2): 6 Size of set of large itemsets L(3): 2 6. CRIMEADDRESS=TRIPOLI 5 ==> GENDER=M MARRIED=NO 5 Best rules found: <conf:(1)> lift:(1.08) lev:(0.03) [0] conv:(0.38) 7. CRIMEADDRESS=BENGHAZI 4 ==> GENDER=M 4 <conf:(1)> lift:(1) lev:(0) [0] conv:(0) 8. CRIMEADDRESS=JAFARA 4 ==> GENDER=M 4 <conf:(1)> lift:(1) lev: (0) [0] conv:(0) 9. CRIMEADDRESS=JAFARA 4 ==> MARRIED=NO 4 <conf:(1)> lift: (1.08) lev:(0.02) [0] conv:(0.31) 10. CRIMEADDRESS=JAFARA MARRIED=NO 4 ==> GENDER=M 4 <conf:(1)> lift:(1) lev:(0) [0] conv:(0) Company Logo www.themegallery.com
  • 22. The MLCR proposed model Cont… B. Mining Libyan Criminal Record-using Clustering (MLCR-C).  This prototype will use the same dataset indicated in MLCR_AR prototype. But with Clustering Analysis. Clustering is the technique that is used to group objects (crime and K-mean algorithm clusters the data members groups criminals) without having predefined specification for their attributes. were m is predefined. Input-Crime type. Number of  clusters, Number unsupervised classification: no predefined classes. Simple KClustering is of Iteration Initial seeds might means important role in the final results. produce anclustering algorithm is used in this work. www.themegallery.com  Step1: Randomly choose cluster centers. Step2: Assign instance to cluster based on their Distance to the cluster centers. Step3: Centers of clusters are adjusted. Step4: go to Step1 until convergence. Step5: output X0 ,X1,X2 ,X3. Fig4: criminal age vs. Number of crimes After applying K-means algorithm Company Logo www.themegallery.com
  • 23. The MLCR proposed model Cont… www.themegallery.com After Applying K-means Algorithm we’ve got this result  === Clustering model (full training set) ===  K-Means======  Number of iterations: 3  Within cluster sum of squared errors: 43.0  Missing values globally replaced with mean/mode             Cluster centroids:  Time taken to build model (full training data) : 0 seconds  === Model and evaluation on training set ===  Clustered Instances   0 1 Cluster# Attribute Full Data 0 1 (13) (9) (4) =================================================== CRIMEID 13 13 65 CRIMETYPE MOLESTATION MOLESTATION DACOITY CRIMEADDRESS TRIPOLI JAFARA TRIPOLI CRIMEDATE 12OCT12 05NOV12 12OCT12 GENDER M M M MARRIED NO NO NO AGE 19 19 30 9 ( 69%) 4 ( 31%) Company Logo www.themegallery.com
  • 24. Contents www.themegallery.com  Abstract.  Introduction.  Data Mining Categories.  Why Analyze Crime?  Data Mining Task.  Data Set.  The MLCR Proposed Model.  Comparison Between Algorithms Used.  Conclusion. Company Logo
  • 25. A comparison between both algorithms K-MEAN Algorithm Aprioir Algorithm Clustering techniques by using K- Association rules by using Aprioir algorithm mine frequent data into classes based on patterns by treating them as rules. characteristics like age, gender. The recognized benefits include an For example, we can identify improvement in the accuracy of suspect and analyze those conduct results over current semi-manual crimes in similar fashion or the www.themegallery.com mean algorithm group data items Processes and a reduction in the same manner. time taken to achieve those results . Company Logo www.themegallery.com
  • 26. www.themegallery.com Contents  Abstract.  Introduction.  Data Mining Categories.  Why Analyze Crime?  Data Mining Task.  Data Set.  The MLCR Proposed Model.  Comparison Between Algorithms Used.  Conclusion. Company Logo
  • 27. Conclusion  Clustering and association rules were defined as a data mining techniques to automatically retrieve, extract and evaluate information for knowledge   discovery from crime data. This information was collected from many police department. Association rules Mining is one of the data mining techniques for data to be used to identify the relationship and to generate rules from crime dataset based on frequents occurrence of patterns to help the decision makers of our security society to make a prevention action. www.themegallery.com  Clustering is one of the data mining techniques also used to group objects (crime and criminals) without having predefined specification for their attributes.  The algorithms such as K-means algorithm and Aproir algorithm are used in this paper.  Those algorithms were expressed in details and a comparative study were Company Logo www.themegallery.com