Submit Search
Upload
IRJET- Detecting Criminal Method using Data Mining
•
0 likes
•
17 views
IRJET Journal
Follow
https://www.irjet.net/archives/V6/i3/IRJET-V6I31247.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 5
Download now
Download to read offline
Recommended
Crime
Crime
Daniel John
SAS Data Mining - Crime Modeling
SAS Data Mining - Crime Modeling
John Michael Croft
IRJET- Crime Prediction System
IRJET- Crime Prediction System
IRJET Journal
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime Pattern
Zakaria Zubi
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
IJARIIT
Predictive analysis of crime forecasting
Predictive analysis of crime forecasting
Frank Smilda
IRJET- Milestones and Challenges of Fake News Detection using Digital Forensi...
IRJET- Milestones and Challenges of Fake News Detection using Digital Forensi...
IRJET Journal
Crime analysis
Crime analysis
Frank Smilda
Recommended
Crime
Crime
Daniel John
SAS Data Mining - Crime Modeling
SAS Data Mining - Crime Modeling
John Michael Croft
IRJET- Crime Prediction System
IRJET- Crime Prediction System
IRJET Journal
Using Data Mining Techniques to Analyze Crime Pattern
Using Data Mining Techniques to Analyze Crime Pattern
Zakaria Zubi
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
Physical and Cyber Crime Detection using Digital Forensic Approach: A Complet...
IJARIIT
Predictive analysis of crime forecasting
Predictive analysis of crime forecasting
Frank Smilda
IRJET- Milestones and Challenges of Fake News Detection using Digital Forensi...
IRJET- Milestones and Challenges of Fake News Detection using Digital Forensi...
IRJET Journal
Crime analysis
Crime analysis
Frank Smilda
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
Journeying themes of data mining in felon and law enforcement agency profiling
Journeying themes of data mining in felon and law enforcement agency profiling
eSAT Journals
PredPol: How Predictive Policing Works
PredPol: How Predictive Policing Works
PredPol, Inc
U24149153
U24149153
IJERA Editor
Integrated heterogeneous social networking sites
Integrated heterogeneous social networking sites
eSAT Journals
06 analysis of crime
06 analysis of crime
Jim Gilmer
Crime prediction based on crime types
Crime prediction based on crime types
IJDKP
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
VaishaliSrigadhi
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Sunil Jagani
Cis second draft
Cis second draft
Ethio BlackDiamond
Fake news detection project
Fake news detection project
HarshdaGhai
Predictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open Data
PredPol, Inc
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
IOSR Journals
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
ijcseit
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET Journal
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysis
ZhongLI28
Individual project 2.20
Individual project 2.20
Monisha100
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
gerogepatton
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
IRJET Journal
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET Journal
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET Journal
More Related Content
What's hot
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET Journal
Journeying themes of data mining in felon and law enforcement agency profiling
Journeying themes of data mining in felon and law enforcement agency profiling
eSAT Journals
PredPol: How Predictive Policing Works
PredPol: How Predictive Policing Works
PredPol, Inc
U24149153
U24149153
IJERA Editor
Integrated heterogeneous social networking sites
Integrated heterogeneous social networking sites
eSAT Journals
06 analysis of crime
06 analysis of crime
Jim Gilmer
Crime prediction based on crime types
Crime prediction based on crime types
IJDKP
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
VaishaliSrigadhi
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
ijcsit
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Sunil Jagani
Cis second draft
Cis second draft
Ethio BlackDiamond
Fake news detection project
Fake news detection project
HarshdaGhai
Predictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open Data
PredPol, Inc
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
IOSR Journals
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
ijcseit
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET Journal
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysis
ZhongLI28
Individual project 2.20
Individual project 2.20
Monisha100
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
gerogepatton
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
IRJET Journal
What's hot
(20)
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
Journeying themes of data mining in felon and law enforcement agency profiling
Journeying themes of data mining in felon and law enforcement agency profiling
PredPol: How Predictive Policing Works
PredPol: How Predictive Policing Works
U24149153
U24149153
Integrated heterogeneous social networking sites
Integrated heterogeneous social networking sites
06 analysis of crime
06 analysis of crime
Crime prediction based on crime types
Crime prediction based on crime types
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Cis second draft
Cis second draft
Fake news detection project
Fake news detection project
Predictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open Data
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysis
Individual project 2.20
Individual project 2.20
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
IRJET- Authentic News Summarization
IRJET- Authentic News Summarization
Similar to IRJET- Detecting Criminal Method using Data Mining
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET Journal
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET Journal
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
IRJET Journal
Inspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal Applications
IRJET Journal
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET Journal
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
report
report
Peter Kim
IRJET- Financial Fraud Detection along with Outliers Pattern
IRJET- Financial Fraud Detection along with Outliers Pattern
IRJET Journal
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
Reuben George
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
Heta Parekh
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
Zakaria Zubi
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
IRJET Journal
IRJET- Crime Reporter, Missing Person Finder and Enhance Digital Solution for...
IRJET- Crime Reporter, Missing Person Finder and Enhance Digital Solution for...
IRJET Journal
Life and science journal.pdf
Life and science journal.pdf
Sarita30844
Ijarcce 6
Ijarcce 6
Daniel John
AnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTrafficking
Turner Sparks
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
Waqas Tariq
ŠVOČ: Design and architecture of a web applications for interactive display o...
ŠVOČ: Design and architecture of a web applications for interactive display o...
Martin Puškáč
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
eSAT Journals
Crime Prediction and Reporting System
Crime Prediction and Reporting System
IRJET Journal
Similar to IRJET- Detecting Criminal Method using Data Mining
(20)
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data Analytics
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
Inspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal Applications
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
report
report
IRJET- Financial Fraud Detection along with Outliers Pattern
IRJET- Financial Fraud Detection along with Outliers Pattern
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
IRJET- Crime Reporter, Missing Person Finder and Enhance Digital Solution for...
IRJET- Crime Reporter, Missing Person Finder and Enhance Digital Solution for...
Life and science journal.pdf
Life and science journal.pdf
Ijarcce 6
Ijarcce 6
AnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTrafficking
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
ŠVOČ: Design and architecture of a web applications for interactive display o...
ŠVOČ: Design and architecture of a web applications for interactive display o...
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
Crime Prediction and Reporting System
Crime Prediction and Reporting System
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
SAURABHKUMAR892774
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
me23b1001
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Chandu841456
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
ROCENODodongVILLACER
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
ugginaramesh
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
ssuser2ae721
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
Recently uploaded
(20)
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
IRJET- Detecting Criminal Method using Data Mining
1.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4863 Detecting Criminal Method using Data Mining Mr.A.P. Thangamuthu1, Mr. G. Vadivel2, Mrs. A. Priyadharshini3 1,2,3Assistant Professor Department of BCA, SNMV College of Arts & Science, Coimbatore – 50 ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract: Community is love in many ways. Any research that helps payment should be done quickly at the crimes. About 10% Criminals make up 50% offenses. Here we are see clustering algorithm for data processing Approach to find ways to criminals and help to get quicker criminal act We'll see k-algorithm cluster with some improvements in the process identify crime based forms. We used it tactics for genuine crime data from the sheriff's office checking our results. We use semi-supervision the technology to learn here for knowledge search helps to increase crime records and computation accuracy. We have created a weight plan attributes here to deal with different limits box clustering tools and techniques. It's easy geographical implementation of data processing structure crime helps to improve conspiracy and production detectives and other law enforcement officers. It can also be used against domestic terrorism Security Keywords: crimes; cluster; geographical; security; detection 1. INTRODUCTION Historical judgments are historically unique criminal justice and law enforcement experts. With the increase monitoring of computed computers crimes, computer data started to help researchers law enforcement officials and detectives expedited the act of solving crime. Here we will take an interdisciplinary the approach between computer science and the criminal justice should create a data mining precedent we can help you solve crimes quickly. And more specifically, we are use clustered-based models to help identify criminal forms we will discuss some sermons used in the criminals justice and police fields and compare and contrast they are related to data mining systems. Refers to suspicion a person believed to be guilty. The suspect can not be identified or identified. Suspect until proven guilty, not a criminal. The person who suffered whoever targets crime. Most of the time suffered identifying and informing the person on most occasions crime. In addition, there may be some witnesses of crime [1],. There are other terms, usually axons it refers to killing or killing a man. Within there may be sections like torture, Senior officers, murder and murder of law enforcement authorities. For our modeling purposes, we will not we must go to the deepest level of criminal justice prevents us for major crimes. Cluster(crime) has a special meaning and refers to one geographical crime, i.e. some of the crimes geographical zone. Such a cluster can be sight the crime represents using a globe- displacement conspiracy in the graph of the police jurisdiction. Thick the crime group is used to opt for a view 'Hot spots' offense. However, when we talk about the cluster from a data mining standpoint, we refer to a similar kind Interest in geography given such a cluster it helps to identify a crime or a crime character. Some well-known examples of criminal methods are DC Firing, a serial-rape or serial killer. These crimes may be can be done by single suspicion or by a group suspects. The number below shows the geo-location displacement plan Crime clusters. 2. CRIME AND REPORTING SYSTEM The data for crime is often impressive in the confusion. When some information is kept secret, some are general information. Information about prisoners it can often be viewed at the district or sheriff sites. However, Information on crimes related to drugs or criminal cases usually more limited. Similarly, information about sexual criminals are alert to
2.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4864 others part, but the victim's identity is often blocked. The as a data mining, the inspector must deal with all of this public data and personal data issues are data mining the modeling process does not violate this law borders. Most sheriff's office and police departments are used electronic systems for criminal reporting instead traditional paper based crime reports. This is the crime the following types of information are available for information: The crime type, date / time, location, etc. The suspect's information (identity or Unidentified), victim and witness. In addition, there crime and modus story or interpretation usually running in text form (MO). Police Officers or detectives use free text to record most of them Insights that are not included in the test box pre-determined questions. The first two sections the information is usually stored on the computer databases number, character or date table fields lastly, a free text is often saved. The data mining crime is becoming increasingly challenging from the free text field. When you can give free text fields magazine columnist, a great story line, will change them data mining attributes are not always an easy job. We are let's see how to attain remarkable attributes data mining models. 3. DATAMINING AND CRIME PATTERNS Let's see how to change the information about crime. A data mining problem [2], that it can help The detectives we found inside the cracks quickly solved a clerk of crime is a group of a crime geographic zone or crime is a hot place. Whereas, data mining term is a cluster of similar data points - a possible crime method. That is appropriate clusters or a subset of the cluster should have a must letter to criminal forms. There are clustering algorithms in the data mining those recordings are identical to the identification task of groups they differ from themselves but from others data. Some of these clusters are useful in our case to find one or only one criminal action a group of suspects. This information is the next one the challenge is to find the best providing variables gallery. These clusters will be provided later the detectives chase the expertise of their domain. The automatically detects and allows criminal procedures detectives focus on the first guerilla qualities and make a solution these crimes are the complete "laughs" or the decision to solve in some cases, if the incidents are suspected a mob can create from full source bits of bits of information from each of the offenses are bits Incidents. For example, a crime site reveals the suspicion black hair reveals that the next incident / witness the suspect reveals that the person is middle age and the third is a green the left hand will give it all together more complete no more than one film alone. Without doubt criminal method, detective is less likely to develop complete image from bits of different information crime incidents. Most of today are made manually the reports indicate that with the help of a duplicate multi-sheet usually from computer data researchers and their own crime records. We choose to use any cluster technique because crimes, such as the supervision technique of classification There are often widespread and criminal databases many unsolved crimes. So, classification The technique will be dependent on that and will be resolved crimes do not bring good forecasts for the future offenses. The nature of the crimes that vary over time internet-based cyber crimes or cell phones are crimes used it is unusual for a long time ago. Thus, it should be In the future you can find new and unknown forms, clustering techniques work better. 4. CLUSTERNING TECHNIQUES USED We will see some of our contributions in this section inspection. here's a simple clustering example. Let's take a very simple case of crime record. A statement based on crime data analyst or detective This data is sorted in different rows, usually the first type Basically the most important characteristic is detective experience. Crime type Susp ect race Suspect sex Suspect age group Victim age group Weapon Robbery B MALE MIDDLE ELDERLY KNIEF Robbery W MALE YOUNG MIDDLY BAT Robbery B MALE YOUNG ELDERLY KNIEF Robbery B FEMALE MIDDLE MIDDLE PISTON
3.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4865 We see Table 1 as a simple example of the crime list. The offense is crime and it will be very much important attribute. rows 1 and 3 show a simple crime The method where the doubt is matched and affected The profile also resembles. The goal here is that we can use data the mine that finds the most complex forms from the mine there are many factors in life or crime and many other factors there are some information about the crime. A General case It is not easy for a computer data analyst or detective can identify these types with a simple query. Thus using the data mining comes bunch technique It's easy to handle large-scale data and handling loud or missing information about criminal cases. We're using k-means clustering technique here the most widely used data mining cluster technology. Next, the most important part was to prepare the data this analysis. The actual crime data is derived from a Sheriff's office, under unrecognized agreements crime reporting system. functional data modify data with extraction change. Later, some checks were directed to view quality of data, such as missing information, borders and more blank, unknown or contractions for the same word this applies to older people who have not yet seen everyone. If the these are not marked as a value, creating clustering these are multiple groups of the same logical value. Next the task was to identify significant characteristics gallery. This process speaks to the domain criminals, criminal investigators, and experts analysts and on the other hand the characteristic importance the algorithm for the classical character set for the protocol types of crime we see this tool or expert based paradigm to solve the problem. Different attributes are based on criminality It is important to be aged It is important for the massacre, not to loot the robbery It's important not to worry about the pregnancy age owner of the house. Take care of different attributes differently we introduced the concept of crimes that we weigh attributes. This allows for different weights various attributes are based on the changing types of crime cluster. This allows weight unlike numerical traits, classified attributes They can easily weigh them. Using integrated weights may have attributed attributes reflected programs that were designed to increase performance weight of that variable or feature. We have not seen use cluster weight in other places in literature all attributes, such as review, normalization, are considered equal clustering algorithm significance. However, we are this lightweight technique is introduced here in our light semi-supervision or professional-based method. basically With our weighted clustering attributes, we clustered databases blame the methods and then present the results domain expert with detective or statistics important attributes. Detective groups, first see small clusters Then offers expert recommendations. This is the performance the process helps to determine the characteristic characteristics weights for different crime categories. Based on this information from domain expert, i.e. detective, future crime methods can be detected. First futures or unresolved crimes are based on significant attributes and consequently detective individuals inspection. This is because the cluster exercise, the groups hundreds of crimes can be either small groups or related crimes, it makes the detective work much easier find the methods of crime. The other approach is to use a small set of new offenses using the data and the tracers to score it against the existing clusters or known crime incidents injected into a new data set then compare the new clusters related to the treasury. The process of using the trackers is similar to the application find out that there are no radioactive trucks It's hard to find.
4.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4866 Figure 2 Plot of crime clusters with legend for significant attributes for that crime pattern 5. RESULTS AND CRIME PATTERN The proposed system is used in conjunction with globally plot. The crime analyst can choose the time and the one or some kind of crime and kind of geography show the resulting map. From this set, the user may be select the entire set or interest circle. The resulting data set is data source of data mining processing. These are based on records pre-determined attributes are weighed. The as a result, clusters have potential criminal forms. The as a result, clusters are planned in a global-wide conspiracy. We would show results in the picture above. Other clusters or crime shapes are color-coded. Each the group provides the total number of mythological crimes these include events that are included with significant ones attributes to heal characteristics. This information be careful when looking for a deduction experiment predictable crime clusters. We've reviewed our results for the criminalized forms found by holding court demonstrations on these crime cases whether the allegations against suspects were accepted or not rejected. So starting point is crime event data (some of these crimes were already in court abuse / system) measured by significant attributes or features or crime variables such as crime statistics, The suspect is the victim the court ruling was used in the cluster process. Then, we clustered offenses on our basis the weighing technique should come with crime groups (Clusters in the data mining term) possible criminal methods of crime. Geo-Spatial Significantly, the conspiracy of these criminal forms The attributes of measuring these groups are provided detectives with easy task to identify now the crime is more than a list of hundreds of crimes non-contact orders or events in some predetermined categories order. In our case, we have seen criminal forms below is shown in the same colors and saw in court checks to check some of the data mining fluids or there were allegations of similar criminals. 6. CONCLUSIONS AND FUTURE DIRECTION We saw the use of data mining for identification crime system is a crime system techniques. Our contribution here was to blame Finding the model as a machine learning task and through it using data mining in solving police detectives Offenses. We identified remarkable attributes; Using professional based semi-monitoring learning method and developed a considerable amount of planning attributes. Our modeling technique was able to identify crimes will create a large number of crimes criminal detectives work easier. Some of our disadvantages are blame the method analysis can only help detective, not replace they. Further data mining data is sensitive to input quality it may be wrong, the information may have been lost and may be data entry error is incorrect. The actual data will be mapped to data mining properties are not always an easy task effective data mining and crime data inspector is required good field knowledge. They have to work closely a detective in the early stages. We will create the future expansion of this study models for measuring hot spots [3] to assist crime In most of the crimes involving police involvement allows you to be more useful for any particular window using police resources we plan to see developing social networks to connect criminals, investigate suspects, gangs and their relationships. There is more capacity to search for suspicious explanations regional, FBI databases [4], for traffic violation databases helping detecting crime from different states or more specifically facing the terrarium operations add value to this crime detection precedent. 7. References 1) Hsinchun Chen, Wingyan Chung, Yi Qin, Michael Chau, Jennifer Jie Xu, Gang Wang, Rong Zheng, Homa Atabakhsh, “Crime Data Mining: An Overview and Case Studies”, AI Lab, University of Arizona, proceedings National Conference on Digital Government Research, 2003, 2) Hsinchun Chen, Wingyan Chung, Yi Qin, Michael Chau, Jennifer Jie Xu, Gang Wang, Rong Zheng, Homa Atabakhsh, “Crime Data Mining: A General Framework and Some Examples”, IEEE Computer Society April 2004.
5.
INTERNATIONAL RESEARCH JOURNAL
OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4867 3) C McCue, “Using Data Mining to Predict and Prevent Violent Crimes”, 4) Whitepaper, “Oracle’s Integration Hub For Justice And Public Safety”, Oracle Corp. 2004, 5) Shyam Varan Nath " Crime Pattern Detection Using Data Mining"
Download now