SlideShare a Scribd company logo
1 of 18
A NETWORK SCIENCE
APPROACH ON
CRIME FORECASTING
AURORA SCHNETZER
RAJATH MAHESH
PRECAP
 Idea on How to Analyze, Visualize and Try to Forecast the Crime .
 Network is a set of defined nodes and edges, and we try to study the
pattern of the edges between nodes depending on the type of crime,
number of occurrences of the different crimes according to the date of
occurrence
 Our approach is completely trivial and we try to analyze the network
formed on the given datasets after we visualize and plot it.
 The network matrices which we use to analyze are more of a known
testing and training set of manual way, and This can implemented on a
large scale further on.
Existing Other Approaches.
 Trivial Approach as in knowing what happened before and expecting/
predicting what would happen later on.
 Data Mining Techniques:- Association Rule Mining, Support Vector
Machines, Linear Regression Methods, Neural Networks.
 Machine Learning Techniques:- Data Mining Techniques can be practically
evaluated using Machine Learning Methods.
 After Plotting the Graph about the datasets , we can Visualize it and using
the metrics, can come to conclusion about a Particular event we are trying
to forecast.
Problem Description
 Predict the occurrence of Crime using a set of already computed datasets.
 Plot the data as a network and analysis of the network.
 Understand the behavior of the networks which would form upon
visualization.
 Visualization always speeds up the process of analysis due to the fact that
A single image(Network) explains what a set of 100 lines of description of
the data would do.
 Node to Node Analysis to be done and understand the movement of the
path of the network to ease the goal of prediction
AGENDA
 Collection of Datasets
 Manual Analysis of the datasets and About the type of representation of
datasets.
 Classifying datasets and Removing Unwanted data from the Dataset.
 Finding Nodes and Formulating the Edges.
 Plotting the Network and Visualization.
 Analysis and use the results to Predict the outcomes.
Dataset Description
 We used the dataset from National Institute of Justice.
 Dataset Contains records about
-- Crime Incidents that were recorded for February 2001.
-- ( X and Y ) Co-ordinates of the places of occurrences of the crime
-- Type of Crime and The Final Case type on Dispute.
-- Category of Crimes.
-- Call Groups
-- Occurrence Type
-- Census
Continued…
 We considered 2 datasets of crime incidents on 27 & 28 February 2017.
 Total number of cases Registered were 572 and 545 Respectively.
 So total Number of Edges were Formulated as a Matrix by finding the distances
between the co-ordinates using the Euclidean Distance Formula.
Visualization
 The individual data sets When plotted Primitively as a graph actually Looked Like
what I have shown in the Next slides.
 Later we have plotted the occurrences in gephi software for visualization and
analysis.
 Used Plotly to display chart about the data-set without any classification.
 Used Gephi since it is Easy and adaptable though the size of files limited.
 Number of Nodes :- Taken into consideration was 4 in both graphs.
 Number of edges formed were :-
Histogram plot of February 28th
Histogram plot for February 27.
Visualization Graphs
For February 27th
Visualization Graphs for February 28th
Analysis
 After the visualization,
 We did the manual analysis as to how the crimes are changing in numbers
between the networks on comparison with the network weights. Which is the
number of crimes committed on both the particular days.
 SO using that like how I have stated in the paper, we can predict whether the
crimes are going to decrease or increase at particular co-ordinates which are
common on both of the networks.
Challenges
 We figured out how to go about it very late and that was the main problem.
 If we had more time, we would have been able to do a more thorough study. This would
include using more of the data set and creating more visualizations.
 Another problem that we had during this study was our lack of awareness for some of
the tools being used. With more experience of some of these tools like Gephi, we would
be able to create more intricate models.
 Without the limitation of resources, such as time and experience with tools, a more
advanced analysis of the possibility of crime prediction. This would lead to the ability to
test our model on a larger scale.
Conclusion
 The metrics we used were completely a manual approach and when we did it, we
found the approach was effective , because the network formed and implemented
was good enough to describe what we needed and expected from our approach
 This approach was implemented on just data of two days, but then ca be
implemented for large datasets.
 With this trivial approach of comparison of similar nodes taken as co-ordinates,
the results we achieved could be easily evaluated to be true.
Future Scope
 The approach which we used would work fine when evaluated manually, but when
the same approach if applied to a big dataset requires lot of time and hard core
programming implementation which we could not do.
 This can actually be the base for many more methods to develop for forecasting
crime just like data mining techniques.
References
 Guidance:- The most important Part by Professor Charalampos Chelmis
 Cell-to-Cell Activity Prediction for Smart Cities:- The IEEE paper by Blerim Cici,
Emmanouil Alimpertis, Alexander Ihler, Athina Markopoulou, University of
California, Irvine
 We used a number of resources for writing the report, which we have mentioned in
that
Thank you

More Related Content

What's hot

Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data AnalysisChetan Hireholi
 
Deep Learning for Public Safety in Chicago and San Francisco
Deep Learning for Public Safety in Chicago and San FranciscoDeep Learning for Public Safety in Chicago and San Francisco
Deep Learning for Public Safety in Chicago and San FranciscoSri Ambati
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringReuben George
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime PredictionProdapt Solutions
 
An integrated event summarization approach for complex system management
An integrated event summarization approach for complex system managementAn integrated event summarization approach for complex system management
An integrated event summarization approach for complex system managementVenkat Projects
 
KunGao_Resume.
KunGao_Resume.KunGao_Resume.
KunGao_Resume.Gao Kun
 
Safeguarding Abila: Discovering Evolving Activist Networks
Safeguarding Abila: Discovering Evolving Activist NetworksSafeguarding Abila: Discovering Evolving Activist Networks
Safeguarding Abila: Discovering Evolving Activist NetworksParang Saraf
 
SAS Data Mining - Crime Modeling
SAS Data Mining - Crime ModelingSAS Data Mining - Crime Modeling
SAS Data Mining - Crime ModelingJohn Michael Croft
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
10 Steps to Optimize Your Crime Analysis
10 Steps to Optimize Your Crime Analysis10 Steps to Optimize Your Crime Analysis
10 Steps to Optimize Your Crime AnalysisAzavea
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisIOSR Journals
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crimeJim Gilmer
 
An Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
An Initial Homophily Indicator to Reinforce Context-Aware Semantic ComputingAn Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
An Initial Homophily Indicator to Reinforce Context-Aware Semantic ComputingAlejandro Rivero
 
Data acquisition for probabilistic nearest neighbor query
Data acquisition for probabilistic nearest neighbor queryData acquisition for probabilistic nearest neighbor query
Data acquisition for probabilistic nearest neighbor queryieeepondy
 
User behaviour modeling for data prefetching in web applications
User behaviour modeling for data prefetching in web applicationsUser behaviour modeling for data prefetching in web applications
User behaviour modeling for data prefetching in web applicationsKacper Łukawski
 
Structural Analysis of Hacktivism on Twitter
Structural Analysis of Hacktivism on TwitterStructural Analysis of Hacktivism on Twitter
Structural Analysis of Hacktivism on TwitterNidhal Selmi
 
Crime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UCCrime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UCAzavea
 

What's hot (19)

Crime Analysis using Data Analysis
Crime Analysis using Data AnalysisCrime Analysis using Data Analysis
Crime Analysis using Data Analysis
 
Deep Learning for Public Safety in Chicago and San Francisco
Deep Learning for Public Safety in Chicago and San FranciscoDeep Learning for Public Safety in Chicago and San Francisco
Deep Learning for Public Safety in Chicago and San Francisco
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
 
Analytics-Based Crime Prediction
Analytics-Based Crime PredictionAnalytics-Based Crime Prediction
Analytics-Based Crime Prediction
 
An integrated event summarization approach for complex system management
An integrated event summarization approach for complex system managementAn integrated event summarization approach for complex system management
An integrated event summarization approach for complex system management
 
KunGao_Resume.
KunGao_Resume.KunGao_Resume.
KunGao_Resume.
 
Safeguarding Abila: Discovering Evolving Activist Networks
Safeguarding Abila: Discovering Evolving Activist NetworksSafeguarding Abila: Discovering Evolving Activist Networks
Safeguarding Abila: Discovering Evolving Activist Networks
 
SAS Data Mining - Crime Modeling
SAS Data Mining - Crime ModelingSAS Data Mining - Crime Modeling
SAS Data Mining - Crime Modeling
 
CV
CVCV
CV
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
10 Steps to Optimize Your Crime Analysis
10 Steps to Optimize Your Crime Analysis10 Steps to Optimize Your Crime Analysis
10 Steps to Optimize Your Crime Analysis
 
Kyung Kim
Kyung KimKyung Kim
Kyung Kim
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crime
 
An Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
An Initial Homophily Indicator to Reinforce Context-Aware Semantic ComputingAn Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
An Initial Homophily Indicator to Reinforce Context-Aware Semantic Computing
 
Data acquisition for probabilistic nearest neighbor query
Data acquisition for probabilistic nearest neighbor queryData acquisition for probabilistic nearest neighbor query
Data acquisition for probabilistic nearest neighbor query
 
User behaviour modeling for data prefetching in web applications
User behaviour modeling for data prefetching in web applicationsUser behaviour modeling for data prefetching in web applications
User behaviour modeling for data prefetching in web applications
 
Structural Analysis of Hacktivism on Twitter
Structural Analysis of Hacktivism on TwitterStructural Analysis of Hacktivism on Twitter
Structural Analysis of Hacktivism on Twitter
 
Crime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UCCrime Risk Forecasting and Predictive Analytics - Esri UC
Crime Risk Forecasting and Predictive Analytics - Esri UC
 

Similar to 9th may net sci presentation (1)

Analysis of Crime Big Data using MapReduce
Analysis of Crime Big Data using MapReduceAnalysis of Crime Big Data using MapReduce
Analysis of Crime Big Data using MapReduceKaushik Rajan
 
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET -  	  Crime Analysis and Prediction - by using DBSCAN AlgorithmIRJET -  	  Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET - Crime Analysis and Prediction - by using DBSCAN AlgorithmIRJET Journal
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticseSAT Journals
 
Crime Prediction and Analysis
Crime Prediction and AnalysisCrime Prediction and Analysis
Crime Prediction and AnalysisIRJET Journal
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
ICT741 Digital Forensics.docx
ICT741 Digital Forensics.docxICT741 Digital Forensics.docx
ICT741 Digital Forensics.docxwrite4
 
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...IJCSIS Research Publications
 
Network Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxNetwork Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxSubhrajyotiPayra
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningVenkat Projects
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGIRJET Journal
 
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
 BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN... BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN...
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...Nexgen Technology
 
Using machine learning algorithms to
Using machine learning algorithms toUsing machine learning algorithms to
Using machine learning algorithms tomlaij
 
Crime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of ChicagoCrime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of ChicagoStuti Deshpande
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...IJARIIT
 
IRJET- Automated Detection of Gender from Face Images
IRJET-  	  Automated Detection of Gender from Face ImagesIRJET-  	  Automated Detection of Gender from Face Images
IRJET- Automated Detection of Gender from Face ImagesIRJET Journal
 

Similar to 9th may net sci presentation (1) (20)

Analysis of Crime Big Data using MapReduce
Analysis of Crime Big Data using MapReduceAnalysis of Crime Big Data using MapReduce
Analysis of Crime Big Data using MapReduce
 
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET -  	  Crime Analysis and Prediction - by using DBSCAN AlgorithmIRJET -  	  Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
 
Case.pptx
Case.pptxCase.pptx
Case.pptx
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
 
Crime Prediction and Analysis
Crime Prediction and AnalysisCrime Prediction and Analysis
Crime Prediction and Analysis
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
ICT741 Digital Forensics.docx
ICT741 Digital Forensics.docxICT741 Digital Forensics.docx
ICT741 Digital Forensics.docx
 
Bs4301396400
Bs4301396400Bs4301396400
Bs4301396400
 
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
Comparative Analysis of K-Means Data Mining and Outlier Detection Approach fo...
 
Network Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptxNetwork Intrusion Detection (1)-converted-1.pptx
Network Intrusion Detection (1)-converted-1.pptx
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
 
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
 BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN... BIG DATA ANALYTICS FOR USER-ACTIVITY  ANALYSIS AND USER-ANOMALY DETECTION IN...
BIG DATA ANALYTICS FOR USER-ACTIVITY ANALYSIS AND USER-ANOMALY DETECTION IN...
 
PPT.pptx
PPT.pptxPPT.pptx
PPT.pptx
 
Using machine learning algorithms to
Using machine learning algorithms toUsing machine learning algorithms to
Using machine learning algorithms to
 
Crime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of ChicagoCrime Dataset Analysis for City of Chicago
Crime Dataset Analysis for City of Chicago
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
IRJET- Automated Detection of Gender from Face Images
IRJET-  	  Automated Detection of Gender from Face ImagesIRJET-  	  Automated Detection of Gender from Face Images
IRJET- Automated Detection of Gender from Face Images
 
Ijarcce 6
Ijarcce 6Ijarcce 6
Ijarcce 6
 

Recently uploaded

Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Milind Agarwal
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesTimothy Spann
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxSimranPal17
 
Decoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectDecoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectBoston Institute of Analytics
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxaleedritatuxx
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxHaritikaChhatwal1
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxTasha Penwell
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBoston Institute of Analytics
 
Networking Case Study prepared by teacher.pptx
Networking Case Study prepared by teacher.pptxNetworking Case Study prepared by teacher.pptx
Networking Case Study prepared by teacher.pptxHimangsuNath
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataTecnoIncentive
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...Dr Arash Najmaei ( Phd., MBA, BSc)
 
INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingsocarem879
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...KarteekMane1
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our WorldEduminds Learning
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksdeepakthakur548787
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Boston Institute of Analytics
 

Recently uploaded (20)

Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
Unveiling the Role of Social Media Suspect Investigators in Preventing Online...
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
 
What To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptxWhat To Do For World Nature Conservation Day by Slidesgo.pptx
What To Do For World Nature Conservation Day by Slidesgo.pptx
 
Decoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis ProjectDecoding Patterns: Customer Churn Prediction Data Analysis Project
Decoding Patterns: Customer Churn Prediction Data Analysis Project
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
 
Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
SMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptxSMOTE and K-Fold Cross Validation-Presentation.pptx
SMOTE and K-Fold Cross Validation-Presentation.pptx
 
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptxThe Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
The Power of Data-Driven Storytelling_ Unveiling the Layers of Insight.pptx
 
Data Analysis Project: Stroke Prediction
Data Analysis Project: Stroke PredictionData Analysis Project: Stroke Prediction
Data Analysis Project: Stroke Prediction
 
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis ProjectBank Loan Approval Analysis: A Comprehensive Data Analysis Project
Bank Loan Approval Analysis: A Comprehensive Data Analysis Project
 
Networking Case Study prepared by teacher.pptx
Networking Case Study prepared by teacher.pptxNetworking Case Study prepared by teacher.pptx
Networking Case Study prepared by teacher.pptx
 
Cyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded dataCyber awareness ppt on the recorded data
Cyber awareness ppt on the recorded data
 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
 
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
6 Tips for Interpretable Topic Models _ by Nicha Ruchirawat _ Towards Data Sc...
 
INTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processingINTRODUCTION TO Natural language processing
INTRODUCTION TO Natural language processing
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
wepik-insightful-infographics-a-data-visualization-overview-20240401133220kwr...
 
Learn How Data Science Changes Our World
Learn How Data Science Changes Our WorldLearn How Data Science Changes Our World
Learn How Data Science Changes Our World
 
Digital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing worksDigital Marketing Plan, how digital marketing works
Digital Marketing Plan, how digital marketing works
 
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
Decoding the Heart: Student Presentation on Heart Attack Prediction with Data...
 

9th may net sci presentation (1)

  • 1. A NETWORK SCIENCE APPROACH ON CRIME FORECASTING AURORA SCHNETZER RAJATH MAHESH
  • 2. PRECAP  Idea on How to Analyze, Visualize and Try to Forecast the Crime .  Network is a set of defined nodes and edges, and we try to study the pattern of the edges between nodes depending on the type of crime, number of occurrences of the different crimes according to the date of occurrence  Our approach is completely trivial and we try to analyze the network formed on the given datasets after we visualize and plot it.  The network matrices which we use to analyze are more of a known testing and training set of manual way, and This can implemented on a large scale further on.
  • 3. Existing Other Approaches.  Trivial Approach as in knowing what happened before and expecting/ predicting what would happen later on.  Data Mining Techniques:- Association Rule Mining, Support Vector Machines, Linear Regression Methods, Neural Networks.  Machine Learning Techniques:- Data Mining Techniques can be practically evaluated using Machine Learning Methods.  After Plotting the Graph about the datasets , we can Visualize it and using the metrics, can come to conclusion about a Particular event we are trying to forecast.
  • 4. Problem Description  Predict the occurrence of Crime using a set of already computed datasets.  Plot the data as a network and analysis of the network.  Understand the behavior of the networks which would form upon visualization.  Visualization always speeds up the process of analysis due to the fact that A single image(Network) explains what a set of 100 lines of description of the data would do.  Node to Node Analysis to be done and understand the movement of the path of the network to ease the goal of prediction
  • 5. AGENDA  Collection of Datasets  Manual Analysis of the datasets and About the type of representation of datasets.  Classifying datasets and Removing Unwanted data from the Dataset.  Finding Nodes and Formulating the Edges.  Plotting the Network and Visualization.  Analysis and use the results to Predict the outcomes.
  • 6. Dataset Description  We used the dataset from National Institute of Justice.  Dataset Contains records about -- Crime Incidents that were recorded for February 2001. -- ( X and Y ) Co-ordinates of the places of occurrences of the crime -- Type of Crime and The Final Case type on Dispute. -- Category of Crimes. -- Call Groups -- Occurrence Type -- Census
  • 7. Continued…  We considered 2 datasets of crime incidents on 27 & 28 February 2017.  Total number of cases Registered were 572 and 545 Respectively.  So total Number of Edges were Formulated as a Matrix by finding the distances between the co-ordinates using the Euclidean Distance Formula.
  • 8. Visualization  The individual data sets When plotted Primitively as a graph actually Looked Like what I have shown in the Next slides.  Later we have plotted the occurrences in gephi software for visualization and analysis.  Used Plotly to display chart about the data-set without any classification.  Used Gephi since it is Easy and adaptable though the size of files limited.  Number of Nodes :- Taken into consideration was 4 in both graphs.  Number of edges formed were :-
  • 9. Histogram plot of February 28th
  • 10. Histogram plot for February 27.
  • 12. Visualization Graphs for February 28th
  • 13. Analysis  After the visualization,  We did the manual analysis as to how the crimes are changing in numbers between the networks on comparison with the network weights. Which is the number of crimes committed on both the particular days.  SO using that like how I have stated in the paper, we can predict whether the crimes are going to decrease or increase at particular co-ordinates which are common on both of the networks.
  • 14. Challenges  We figured out how to go about it very late and that was the main problem.  If we had more time, we would have been able to do a more thorough study. This would include using more of the data set and creating more visualizations.  Another problem that we had during this study was our lack of awareness for some of the tools being used. With more experience of some of these tools like Gephi, we would be able to create more intricate models.  Without the limitation of resources, such as time and experience with tools, a more advanced analysis of the possibility of crime prediction. This would lead to the ability to test our model on a larger scale.
  • 15. Conclusion  The metrics we used were completely a manual approach and when we did it, we found the approach was effective , because the network formed and implemented was good enough to describe what we needed and expected from our approach  This approach was implemented on just data of two days, but then ca be implemented for large datasets.  With this trivial approach of comparison of similar nodes taken as co-ordinates, the results we achieved could be easily evaluated to be true.
  • 16. Future Scope  The approach which we used would work fine when evaluated manually, but when the same approach if applied to a big dataset requires lot of time and hard core programming implementation which we could not do.  This can actually be the base for many more methods to develop for forecasting crime just like data mining techniques.
  • 17. References  Guidance:- The most important Part by Professor Charalampos Chelmis  Cell-to-Cell Activity Prediction for Smart Cities:- The IEEE paper by Blerim Cici, Emmanouil Alimpertis, Alexander Ihler, Athina Markopoulou, University of California, Irvine  We used a number of resources for writing the report, which we have mentioned in that