SlideShare a Scribd company logo
1 of 25
“ Add your company slogan ”

Using Data Mining
Techniques to Analyze Crime
Pattern
Presented by:
Dr.Zakaria Suliman Zubi
Associate Professor
Computer Science Department
Faculty of Science
Sirte University
Sirte, Libya

LOGO
Contents
 Abstract.








Introduction.
Data Mining Models.
Why Analyze Crime?
Data Mining Task.
Data Set.
The MLCR Proposed Model.
Conclusion.

www.themegallery.com
Abstract
 Law enforcement agencies represented in the police today faced a
large volume of data every day. These data can be processed and
transformed into useful information. In this since, Data mining can
be applied to greatly improve crime analysis. Which can help to
reduce and preventing crime as much as possible.
 Crime reports and data are used as an input for the formulation of
the crime prevention policies and strategic plans.
 This work will apply some data mining methods to analyses Libyan
national criminal record data to help the Libyan government to make
a strategically decision regarding prevention the increasing of the
high crime rate these days.
 The data was collected manually from Benghazi, Tripoli, and AlJafara Supremes Security Committee (SSC).
 Our proposed model will be able to extract crime patterns by using
association rule mining and clustering to classify crime records on
the basis of the values of crime attributes.

www.themegallery.com
Contents
 Abstract.
 Introduction.







Data Mining Models.
Why Analyze Crime?
Data Mining Task.
Data Set.
The MLCR Proposed Model.
Conclusion.
www.themegallery.com
Introduction
 Data Mining or Knowledge Discovery in Databases (KDD) in simple
words is nontrivial extraction of implicit, previously unknown, and
potentially useful information from data.


KDD is the process of identifying a valid, potentially, useful and
ultimately understandable structure in data..

 Crime analyzes is an emerging field in law enforcement without
standard definitions. This makes it difficult to determine the crime
analyzes focus for agencies that are new to the field.
 Crime analysis is act of analyzing crime. More specifically, crime
analysis is the breaking up of acts committed in violation of laws into
their parts to find out their nature and reporting, some analysis.
 The role of the crime analysts varies from agency to agency.
Statement of these findings, The objective of most crime analysis is
to find meaningful information in vast amounts of data and
disseminate this information to officers and investigators in the field
to assist in their efforts to apprehend criminals and suppress
criminal activity.
www.themegallery.com
Contents




Abstract.
Introduction.
Data Mining Models.







Why Analyze Crime?
Data Mining Task.
Data Set.
The MLCR Proposed Model.
Conclusion.

www.themegallery.com
Data Mining Models
 The Data Mining models are categorized into different leaves. Further,
each leaf signifies the relationship, if any, that is highlighted from the
database. the Data Mining Models can be put into one of the six main
categories: 1) Association, 2) Classification, 3) Clustering, 4)
Prediction, 5) Sequence Discovery, and 6) Generalization

www.themegallery.com
data Mining Models Cont…
 Table 2 classifies the various Data Mining algorithms
according to problem type, namely, Association,
Classification, Clustering, Prediction, Discovery, and
Summarization.

www.themegallery.com
Data Mining models Cont…


Cont….

www.themegallery.com
Contents





Abstract.
Introduction.
Data Mining Models.
Why Analyze Crime?






Data Mining Task.
Data Set.
The MLCR Proposed Model.
Conclusion.

www.themegallery.com
Why Analyze Crime?
Crime Analysts usually tend to justify their existence as crime analysts in what is
known as law enforcement agency. it makes sense to analyze crime. Some good
reasons are listed as follow:
1. Analyze crime to inform law enforcers about general and specific crime
trends, patterns, and series in an ongoing, timely manner.
2. Analyze crime to take advantage of the abundance of information existing in
law enforcement agencies, the criminal justice system, and public domain.
3. Analyze crime to maximize the use of limited law enforcement resources.
4. Analyze crime to have an objective means to access crime problems locally,
regionally, nationally within and between law enforcement agencies.
5. Analyze crime to be proactive in detecting and preventing crime.
6. Analyze crime to meet the law enforcement needs of a changing society.

www.themegallery.com
Why Analyze Crime? Cont…
 In general there are four different techniques for
analyzing crimes, as follow:
1.
2.
3.
4.

Linkage Analysis
Statistical Analysis
Profiling
Spatial Analysis

 Each of the above techniques has its own advantages
and drawbacks and can be used in specific cases.

www.themegallery.com
Contents






Abstract.
Introduction.
Data Mining Models.
Why Analyze Crime?
Data Mining Task.





Data Set.
The MLCR Proposed Model.
Conclusion.
www.themegallery.com
Data Mining Task
A. Data collection.
The dataset that was used as training and testing data
set were extracted from the Supreme Security
Committee in Tripoli, Benghazi and Al-Jafara.
These data contain data about both Crimes and
Criminals with the following main attributes:
1. Crime ID: Individual crimes are designated by unique crime id.
2. Crime type: indicates crime type.
3. Date: Indicate when a crime happened.
4. Gender: Male or Female.
5. Age: age of individual Criminal.
6. Crime Address: location of the crime.
7. Marital status: status of the Criminal.
www.themegallery.com
Data Mining Task Cont…
B. Data Preprocessing .
 Real world usually have the following drawbacks:
Incompleteness, Noisy, and Inconsistence. So these data need to
be preprocessed to get the data suitable for analysis purpose. The
preprocessing includes the following tasks as it shown in
1.
2.
3.
4.
5.

Data cleaning.
Data integration
Data transformation.
Data reduction.
Data discretization

Figure (2) shows the distribution of
offenses versus different crime and
criminal attributes.
Figure (2): attributes for crime and criminal
www.themegallery.com
Contents







Abstract.
Introduction.
Data Mining Models.
Why Analyze Crime?
Data Mining Task.
Data Set.

 The MLCR Proposed Model.
 Conclusion.
www.themegallery.com
Data Set
We will consider crime database as a training dataset used in
our model. The mentioned database contains a real data values
from crime and criminal attributes. We will also consider 70
percent as training value of the proposed model and 30 percent
for testing. The following table shows the data we used in our
model.

www.themegallery.com








Contents

Abstract.
Introduction.
Data Mining Models.
Why Analyze Crime?
Data Mining Task.
Data Set.
The MLCR Proposed Model.

 Conclusion.
www.themegallery.com
The MLCR proposed model
The Mining Libyan Criminal Record (MLCR) proposed
model will be implemented to conduct and interact with two
types of mining algorithms to overcome with two different
types of results effectively. Those two approaches are
considered as a sub-prototypes of the proposed MLCR
model. Those prototypes will be illustrated as follows:
A.Mining Libyan Criminal Record-using Association rules
(MLCR-AR).

B.Mining Libyan Criminal Record-using Clustering (MLCR-C).

www.themegallery.com
The MLCR proposed model Cont…
A. Mining Libyan Criminal Record-using
Association rules (MLCR-AR).


Association rule mining is a method used to generate rules from crime
dataset based on frequents occurrence of patterns to help the decision
makers of our security society to make a prevention action.

 One of the most popular algorithm are called Apriori and FP-growth
Association rule mining classically intends at discovering association
between items in a transactional database.
 The Apriori algorithm called also as “Sequential Algorithm” developed
by [Agrawal1994]. Is a great accomplishment in the history of mining
association rules[Cheung1996c]. It is also the most well known
association rules algorithm. This technique uses to perform association
analyze on the attributes of crimes.

www.themegallery.com
The MLCR proposed model Cont…
B. Mining Libyan Criminal Record-using Clustering (MLCR-C).


This prototype will use the same dataset indicated in MLCR_AR prototype. But
with Clustering Analysis.



Clustering is the technique that is used to group objects (crime and criminals)
without having predefined specification for their attributes.



Clustering is unsupervised classification: no predefined classes. Simple K-means
clustering algorithm is used in this work.
K-mean algorithm clusters the data members groups were m is predefined. InputCrime type. Number of clusters, Number of Iteration Initial seeds might produce
an important role in the final results.
Step1: Randomly choose cluster centers.
Step2: Assign instance to cluster based on their Distance to the cluster centers.
Step3: Centers of clusters are adjusted.
Step4: go to Step1 until convergence.
Step5: output X0 ,X1,X2 ,X3.
Fig3: criminal age vs. crime type After applying K-means algorithm
www.themegallery.com









Contents

Abstract.
Introduction.
Data Mining Models.
Why Analyze Crime?
Data Mining Task.
Data Set.
The MLCR Proposed Model.
Conclusion.

www.themegallery.com
Conclusion



Clustering and association rules were defined as a data mining techniques to
automatically retrieve, extract and evaluate information for knowledge
discovery from crime data.




This information was collected from many police departments in Libya.

Association rules Mining is one of the data mining techniques for data to be
used to identify the relationship and to generate rules from crime dataset based
on frequents occurrence of patterns to help the decision makers of our security
society to make a prevention action.




Clustering is one of the data mining techniques also used to group objects
(crime and criminals) without having predefined specification for their
attributes.
The algorithms such as K-means algorithm and Aproir algorithm are used in
this paper.



Those algorithms were expressed in details and a comparative study were
denoted in this paper.


A promising results were shown in the following figure.
www.themegallery.com
Thank you !!!
Using Data Mining Techniques to Analyze Crime Pattern

More Related Content

What's hot

Text Data Mining
Text Data MiningText Data Mining
Text Data MiningKU Leuven
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesHeta Parekh
 
An introduction to knitr and R Markdown
An introduction to knitr and R MarkdownAn introduction to knitr and R Markdown
An introduction to knitr and R Markdownsahirbhatnagar
 
Complex Network Analysis
Complex Network Analysis Complex Network Analysis
Complex Network Analysis Annu Sharma
 
A study on “impact of artificial intelligence in covid19 diagnosis”
A study on “impact of artificial intelligence in covid19 diagnosis”A study on “impact of artificial intelligence in covid19 diagnosis”
A study on “impact of artificial intelligence in covid19 diagnosis”Dr. C.V. Suresh Babu
 
Flight Delay Prediction Model (2)
Flight Delay Prediction Model (2)Flight Delay Prediction Model (2)
Flight Delay Prediction Model (2)Shubham Gupta
 
K-Nearest Neighbor Classifier
K-Nearest Neighbor ClassifierK-Nearest Neighbor Classifier
K-Nearest Neighbor ClassifierNeha Kulkarni
 
Liliana Cruz Lopez - Deep Reinforcement Learning based Insulin Controller for...
Liliana Cruz Lopez - Deep Reinforcement Learning based Insulin Controller for...Liliana Cruz Lopez - Deep Reinforcement Learning based Insulin Controller for...
Liliana Cruz Lopez - Deep Reinforcement Learning based Insulin Controller for...MLconf
 
Rules of data mining
Rules of data miningRules of data mining
Rules of data miningSulman Ahmed
 
Crime Analysis at Chicago
Crime Analysis at ChicagoCrime Analysis at Chicago
Crime Analysis at ChicagoRoshik Ganesan
 
Data Mining: Concepts and techniques: Chapter 13 trend
Data Mining: Concepts and techniques: Chapter 13 trendData Mining: Concepts and techniques: Chapter 13 trend
Data Mining: Concepts and techniques: Chapter 13 trendSalah Amean
 
3.2 partitioning methods
3.2 partitioning methods3.2 partitioning methods
3.2 partitioning methodsKrish_ver2
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital ForensicsOldsun
 

What's hot (20)

Data Science: Past, Present, and Future
Data Science: Past, Present, and FutureData Science: Past, Present, and Future
Data Science: Past, Present, and Future
 
Text Data Mining
Text Data MiningText Data Mining
Text Data Mining
 
Text MIning
Text MIningText MIning
Text MIning
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
 
An introduction to knitr and R Markdown
An introduction to knitr and R MarkdownAn introduction to knitr and R Markdown
An introduction to knitr and R Markdown
 
Web content mining
Web content miningWeb content mining
Web content mining
 
Complex Network Analysis
Complex Network Analysis Complex Network Analysis
Complex Network Analysis
 
A study on “impact of artificial intelligence in covid19 diagnosis”
A study on “impact of artificial intelligence in covid19 diagnosis”A study on “impact of artificial intelligence in covid19 diagnosis”
A study on “impact of artificial intelligence in covid19 diagnosis”
 
Flight Delay Prediction Model (2)
Flight Delay Prediction Model (2)Flight Delay Prediction Model (2)
Flight Delay Prediction Model (2)
 
K Nearest Neighbors
K Nearest NeighborsK Nearest Neighbors
K Nearest Neighbors
 
K-Nearest Neighbor Classifier
K-Nearest Neighbor ClassifierK-Nearest Neighbor Classifier
K-Nearest Neighbor Classifier
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Liliana Cruz Lopez - Deep Reinforcement Learning based Insulin Controller for...
Liliana Cruz Lopez - Deep Reinforcement Learning based Insulin Controller for...Liliana Cruz Lopez - Deep Reinforcement Learning based Insulin Controller for...
Liliana Cruz Lopez - Deep Reinforcement Learning based Insulin Controller for...
 
Rules of data mining
Rules of data miningRules of data mining
Rules of data mining
 
Crime Analysis at Chicago
Crime Analysis at ChicagoCrime Analysis at Chicago
Crime Analysis at Chicago
 
Data Mining: Concepts and techniques: Chapter 13 trend
Data Mining: Concepts and techniques: Chapter 13 trendData Mining: Concepts and techniques: Chapter 13 trend
Data Mining: Concepts and techniques: Chapter 13 trend
 
Text Detection and Recognition
Text Detection and RecognitionText Detection and Recognition
Text Detection and Recognition
 
3.2 partitioning methods
3.2 partitioning methods3.2 partitioning methods
3.2 partitioning methods
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 
Data Visualization With R
Data Visualization With RData Visualization With R
Data Visualization With R
 

Viewers also liked

Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringReuben George
 
2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis 2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis Yawen Li
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crimeJim Gilmer
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesChamath Sajeewa
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysisjangyoung
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...Zakaria Zubi
 
Crime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia TechCrime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia TechJonathan D'Cruz
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidenceOnline
 
Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases Zakaria Zubi
 
I- Extended Databases
I- Extended DatabasesI- Extended Databases
I- Extended DatabasesZakaria Zubi
 
Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Zakaria Zubi
 
Random Forest and KNN is fun
Random Forest and KNN is funRandom Forest and KNN is fun
Random Forest and KNN is funZhen Li
 
San Francisco Crime Classification
San Francisco Crime ClassificationSan Francisco Crime Classification
San Francisco Crime Classificationsai praneeth reddy
 
Micro processor programs
Micro processor programsMicro processor programs
Micro processor programssantosh kumar
 

Viewers also liked (20)

Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
 
2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis 2014 Chicago Crime Data Analysis
2014 Chicago Crime Data Analysis
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crime
 
Crime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articlesCrime Analytics: Analysis of crimes through news paper articles
Crime Analytics: Analysis of crimes through news paper articles
 
Chicago crime analysis
Chicago crime analysisChicago crime analysis
Chicago crime analysis
 
Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
 
Crime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia TechCrime Mapping & Analysis – Georgia Tech
Crime Mapping & Analysis – Georgia Tech
 
Apriori Algorithm
Apriori AlgorithmApriori Algorithm
Apriori Algorithm
 
Data mining
Data miningData mining
Data mining
 
Preserving and recovering digital evidence
Preserving and recovering digital evidencePreserving and recovering digital evidence
Preserving and recovering digital evidence
 
Ismail&&ziko 2003
Ismail&&ziko 2003Ismail&&ziko 2003
Ismail&&ziko 2003
 
Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases Knowledge Discovery in Remote Access Databases
Knowledge Discovery in Remote Access Databases
 
Edi text
Edi textEdi text
Edi text
 
I- Extended Databases
I- Extended DatabasesI- Extended Databases
I- Extended Databases
 
Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)Knowledge Discovery Query Language (KDQL)
Knowledge Discovery Query Language (KDQL)
 
Yandex Metrica - Data Restart konference 2015
Yandex Metrica - Data Restart konference 2015Yandex Metrica - Data Restart konference 2015
Yandex Metrica - Data Restart konference 2015
 
Random Forest and KNN is fun
Random Forest and KNN is funRandom Forest and KNN is fun
Random Forest and KNN is fun
 
San Francisco Crime Classification
San Francisco Crime ClassificationSan Francisco Crime Classification
San Francisco Crime Classification
 
Micro processor programs
Micro processor programsMicro processor programs
Micro processor programs
 

Similar to Using Data Mining Techniques to Analyze Crime Pattern

SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...ijaia
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...gerogepatton
 
Using machine learning algorithms to
Using machine learning algorithms toUsing machine learning algorithms to
Using machine learning algorithms tomlaij
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningIRJET Journal
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionIJSRD
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...IJARIIT
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET Journal
 
data mining for terror attacks
data mining for terror attacksdata mining for terror attacks
data mining for terror attacksNilu Desai
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdfSarita30844
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET Journal
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisIOSR Journals
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
IRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data MiningIRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data MiningIRJET Journal
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGIRJET Journal
 
Predicting the Crimes in Chicago
Predicting the Crimes in Chicago Predicting the Crimes in Chicago
Predicting the Crimes in Chicago Swati Arora
 

Similar to Using Data Mining Techniques to Analyze Crime Pattern (20)

SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
SUPERVISED AND UNSUPERVISED MACHINE LEARNING METHODOLOGIES FOR CRIME PATTERN ...
 
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
Supervised and Unsupervised Machine Learning Methodologies for Crime Pattern ...
 
Case.pptx
Case.pptxCase.pptx
Case.pptx
 
Using machine learning algorithms to
Using machine learning algorithms toUsing machine learning algorithms to
Using machine learning algorithms to
 
Clickstream ppt copy
Clickstream ppt   copyClickstream ppt   copy
Clickstream ppt copy
 
Crime
CrimeCrime
Crime
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
A Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots PredictionA Survey on Data Mining Techniques for Crime Hotspots Prediction
A Survey on Data Mining Techniques for Crime Hotspots Prediction
 
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data Analytics
 
data mining for terror attacks
data mining for terror attacksdata mining for terror attacks
data mining for terror attacks
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdf
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
IRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data MiningIRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data Mining
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
 
Ijarcce 6
Ijarcce 6Ijarcce 6
Ijarcce 6
 
Predicting the Crimes in Chicago
Predicting the Crimes in Chicago Predicting the Crimes in Chicago
Predicting the Crimes in Chicago
 

More from Zakaria Zubi

applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...Zakaria Zubi
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA Zakaria Zubi
 
Applying web mining application for user behavior understanding
Applying web mining application for user behavior understandingApplying web mining application for user behavior understanding
Applying web mining application for user behavior understandingZakaria Zubi
 
Arabic Text mining Classification
Arabic Text mining Classification Arabic Text mining Classification
Arabic Text mining Classification Zakaria Zubi
 
Ibtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesIbtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesZakaria Zubi
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposesZakaria Zubi
 

More from Zakaria Zubi (8)

applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
applyingwebminingapplicationforuserbehaviorunderstanding-131215105223-phpapp0...
 
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
COMPARISON OF ROUTING PROTOCOLS FOR AD HOC WIRELESS NETWORK WITH MEDICAL DATA
 
Applying web mining application for user behavior understanding
Applying web mining application for user behavior understandingApplying web mining application for user behavior understanding
Applying web mining application for user behavior understanding
 
Arabic Text mining Classification
Arabic Text mining Classification Arabic Text mining Classification
Arabic Text mining Classification
 
Model
ModelModel
Model
 
Ibtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital imagesIbtc dwt hybrid coding of digital images
Ibtc dwt hybrid coding of digital images
 
Deep Web mining
Deep Web miningDeep Web mining
Deep Web mining
 
Information communication technology in libya for educational purposes
Information communication technology in libya for educational purposesInformation communication technology in libya for educational purposes
Information communication technology in libya for educational purposes
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 

Recently uploaded (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 

Using Data Mining Techniques to Analyze Crime Pattern

  • 1. “ Add your company slogan ” Using Data Mining Techniques to Analyze Crime Pattern Presented by: Dr.Zakaria Suliman Zubi Associate Professor Computer Science Department Faculty of Science Sirte University Sirte, Libya LOGO
  • 2. Contents  Abstract.        Introduction. Data Mining Models. Why Analyze Crime? Data Mining Task. Data Set. The MLCR Proposed Model. Conclusion. www.themegallery.com
  • 3. Abstract  Law enforcement agencies represented in the police today faced a large volume of data every day. These data can be processed and transformed into useful information. In this since, Data mining can be applied to greatly improve crime analysis. Which can help to reduce and preventing crime as much as possible.  Crime reports and data are used as an input for the formulation of the crime prevention policies and strategic plans.  This work will apply some data mining methods to analyses Libyan national criminal record data to help the Libyan government to make a strategically decision regarding prevention the increasing of the high crime rate these days.  The data was collected manually from Benghazi, Tripoli, and AlJafara Supremes Security Committee (SSC).  Our proposed model will be able to extract crime patterns by using association rule mining and clustering to classify crime records on the basis of the values of crime attributes. www.themegallery.com
  • 4. Contents  Abstract.  Introduction.       Data Mining Models. Why Analyze Crime? Data Mining Task. Data Set. The MLCR Proposed Model. Conclusion. www.themegallery.com
  • 5. Introduction  Data Mining or Knowledge Discovery in Databases (KDD) in simple words is nontrivial extraction of implicit, previously unknown, and potentially useful information from data.  KDD is the process of identifying a valid, potentially, useful and ultimately understandable structure in data..  Crime analyzes is an emerging field in law enforcement without standard definitions. This makes it difficult to determine the crime analyzes focus for agencies that are new to the field.  Crime analysis is act of analyzing crime. More specifically, crime analysis is the breaking up of acts committed in violation of laws into their parts to find out their nature and reporting, some analysis.  The role of the crime analysts varies from agency to agency. Statement of these findings, The objective of most crime analysis is to find meaningful information in vast amounts of data and disseminate this information to officers and investigators in the field to assist in their efforts to apprehend criminals and suppress criminal activity. www.themegallery.com
  • 6. Contents    Abstract. Introduction. Data Mining Models.      Why Analyze Crime? Data Mining Task. Data Set. The MLCR Proposed Model. Conclusion. www.themegallery.com
  • 7. Data Mining Models  The Data Mining models are categorized into different leaves. Further, each leaf signifies the relationship, if any, that is highlighted from the database. the Data Mining Models can be put into one of the six main categories: 1) Association, 2) Classification, 3) Clustering, 4) Prediction, 5) Sequence Discovery, and 6) Generalization www.themegallery.com
  • 8. data Mining Models Cont…  Table 2 classifies the various Data Mining algorithms according to problem type, namely, Association, Classification, Clustering, Prediction, Discovery, and Summarization. www.themegallery.com
  • 9. Data Mining models Cont…  Cont…. www.themegallery.com
  • 10. Contents     Abstract. Introduction. Data Mining Models. Why Analyze Crime?     Data Mining Task. Data Set. The MLCR Proposed Model. Conclusion. www.themegallery.com
  • 11. Why Analyze Crime? Crime Analysts usually tend to justify their existence as crime analysts in what is known as law enforcement agency. it makes sense to analyze crime. Some good reasons are listed as follow: 1. Analyze crime to inform law enforcers about general and specific crime trends, patterns, and series in an ongoing, timely manner. 2. Analyze crime to take advantage of the abundance of information existing in law enforcement agencies, the criminal justice system, and public domain. 3. Analyze crime to maximize the use of limited law enforcement resources. 4. Analyze crime to have an objective means to access crime problems locally, regionally, nationally within and between law enforcement agencies. 5. Analyze crime to be proactive in detecting and preventing crime. 6. Analyze crime to meet the law enforcement needs of a changing society. www.themegallery.com
  • 12. Why Analyze Crime? Cont…  In general there are four different techniques for analyzing crimes, as follow: 1. 2. 3. 4. Linkage Analysis Statistical Analysis Profiling Spatial Analysis  Each of the above techniques has its own advantages and drawbacks and can be used in specific cases. www.themegallery.com
  • 13. Contents      Abstract. Introduction. Data Mining Models. Why Analyze Crime? Data Mining Task.    Data Set. The MLCR Proposed Model. Conclusion. www.themegallery.com
  • 14. Data Mining Task A. Data collection. The dataset that was used as training and testing data set were extracted from the Supreme Security Committee in Tripoli, Benghazi and Al-Jafara. These data contain data about both Crimes and Criminals with the following main attributes: 1. Crime ID: Individual crimes are designated by unique crime id. 2. Crime type: indicates crime type. 3. Date: Indicate when a crime happened. 4. Gender: Male or Female. 5. Age: age of individual Criminal. 6. Crime Address: location of the crime. 7. Marital status: status of the Criminal. www.themegallery.com
  • 15. Data Mining Task Cont… B. Data Preprocessing .  Real world usually have the following drawbacks: Incompleteness, Noisy, and Inconsistence. So these data need to be preprocessed to get the data suitable for analysis purpose. The preprocessing includes the following tasks as it shown in 1. 2. 3. 4. 5. Data cleaning. Data integration Data transformation. Data reduction. Data discretization Figure (2) shows the distribution of offenses versus different crime and criminal attributes. Figure (2): attributes for crime and criminal www.themegallery.com
  • 16. Contents       Abstract. Introduction. Data Mining Models. Why Analyze Crime? Data Mining Task. Data Set.  The MLCR Proposed Model.  Conclusion. www.themegallery.com
  • 17. Data Set We will consider crime database as a training dataset used in our model. The mentioned database contains a real data values from crime and criminal attributes. We will also consider 70 percent as training value of the proposed model and 30 percent for testing. The following table shows the data we used in our model. www.themegallery.com
  • 18.        Contents Abstract. Introduction. Data Mining Models. Why Analyze Crime? Data Mining Task. Data Set. The MLCR Proposed Model.  Conclusion. www.themegallery.com
  • 19. The MLCR proposed model The Mining Libyan Criminal Record (MLCR) proposed model will be implemented to conduct and interact with two types of mining algorithms to overcome with two different types of results effectively. Those two approaches are considered as a sub-prototypes of the proposed MLCR model. Those prototypes will be illustrated as follows: A.Mining Libyan Criminal Record-using Association rules (MLCR-AR). B.Mining Libyan Criminal Record-using Clustering (MLCR-C). www.themegallery.com
  • 20. The MLCR proposed model Cont… A. Mining Libyan Criminal Record-using Association rules (MLCR-AR).  Association rule mining is a method used to generate rules from crime dataset based on frequents occurrence of patterns to help the decision makers of our security society to make a prevention action.  One of the most popular algorithm are called Apriori and FP-growth Association rule mining classically intends at discovering association between items in a transactional database.  The Apriori algorithm called also as “Sequential Algorithm” developed by [Agrawal1994]. Is a great accomplishment in the history of mining association rules[Cheung1996c]. It is also the most well known association rules algorithm. This technique uses to perform association analyze on the attributes of crimes. www.themegallery.com
  • 21. The MLCR proposed model Cont… B. Mining Libyan Criminal Record-using Clustering (MLCR-C).  This prototype will use the same dataset indicated in MLCR_AR prototype. But with Clustering Analysis.  Clustering is the technique that is used to group objects (crime and criminals) without having predefined specification for their attributes.  Clustering is unsupervised classification: no predefined classes. Simple K-means clustering algorithm is used in this work. K-mean algorithm clusters the data members groups were m is predefined. InputCrime type. Number of clusters, Number of Iteration Initial seeds might produce an important role in the final results. Step1: Randomly choose cluster centers. Step2: Assign instance to cluster based on their Distance to the cluster centers. Step3: Centers of clusters are adjusted. Step4: go to Step1 until convergence. Step5: output X0 ,X1,X2 ,X3. Fig3: criminal age vs. crime type After applying K-means algorithm www.themegallery.com
  • 22.         Contents Abstract. Introduction. Data Mining Models. Why Analyze Crime? Data Mining Task. Data Set. The MLCR Proposed Model. Conclusion. www.themegallery.com
  • 23. Conclusion  Clustering and association rules were defined as a data mining techniques to automatically retrieve, extract and evaluate information for knowledge discovery from crime data.   This information was collected from many police departments in Libya. Association rules Mining is one of the data mining techniques for data to be used to identify the relationship and to generate rules from crime dataset based on frequents occurrence of patterns to help the decision makers of our security society to make a prevention action.   Clustering is one of the data mining techniques also used to group objects (crime and criminals) without having predefined specification for their attributes. The algorithms such as K-means algorithm and Aproir algorithm are used in this paper.  Those algorithms were expressed in details and a comparative study were denoted in this paper.  A promising results were shown in the following figure. www.themegallery.com