Submit Search
Upload
IRJET- Crime Prediction System
•
0 likes
•
24 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i3/IRJET-V6I31381.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
IRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack Prediction
IRJET Journal
U24149153
U24149153
IJERA Editor
IRJET - Monitoring Suicidal Behaviour System
IRJET - Monitoring Suicidal Behaviour System
IRJET Journal
SAS Data Mining - Crime Modeling
SAS Data Mining - Crime Modeling
John Michael Croft
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
IRJET Journal
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
Zakaria Zubi
CRIME DETECTION
CRIME DETECTION
Ankush Shrivastava
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
Recommended
IRJET- Cyber Crime Attack Prediction
IRJET- Cyber Crime Attack Prediction
IRJET Journal
U24149153
U24149153
IJERA Editor
IRJET - Monitoring Suicidal Behaviour System
IRJET - Monitoring Suicidal Behaviour System
IRJET Journal
SAS Data Mining - Crime Modeling
SAS Data Mining - Crime Modeling
John Michael Croft
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
IRJET Journal
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
Zakaria Zubi
CRIME DETECTION
CRIME DETECTION
Ankush Shrivastava
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
eSAT Journals
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
IRJET Journal
Msc dare journal 1
Msc dare journal 1
OluwadareOlatunji1
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
IAEME Publication
BC OAG Maturity of Computer Controls in5slides
BC OAG Maturity of Computer Controls in5slides
Tim Kirby
IRJET- Smart Automated Modelling using ECLAT Algorithm for Traffic Accident P...
IRJET- Smart Automated Modelling using ECLAT Algorithm for Traffic Accident P...
IRJET Journal
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
ijaia
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
IOSR Journals
Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020
IJNSA Journal
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
AAKANKSHA JAIN
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
IJMER
The Sick State of Healthcare Data Breaches
The Sick State of Healthcare Data Breaches
LightCyber-Inc
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET Journal
In depth Analysis of Suicide and its factors
In depth Analysis of Suicide and its factors
YashIyengar
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET Journal
Crime Prediction and Analysis
Crime Prediction and Analysis
IRJET Journal
Crime Prediction and Reporting System
Crime Prediction and Reporting System
IRJET Journal
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET Journal
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET Journal
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
IRJET Journal
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
More Related Content
What's hot
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
eSAT Journals
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
IRJET Journal
Msc dare journal 1
Msc dare journal 1
OluwadareOlatunji1
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
IAEME Publication
BC OAG Maturity of Computer Controls in5slides
BC OAG Maturity of Computer Controls in5slides
Tim Kirby
IRJET- Smart Automated Modelling using ECLAT Algorithm for Traffic Accident P...
IRJET- Smart Automated Modelling using ECLAT Algorithm for Traffic Accident P...
IRJET Journal
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
ijaia
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
IOSR Journals
Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020
IJNSA Journal
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
AAKANKSHA JAIN
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
IJMER
The Sick State of Healthcare Data Breaches
The Sick State of Healthcare Data Breaches
LightCyber-Inc
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET Journal
In depth Analysis of Suicide and its factors
In depth Analysis of Suicide and its factors
YashIyengar
What's hot
(14)
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
Msc dare journal 1
Msc dare journal 1
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
BC OAG Maturity of Computer Controls in5slides
BC OAG Maturity of Computer Controls in5slides
IRJET- Smart Automated Modelling using ECLAT Algorithm for Traffic Accident P...
IRJET- Smart Automated Modelling using ECLAT Algorithm for Traffic Accident P...
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
A COMPARATIVE ANALYSIS OF DIFFERENT FEATURE SET ON THE PERFORMANCE OF DIFFERE...
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
Trends in Network and Wireless Network Security in 2020
Trends in Network and Wireless Network Security in 2020
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
DETECTION OF MALICIOUS EXECUTABLES USING RULE BASED CLASSIFICATION ALGORITHMS
Review of Intrusion and Anomaly Detection Techniques
Review of Intrusion and Anomaly Detection Techniques
The Sick State of Healthcare Data Breaches
The Sick State of Healthcare Data Breaches
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
In depth Analysis of Suicide and its factors
In depth Analysis of Suicide and its factors
Similar to IRJET- Crime Prediction System
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET Journal
Crime Prediction and Analysis
Crime Prediction and Analysis
IRJET Journal
Crime Prediction and Reporting System
Crime Prediction and Reporting System
IRJET Journal
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET Journal
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET Journal
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
IRJET Journal
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
IRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data Mining
IRJET Journal
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
IRJET Journal
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET Journal
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud Detection
IRJET Journal
IRJET- Integration of Physical System Monitoring, Crime Posting Alerting ...
IRJET- Integration of Physical System Monitoring, Crime Posting Alerting ...
IRJET Journal
Tax Prediction Using Machine Learning
Tax Prediction Using Machine Learning
IRJET Journal
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET Journal
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
IRJET Journal
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
IRJET Journal
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET Journal
Unsupervised Learning for Credit Card Fraud Detection
Unsupervised Learning for Credit Card Fraud Detection
IRJET Journal
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET Journal
Similar to IRJET- Crime Prediction System
(20)
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
Crime Prediction and Analysis
Crime Prediction and Analysis
Crime Prediction and Reporting System
Crime Prediction and Reporting System
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data Mining
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute Resolution
A Comparative Study on Credit Card Fraud Detection
A Comparative Study on Credit Card Fraud Detection
IRJET- Integration of Physical System Monitoring, Crime Posting Alerting ...
IRJET- Integration of Physical System Monitoring, Crime Posting Alerting ...
Tax Prediction Using Machine Learning
Tax Prediction Using Machine Learning
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
IRJET- Identify the Human or Bots Twitter Data using Machine Learning Alg...
Unsupervised Learning for Credit Card Fraud Detection
Unsupervised Learning for Credit Card Fraud Detection
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
IRJET - Crime Analysis and Prediction - by using DBSCAN Algorithm
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
pipeline in computer architecture design
pipeline in computer architecture design
ssuser87fa0c1
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
SAURABHKUMAR892774
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
ROCENODodongVILLACER
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
asadnawaz62
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Chandu841456
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
Recently uploaded
(20)
pipeline in computer architecture design
pipeline in computer architecture design
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
IRJET- Crime Prediction System
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5392 Crime Prediction System Pankaj Kushwaha1, Kiran Kunwar2, Archna Verma3, Simili Shetty4, Sampada Watane5 1.2,3,4Student 5Assistant Professor 1,2,3,4,5Department of Computer Engineering, Shree L. R. Tiwari college of Engineering, Mumbai University, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Nowadays crime rates has touched the peak level, so to cease the rising level of committing crimes or to find the suspect easily our system will be very helpful to the investigators. This paper introduces a solution to the criminal and crime prediction problem using naïve bayes theory. Acquiring the crime dataset for the attributes which we required for our proposed system is quite difficult process in practice due to confidentiality principle. So we created the data considering the attributes which we want like criminal name, location, weapons used, dateofcrime, typeofcrime. The result of the procedure is the maximum probability of the suspect or the crime type. Key Words: Data Mining, Naïve Bayes, Crime dataset, Crime and Criminal Prediction. 1. INTRODUCTION The crime incidents area unit continued to grow in rate and complexness. Crime can not be foreseen since it's neither systematic nor random. In many criminal investigation, crime analysis includes processes to find the criminal of incidents. The discovery ofpossiblesuspectsinadvanceisan important requirement for security forces to optimize the usage of human and technical resources, and carries out important functions in the prediction of crime. Crime Records Bureau crimes like burglary, arson etc. have been decreased while crimes like murder, sex abuse, gang rape etc. have been increased. Even though we cannot predictthe result with 100% accuracy but the application gives the result having more chances of attempting it. 2. LITERATURE REVIEW There are number of papers which we have analyzed in order to determine the technology used and data mining techniques. The review of literaturewill involveefficient and usable techniques such as fuzzy system and weka tool. [1] In the studied paper, tool for forecasting the crime was built. The discrete choice model will be used in thiscase.The discrete choice model takes into account the choice of the criminal and location in order to forecast the crime. [2] In this paper a specific location Malaysia is considered. The crime location and mindset of the criminal will be considered in this case. Crime Forecasting is rarely used globally by police including Malaysia. In practice usually the police would target persons with their criminality and studying their strategy of implementing crime. The police will also monitor the current crime situation and will take necessary action when the crime index increases. Both of these scenarios require action taken after crime incurred. Therefore if crime forecasting can be adopted perhaps early crime prevention can be enforced. The aim of this study is to identify crime patterns in Kedahusingunivariateforecasting technique. Seventy-six recent monthly data (January 2006 – April 2012) were obtained from IPK Alor Star with the permission from PDRM Bukit Aman. Exploratory Data Analysis (EDA) and adjusted decomposition techniquewere conducted in order to fulfill the objectives of the study. The findings revealed that total crimes in Kedah were mainly contributed by type of property crime (80-85%) while violent crime has a small proportiononly.Fortunatelydueto the productiveness of the police the property crime trend indicated curve declining pattern. [3] Special section of the crime forecasting is considered in this case. The crime forecasting is used so that crime can be controlled. No specific locationisconsideredinthiscase. The GIS(Geographical Information System) is used in order to predict the location where crime is occurred. [4] This is book in which crime analysis is conducted. The mentality of criminal is considered in this case. The help of crime forecasting is also considered in this case. There are several works that analyze the social network for the crime analysis, but to the best of our knowledge, there is no study analyzing the social network of the criminals using naïve bayes. Although SNA [5-6] is a widely used tool in criminal investigation, the automatic criminal analysis over such a network is very limited again due to data accessing difficulties. In the literature, there exists a work over the terrorist network and other suspects [7,8,9]. However,these works only consider SNA analysis without analyzing the other crime related data such as location, date and type of crime.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5393 3. PROPOSED SYSTEM The steps included in prediction are: 1. Data collection 2. Comparison of historical data and collected data. 3. Prediction using naïve bayes algorithm. 4. Database updated. Firstly, if there has occurred a crime at a particular location, the investigators would collect all the evidences which comes under data collection.Nowit’ll comparethe evidences with the historical data that whether the same type of case has occurred in past with the same set of attributes by using Naïve bayes Algorithm. Naive Bayes doesn’t always provide the accurate result instead it give the maximum probability of the particular attribute. Fig. 1 shows the actual work flow of the system. Fig. 1 Flowchart of Proposed system 4. METHODOLOGY USED 4.1 DATA GENERATION The expected dataset shall look somethingofthiskindon the basis of which we shall perform prediction. Fig. 2 Dataset for Crime Prediction System 4.2 NAÏVE BAYES ALGORITHM Bayes’ Theorem finds the probability of an event occurring given the probability of another event that has already occurred. Bayes’ theorem is stated mathematically as the following equation: where A and B are events. Basically, we are trying to find probability of event A, given the event B is true. Event B is also termed as evidence. P(A) is the priori of A (the prior probability, i.e. Probability of event before evidence is seen). The evidence is an attribute value of an unknown instance (here, it is event B). P(A|B) is a posteriori probability of B, i.e. probability of event after evidence is seen.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5394 Fig. 3 Pseudo code for Naïve Bayes 5. IMPLEMENTATION 5.1 LOGIN PAGE User will first have to login to access thesystem,if he/she already has an account. If not then will have to signupforthe same. Fig. 4 is the screenshot of the login page. Fig. 4 Login page 5.2 SIGNUP PAGE User has to provide a valid e-mail id, and choose username and password to signup. Fig. 5 is the screenshot of the signup page. Fig. 5 Signup page 5.3 HOME PAGE After a valid user gets logged-in, the page redirects to the home page. It is an interaction page where user can choose what task to be performed from the tabs. Fig. 6 is the screenshot of the home page. Fig. 6 Home page
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5395 5.4 ABOUT PAGE About page tells us the information about the system. Fig. 7 is the screenshot of the about us page. Fig. 7 About Us page 5.5 RECORDS PAGE Here user can check the previous dataset by just downloading the file fromthedownloadoptiononthescreen. Fig. 8 is the screenshot of the Records page. Fig. 8 Records page 5.6 PREDICT PAGE For prediction, user has to enterthe requireddetailsviz. location, gender, crime-type, weapon used and reason ofthe crime that has currently occurred. For eg. The details entered here aremira road,male, murder, knife, affair. Fig. 9 is the screenshot of the predict page. Fig. 9 Predict page 5.7 OUTPUT PAGE After clicking on the predict button, it re-directs to the output page. Output page shows the prediction of the criminal which has the highest probability. The details entered on the predict page gets compared with the historical dataset and using naïve bayes, it predicts the criminal. Here the criminal is jatin. Fig. 10 is the screenshot of the output page. Fig. 10 Output page
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5396 6. CONCLUSION People committing crime must be stopped or reduced as large number of people are getting affected due to this. Our system will help the agencies to tackle the problem of identifying the suspect and the crime that has occurred. Large amount of struggle is being done manually plus digitally for finding the actual criminal. But not every time there is success, so still some work can be done to improve the forecasting system. REFERENCES [1] M. B. Mitchell, D. E. Brown, and J. H. Conklin, “A Crime Forecasting Tool for the Web-Based CrimeAnalysis Toolkit,” 2007 IEEE Syst. Inf. Eng. Des. Symp.,pp.1– 5,2007. [2] S.Ismail and N. Ramli,“Short-Term Crime Forecast ting InKeedah,” Procedia-Soc. Behav. Sci., vol.91,pp.654– 660,2013. [3] W. Gorr and R. Harries, “Introduction to crime forecasting,” vol. 19, pp. 551–555, 2003. [4] K. H. Vellani, “Crime Analysis: for Problem Solving Security Professionals in 25 Small Steps,” Facilities,pp.1– 56,2010. [5] Kenneth M, Stefan W, John M (2001) Knowledge extraction from local function networks. In: International joint conference on artificial intelligence.LawrenceErlbaum Associates Ltd, pp 765–770 [6] Calvo-Armengol A, Zenou Y (2006) Social networks and crime decisions: the role of social structure in facilitating delinquent behavior. Int Econ Rev 45:939–958 52. Xiao L, Fan M (2014) Does social network always promote entrepreneurial intentions? An empirical study in China. Neural Comput Appl 24:21–26 [7] Khan NG, Bhagat VB (2013) Effective data mining approach for crime-terrorpattern detection usingclustering algorithm technique. Int J Eng Res Technol 2:2043–2048 [8] Dombroski MJ, Carley KM (2002) Netest: estimating a terrorist network’s structure. Comput Math Org Theory 8:235–241 [9] Porter MD, Brown DE (2007) Detecting local regions of change in high-dimensional criminal or terrorist point processes. Comput Stat Data Anal 51:2753–2768 [10] Datasets, Center for Machine learning and Intelligent Systems, Donald Bren School of Information and Computer Sciences, University of California, Irvine.Available from: http://cml.ics.uci.edu/. 25/05/2015. [11] References from www.google.com.
Download now