SlideShare a Scribd company logo
1 of 5
Download to read offline
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4863
Detecting Criminal Method using Data Mining
Mr.A.P. Thangamuthu1, Mr. G. Vadivel2, Mrs. A. Priyadharshini3
1,2,3Assistant Professor Department of BCA, SNMV College of Arts & Science, Coimbatore – 50
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract: Community is love in many ways. Any research that helps payment should be done quickly at the crimes. About
10% Criminals make up 50% offenses. Here we are see clustering algorithm for data processing Approach to find ways to
criminals and help to get quicker criminal act We'll see k-algorithm cluster with some improvements in the process
identify crime based forms. We used it tactics for genuine crime data from the sheriff's office checking our results. We use
semi-supervision the technology to learn here for knowledge search helps to increase crime records and computation
accuracy. We have created a weight plan attributes here to deal with different limits box clustering tools and techniques.
It's easy geographical implementation of data processing structure crime helps to improve conspiracy and production
detectives and other law enforcement officers. It can also be used against domestic terrorism Security
Keywords: crimes; cluster; geographical; security; detection
1. INTRODUCTION
Historical judgments are historically unique criminal justice and law enforcement experts. With the increase monitoring
of computed computers crimes, computer data started to help researchers law enforcement officials and detectives
expedited the act of solving crime. Here we will take an interdisciplinary the approach between computer science and the
criminal justice should create a data mining precedent we can help you solve crimes quickly. And more specifically, we are
use clustered-based models to help identify criminal forms we will discuss some sermons used in the criminals justice and
police fields and compare and contrast they are related to data mining systems. Refers to suspicion a person believed to be
guilty. The suspect can not be identified or identified. Suspect until proven guilty, not a criminal. The person who suffered
whoever targets crime. Most of the time suffered identifying and informing the person on most occasions crime. In addition,
there may be some witnesses of crime [1],.
There are other terms, usually axons it refers to killing or killing a man. Within there may be sections like torture, Senior
officers, murder and murder of law enforcement authorities. For our modeling purposes, we will not we must go to the
deepest level of criminal justice prevents us for major crimes. Cluster(crime) has a special meaning and refers to one
geographical crime, i.e. some of the crimes geographical zone. Such a cluster can be sight the crime represents using a globe-
displacement conspiracy in the graph of the police jurisdiction. Thick the crime group is used to opt for a view 'Hot spots'
offense. However, when we talk about the cluster from a data mining standpoint, we refer to a similar kind Interest in
geography given such a cluster it helps to identify a crime or a crime character. Some well-known examples of criminal
methods are DC Firing, a serial-rape or serial killer. These crimes may be can be done by single suspicion or by a group
suspects. The number below shows the geo-location displacement plan Crime clusters.
2. CRIME AND REPORTING SYSTEM
The data for crime is often impressive in the confusion. When some information is kept secret, some are general
information. Information about prisoners it can often be viewed at the district or sheriff sites. However, Information on
crimes related to drugs or criminal cases usually more limited. Similarly, information about sexual criminals are alert to
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4864
others part, but the victim's identity is often blocked. The as a data mining, the inspector must deal with all of this public
data and personal data issues are data mining the modeling process does not violate this law borders. Most sheriff's office
and police departments are used electronic systems for criminal reporting instead traditional paper based crime reports.
This is the crime the following types of information are available for information:
 The crime type, date / time, location, etc.
 The suspect's information (identity or Unidentified),
 victim and witness.
In addition, there crime and modus story or interpretation usually running in text form (MO). Police Officers or
detectives use free text to record most of them Insights that are not included in the test box pre-determined questions. The
first two sections the information is usually stored on the computer databases number, character or date table fields lastly, a
free text is often saved. The data mining crime is becoming increasingly challenging from the free text field. When you can
give free text fields magazine columnist, a great story line, will change them data mining attributes are not always an easy
job. We are let's see how to attain remarkable attributes data mining models.
3. DATAMINING AND CRIME PATTERNS
Let's see how to change the information about crime. A data mining problem [2], that it can help The detectives we found
inside the cracks quickly solved a clerk of crime is a group of a crime geographic zone or crime is a hot place. Whereas, data
mining term is a cluster of similar data points - a possible crime method. That is appropriate clusters or a subset of the
cluster should have a must letter to criminal forms. There are clustering algorithms in the data mining those recordings are
identical to the identification task of groups they differ from themselves but from others data. Some of these clusters are
useful in our case to find one or only one criminal action a group of suspects. This information is the next one the challenge
is to find the best providing variables gallery. These clusters will be provided later the detectives chase the expertise of their
domain.
The automatically detects and allows criminal procedures detectives focus on the first guerilla qualities and make a
solution these crimes are the complete "laughs" or the decision to solve in some cases, if the incidents are suspected a mob
can create from full source bits of bits of information from each of the offenses are bits Incidents. For example, a crime site
reveals the suspicion black hair reveals that the next incident / witness the suspect reveals that the person is middle age
and the third is a green the left hand will give it all together more complete no more than one film alone. Without doubt
criminal method, detective is less likely to develop complete image from bits of different information crime incidents.
Most of today are made manually the reports indicate that with the help of a duplicate multi-sheet usually from
computer data researchers and their own crime records. We choose to use any cluster technique because crimes, such as the
supervision technique of classification There are often widespread and criminal databases many unsolved crimes. So,
classification The technique will be dependent on that and will be resolved crimes do not bring good forecasts for the future
offenses. The nature of the crimes that vary over time internet-based cyber crimes or cell phones are crimes used it is
unusual for a long time ago. Thus, it should be In the future you can find new and unknown forms, clustering techniques
work better.
4. CLUSTERNING TECHNIQUES USED
We will see some of our contributions in this section inspection. here's a simple clustering example. Let's take a very
simple case of crime record. A statement based on crime data analyst or detective This data is sorted in different rows,
usually the first type Basically the most important characteristic is detective experience.
Crime
type
Susp
ect
race
Suspect
sex
Suspect
age
group
Victim age
group
Weapon
Robbery B MALE MIDDLE ELDERLY KNIEF
Robbery W MALE YOUNG MIDDLY BAT
Robbery B MALE YOUNG ELDERLY KNIEF
Robbery B FEMALE MIDDLE MIDDLE PISTON
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4865
We see Table 1 as a simple example of the crime list. The offense is crime and it will be very much important attribute.
rows 1 and 3 show a simple crime The method where the doubt is matched and affected The profile also resembles. The goal
here is that we can use data the mine that finds the most complex forms from the mine there are many factors in life or
crime and many other factors there are some information about the crime.
A General case It is not easy for a computer data analyst or detective can identify these types with a simple query. Thus
using the data mining comes bunch technique It's easy to handle large-scale data and handling loud or missing information
about criminal cases. We're using k-means clustering technique here the most widely used data mining cluster technology.
Next, the most important part was to prepare the data this analysis.
The actual crime data is derived from a Sheriff's office, under unrecognized agreements crime reporting system.
functional data modify data with extraction change. Later, some checks were directed to view quality of data, such as
missing information, borders and more blank, unknown or contractions for the same word this applies to older people who
have not yet seen everyone. If the these are not marked as a value, creating clustering these are multiple groups of the same
logical value. Next the task was to identify significant characteristics gallery.
This process speaks to the domain criminals, criminal investigators, and experts analysts and on the other hand the
characteristic importance the algorithm for the classical character set for the protocol types of crime we see this tool or
expert based paradigm to solve the problem. Different attributes are based on criminality It is important to be aged It is
important for the massacre, not to loot the robbery It's important not to worry about the pregnancy age owner of the house.
Take care of different attributes differently we introduced the concept of crimes that we weigh attributes. This allows for
different weights various attributes are based on the changing types of crime cluster. This allows weight unlike numerical
traits, classified attributes They can easily weigh them. Using integrated weights may have attributed attributes reflected
programs that were designed to increase performance weight of that variable or feature. We have not seen use cluster
weight in other places in literature all attributes, such as review, normalization, are considered equal clustering algorithm
significance.
However, we are this lightweight technique is introduced here in our light semi-supervision or professional-based
method. basically With our weighted clustering attributes, we clustered databases blame the methods and then present the
results domain expert with detective or statistics important attributes. Detective groups, first see small clusters Then offers
expert recommendations. This is the performance the process helps to determine the characteristic characteristics weights
for different crime categories. Based on this information from domain expert, i.e. detective, future crime methods can be
detected. First futures or unresolved crimes are based on significant attributes and consequently detective individuals
inspection.
This is because the cluster exercise, the groups hundreds of crimes can be either small groups or related crimes, it makes
the detective work much easier find the methods of crime. The other approach is to use a small set of new offenses using the
data and the tracers to score it against the existing clusters or known crime incidents injected into a new data set then
compare the new clusters related to the treasury. The process of using the trackers is similar to the application find out that
there are no radioactive trucks It's hard to find.
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4866
Figure 2 Plot of crime clusters with legend for significant attributes for that crime pattern
5. RESULTS AND CRIME PATTERN
The proposed system is used in conjunction with globally plot. The crime analyst can choose the time and the one or
some kind of crime and kind of geography show the resulting map. From this set, the user may be select the entire set or
interest circle. The resulting data set is data source of data mining processing. These are based on records pre-determined
attributes are weighed. The as a result, clusters have potential criminal forms. The as a result, clusters are planned in a
global-wide conspiracy.
We would show results in the picture above. Other clusters or crime shapes are color-coded. Each the group provides the
total number of mythological crimes these include events that are included with significant ones attributes to heal
characteristics. This information be careful when looking for a deduction experiment predictable crime clusters. We've
reviewed our results for the criminalized forms found by holding court demonstrations on these crime cases whether the
allegations against suspects were accepted or not rejected. So starting point is crime event data (some of these crimes were
already in court abuse / system) measured by significant attributes or features or crime variables such as crime statistics,
The suspect is the victim the court ruling was used in the cluster process. Then, we clustered offenses on our basis the
weighing technique should come with crime groups (Clusters in the data mining term) possible criminal methods of crime.
Geo-Spatial Significantly, the conspiracy of these criminal forms The attributes of measuring these groups are provided
detectives with easy task to identify now the crime is more than a list of hundreds of crimes non-contact orders or events in
some predetermined categories order. In our case, we have seen criminal forms below is shown in the same colors and saw
in court checks to check some of the data mining fluids or there were allegations of similar criminals.
6. CONCLUSIONS AND FUTURE DIRECTION
We saw the use of data mining for identification crime system is a crime system techniques. Our contribution here was
to blame Finding the model as a machine learning task and through it using data mining in solving police detectives
Offenses. We identified remarkable attributes; Using professional based semi-monitoring learning method and developed a
considerable amount of planning attributes. Our modeling technique was able to identify crimes will create a large number
of crimes criminal detectives work easier. Some of our disadvantages are blame the method analysis can only help detective,
not replace they.
Further data mining data is sensitive to input quality it may be wrong, the information may have been lost and may be
data entry error is incorrect. The actual data will be mapped to data mining properties are not always an easy task effective
data mining and crime data inspector is required good field knowledge.
They have to work closely a detective in the early stages. We will create the future expansion of this study models for
measuring hot spots [3] to assist crime In most of the crimes involving police involvement allows you to be more useful for
any particular window using police resources we plan to see developing social networks to connect criminals, investigate
suspects, gangs and their relationships. There is more capacity to search for suspicious explanations regional, FBI databases
[4], for traffic violation databases helping detecting crime from different states or more specifically facing the terrarium
operations add value to this crime detection precedent.
7. References
1) Hsinchun Chen, Wingyan Chung, Yi Qin, Michael Chau, Jennifer Jie Xu, Gang Wang, Rong Zheng, Homa Atabakhsh,
“Crime Data Mining: An Overview and Case Studies”, AI Lab, University of Arizona, proceedings National
Conference on Digital Government Research, 2003,
2) Hsinchun Chen, Wingyan Chung, Yi Qin, Michael Chau, Jennifer Jie Xu, Gang Wang, Rong Zheng, Homa Atabakhsh,
“Crime Data Mining: A General Framework and Some Examples”, IEEE Computer Society April 2004.
INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056
VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4867
3) C McCue, “Using Data Mining to Predict and Prevent Violent Crimes”,
4) Whitepaper, “Oracle’s Integration Hub For Justice And Public Safety”, Oracle Corp. 2004,
5) Shyam Varan Nath " Crime Pattern Detection Using Data Mining"

More Related Content

What's hot

IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET Journal
 
Journeying themes of data mining in felon and law enforcement agency profiling
Journeying themes of data mining in felon and law enforcement agency profilingJourneying themes of data mining in felon and law enforcement agency profiling
Journeying themes of data mining in felon and law enforcement agency profilingeSAT Journals
 
PredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol, Inc
 
Integrated heterogeneous social networking sites
Integrated heterogeneous social networking sitesIntegrated heterogeneous social networking sites
Integrated heterogeneous social networking siteseSAT Journals
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crimeJim Gilmer
 
Crime prediction based on crime types
Crime prediction based on crime typesCrime prediction based on crime types
Crime prediction based on crime typesIJDKP
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGijcsit
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Sunil Jagani
 
Fake news detection project
Fake news detection projectFake news detection project
Fake news detection projectHarshdaGhai
 
Predictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open DataPredictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open DataPredPol, Inc
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisIOSR Journals
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKijcseit
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking SitesIRJET Journal
 
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisInvestigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisZhongLI28
 
Individual project 2.20
Individual project 2.20Individual project 2.20
Individual project 2.20Monisha100
 
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...gerogepatton
 
IRJET- Authentic News Summarization
IRJET-  	  Authentic News SummarizationIRJET-  	  Authentic News Summarization
IRJET- Authentic News SummarizationIRJET Journal
 

What's hot (20)

IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
IRJET- Big Data Driven Information Diffusion Analytics and Control on Social ...
 
Journeying themes of data mining in felon and law enforcement agency profiling
Journeying themes of data mining in felon and law enforcement agency profilingJourneying themes of data mining in felon and law enforcement agency profiling
Journeying themes of data mining in felon and law enforcement agency profiling
 
PredPol: How Predictive Policing Works
PredPol: How Predictive Policing WorksPredPol: How Predictive Policing Works
PredPol: How Predictive Policing Works
 
U24149153
U24149153U24149153
U24149153
 
Integrated heterogeneous social networking sites
Integrated heterogeneous social networking sitesIntegrated heterogeneous social networking sites
Integrated heterogeneous social networking sites
 
06 analysis of crime
06 analysis of crime06 analysis of crime
06 analysis of crime
 
Crime prediction based on crime types
Crime prediction based on crime typesCrime prediction based on crime types
Crime prediction based on crime types
 
FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT FAKE NEWS DETECTION PPT
FAKE NEWS DETECTION PPT
 
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNINGDETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
 
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
Predictive Policing - How Emerging Technologies Are Helping Prevent Crimes?
 
Cis second draft
Cis second draftCis second draft
Cis second draft
 
Fake news detection project
Fake news detection projectFake news detection project
Fake news detection project
 
Predictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open DataPredictive Policing on Gun Violence Using Open Data
Predictive Policing on Gun Violence Using Open Data
 
Propose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysisPropose Data Mining AR-GA Model to Advance Crime analysis
Propose Data Mining AR-GA Model to Advance Crime analysis
 
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORKMALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
 
Investigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysisInvestigating crimes using text mining and network analysis
Investigating crimes using text mining and network analysis
 
Individual project 2.20
Individual project 2.20Individual project 2.20
Individual project 2.20
 
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
 
IRJET- Authentic News Summarization
IRJET-  	  Authentic News SummarizationIRJET-  	  Authentic News Summarization
IRJET- Authentic News Summarization
 

Similar to IRJET- Detecting Criminal Method using Data Mining

IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET Journal
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET Journal
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningIRJET Journal
 
Inspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal ApplicationsInspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal ApplicationsIRJET Journal
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET Journal
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
IRJET- Financial Fraud Detection along with Outliers Pattern
IRJET-  	  Financial Fraud Detection along with Outliers PatternIRJET-  	  Financial Fraud Detection along with Outliers Pattern
IRJET- Financial Fraud Detection along with Outliers PatternIRJET Journal
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringReuben George
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesHeta Parekh
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...Zakaria Zubi
 
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET Journal
 
IRJET- Crime Reporter, Missing Person Finder and Enhance Digital Solution for...
IRJET- Crime Reporter, Missing Person Finder and Enhance Digital Solution for...IRJET- Crime Reporter, Missing Person Finder and Enhance Digital Solution for...
IRJET- Crime Reporter, Missing Person Finder and Enhance Digital Solution for...IRJET Journal
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdfSarita30844
 
AnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingAnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingTurner Sparks
 
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data MiningAn Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data MiningWaqas Tariq
 
ŠVOČ: Design and architecture of a web applications for interactive display o...
ŠVOČ: Design and architecture of a web applications for interactive display o...ŠVOČ: Design and architecture of a web applications for interactive display o...
ŠVOČ: Design and architecture of a web applications for interactive display o...Martin Puškáč
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticseSAT Journals
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting SystemIRJET Journal
 

Similar to IRJET- Detecting Criminal Method using Data Mining (20)

IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDMIRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDM
 
IRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data AnalyticsIRJET- Crime Analysis using Data Mining and Data Analytics
IRJET- Crime Analysis using Data Mining and Data Analytics
 
Survey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine LearningSurvey on Crime Interpretation and Forecasting Using Machine Learning
Survey on Crime Interpretation and Forecasting Using Machine Learning
 
Inspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal ApplicationsInspection of Certain RNN-ELM Algorithms for Societal Applications
Inspection of Certain RNN-ELM Algorithms for Societal Applications
 
IRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data MiningIRJET- Online Crime Reporting and Management System using Data Mining
IRJET- Online Crime Reporting and Management System using Data Mining
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
report
reportreport
report
 
IRJET- Financial Fraud Detection along with Outliers Pattern
IRJET-  	  Financial Fraud Detection along with Outliers PatternIRJET-  	  Financial Fraud Detection along with Outliers Pattern
IRJET- Financial Fraud Detection along with Outliers Pattern
 
Crime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means ClusteringCrime Pattern Detection using K-Means Clustering
Crime Pattern Detection using K-Means Clustering
 
Crime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los AngelesCrime Data Analysis and Prediction for city of Los Angeles
Crime Data Analysis and Prediction for city of Los Angeles
 
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
A Comparative Study of Data Mining Methods to Analyzing Libyan National Crime...
 
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
 
IRJET- Crime Reporter, Missing Person Finder and Enhance Digital Solution for...
IRJET- Crime Reporter, Missing Person Finder and Enhance Digital Solution for...IRJET- Crime Reporter, Missing Person Finder and Enhance Digital Solution for...
IRJET- Crime Reporter, Missing Person Finder and Enhance Digital Solution for...
 
Life and science journal.pdf
Life and science journal.pdfLife and science journal.pdf
Life and science journal.pdf
 
Ijarcce 6
Ijarcce 6Ijarcce 6
Ijarcce 6
 
AnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTraffickingAnnotatedBibForHumanTrafficking
AnnotatedBibForHumanTrafficking
 
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data MiningAn Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
An Intelligence Analysis of Crime Data for Law Enforcement Using Data Mining
 
ŠVOČ: Design and architecture of a web applications for interactive display o...
ŠVOČ: Design and architecture of a web applications for interactive display o...ŠVOČ: Design and architecture of a web applications for interactive display o...
ŠVOČ: Design and architecture of a web applications for interactive display o...
 
A predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analyticsA predictive model for mapping crime using big data analytics
A predictive model for mapping crime using big data analytics
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting System
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniquesugginaramesh
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 

Recently uploaded (20)

🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Comparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization TechniquesComparative Analysis of Text Summarization Techniques
Comparative Analysis of Text Summarization Techniques
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 

IRJET- Detecting Criminal Method using Data Mining

  • 1. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4863 Detecting Criminal Method using Data Mining Mr.A.P. Thangamuthu1, Mr. G. Vadivel2, Mrs. A. Priyadharshini3 1,2,3Assistant Professor Department of BCA, SNMV College of Arts & Science, Coimbatore – 50 ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract: Community is love in many ways. Any research that helps payment should be done quickly at the crimes. About 10% Criminals make up 50% offenses. Here we are see clustering algorithm for data processing Approach to find ways to criminals and help to get quicker criminal act We'll see k-algorithm cluster with some improvements in the process identify crime based forms. We used it tactics for genuine crime data from the sheriff's office checking our results. We use semi-supervision the technology to learn here for knowledge search helps to increase crime records and computation accuracy. We have created a weight plan attributes here to deal with different limits box clustering tools and techniques. It's easy geographical implementation of data processing structure crime helps to improve conspiracy and production detectives and other law enforcement officers. It can also be used against domestic terrorism Security Keywords: crimes; cluster; geographical; security; detection 1. INTRODUCTION Historical judgments are historically unique criminal justice and law enforcement experts. With the increase monitoring of computed computers crimes, computer data started to help researchers law enforcement officials and detectives expedited the act of solving crime. Here we will take an interdisciplinary the approach between computer science and the criminal justice should create a data mining precedent we can help you solve crimes quickly. And more specifically, we are use clustered-based models to help identify criminal forms we will discuss some sermons used in the criminals justice and police fields and compare and contrast they are related to data mining systems. Refers to suspicion a person believed to be guilty. The suspect can not be identified or identified. Suspect until proven guilty, not a criminal. The person who suffered whoever targets crime. Most of the time suffered identifying and informing the person on most occasions crime. In addition, there may be some witnesses of crime [1],. There are other terms, usually axons it refers to killing or killing a man. Within there may be sections like torture, Senior officers, murder and murder of law enforcement authorities. For our modeling purposes, we will not we must go to the deepest level of criminal justice prevents us for major crimes. Cluster(crime) has a special meaning and refers to one geographical crime, i.e. some of the crimes geographical zone. Such a cluster can be sight the crime represents using a globe- displacement conspiracy in the graph of the police jurisdiction. Thick the crime group is used to opt for a view 'Hot spots' offense. However, when we talk about the cluster from a data mining standpoint, we refer to a similar kind Interest in geography given such a cluster it helps to identify a crime or a crime character. Some well-known examples of criminal methods are DC Firing, a serial-rape or serial killer. These crimes may be can be done by single suspicion or by a group suspects. The number below shows the geo-location displacement plan Crime clusters. 2. CRIME AND REPORTING SYSTEM The data for crime is often impressive in the confusion. When some information is kept secret, some are general information. Information about prisoners it can often be viewed at the district or sheriff sites. However, Information on crimes related to drugs or criminal cases usually more limited. Similarly, information about sexual criminals are alert to
  • 2. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4864 others part, but the victim's identity is often blocked. The as a data mining, the inspector must deal with all of this public data and personal data issues are data mining the modeling process does not violate this law borders. Most sheriff's office and police departments are used electronic systems for criminal reporting instead traditional paper based crime reports. This is the crime the following types of information are available for information:  The crime type, date / time, location, etc.  The suspect's information (identity or Unidentified),  victim and witness. In addition, there crime and modus story or interpretation usually running in text form (MO). Police Officers or detectives use free text to record most of them Insights that are not included in the test box pre-determined questions. The first two sections the information is usually stored on the computer databases number, character or date table fields lastly, a free text is often saved. The data mining crime is becoming increasingly challenging from the free text field. When you can give free text fields magazine columnist, a great story line, will change them data mining attributes are not always an easy job. We are let's see how to attain remarkable attributes data mining models. 3. DATAMINING AND CRIME PATTERNS Let's see how to change the information about crime. A data mining problem [2], that it can help The detectives we found inside the cracks quickly solved a clerk of crime is a group of a crime geographic zone or crime is a hot place. Whereas, data mining term is a cluster of similar data points - a possible crime method. That is appropriate clusters or a subset of the cluster should have a must letter to criminal forms. There are clustering algorithms in the data mining those recordings are identical to the identification task of groups they differ from themselves but from others data. Some of these clusters are useful in our case to find one or only one criminal action a group of suspects. This information is the next one the challenge is to find the best providing variables gallery. These clusters will be provided later the detectives chase the expertise of their domain. The automatically detects and allows criminal procedures detectives focus on the first guerilla qualities and make a solution these crimes are the complete "laughs" or the decision to solve in some cases, if the incidents are suspected a mob can create from full source bits of bits of information from each of the offenses are bits Incidents. For example, a crime site reveals the suspicion black hair reveals that the next incident / witness the suspect reveals that the person is middle age and the third is a green the left hand will give it all together more complete no more than one film alone. Without doubt criminal method, detective is less likely to develop complete image from bits of different information crime incidents. Most of today are made manually the reports indicate that with the help of a duplicate multi-sheet usually from computer data researchers and their own crime records. We choose to use any cluster technique because crimes, such as the supervision technique of classification There are often widespread and criminal databases many unsolved crimes. So, classification The technique will be dependent on that and will be resolved crimes do not bring good forecasts for the future offenses. The nature of the crimes that vary over time internet-based cyber crimes or cell phones are crimes used it is unusual for a long time ago. Thus, it should be In the future you can find new and unknown forms, clustering techniques work better. 4. CLUSTERNING TECHNIQUES USED We will see some of our contributions in this section inspection. here's a simple clustering example. Let's take a very simple case of crime record. A statement based on crime data analyst or detective This data is sorted in different rows, usually the first type Basically the most important characteristic is detective experience. Crime type Susp ect race Suspect sex Suspect age group Victim age group Weapon Robbery B MALE MIDDLE ELDERLY KNIEF Robbery W MALE YOUNG MIDDLY BAT Robbery B MALE YOUNG ELDERLY KNIEF Robbery B FEMALE MIDDLE MIDDLE PISTON
  • 3. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4865 We see Table 1 as a simple example of the crime list. The offense is crime and it will be very much important attribute. rows 1 and 3 show a simple crime The method where the doubt is matched and affected The profile also resembles. The goal here is that we can use data the mine that finds the most complex forms from the mine there are many factors in life or crime and many other factors there are some information about the crime. A General case It is not easy for a computer data analyst or detective can identify these types with a simple query. Thus using the data mining comes bunch technique It's easy to handle large-scale data and handling loud or missing information about criminal cases. We're using k-means clustering technique here the most widely used data mining cluster technology. Next, the most important part was to prepare the data this analysis. The actual crime data is derived from a Sheriff's office, under unrecognized agreements crime reporting system. functional data modify data with extraction change. Later, some checks were directed to view quality of data, such as missing information, borders and more blank, unknown or contractions for the same word this applies to older people who have not yet seen everyone. If the these are not marked as a value, creating clustering these are multiple groups of the same logical value. Next the task was to identify significant characteristics gallery. This process speaks to the domain criminals, criminal investigators, and experts analysts and on the other hand the characteristic importance the algorithm for the classical character set for the protocol types of crime we see this tool or expert based paradigm to solve the problem. Different attributes are based on criminality It is important to be aged It is important for the massacre, not to loot the robbery It's important not to worry about the pregnancy age owner of the house. Take care of different attributes differently we introduced the concept of crimes that we weigh attributes. This allows for different weights various attributes are based on the changing types of crime cluster. This allows weight unlike numerical traits, classified attributes They can easily weigh them. Using integrated weights may have attributed attributes reflected programs that were designed to increase performance weight of that variable or feature. We have not seen use cluster weight in other places in literature all attributes, such as review, normalization, are considered equal clustering algorithm significance. However, we are this lightweight technique is introduced here in our light semi-supervision or professional-based method. basically With our weighted clustering attributes, we clustered databases blame the methods and then present the results domain expert with detective or statistics important attributes. Detective groups, first see small clusters Then offers expert recommendations. This is the performance the process helps to determine the characteristic characteristics weights for different crime categories. Based on this information from domain expert, i.e. detective, future crime methods can be detected. First futures or unresolved crimes are based on significant attributes and consequently detective individuals inspection. This is because the cluster exercise, the groups hundreds of crimes can be either small groups or related crimes, it makes the detective work much easier find the methods of crime. The other approach is to use a small set of new offenses using the data and the tracers to score it against the existing clusters or known crime incidents injected into a new data set then compare the new clusters related to the treasury. The process of using the trackers is similar to the application find out that there are no radioactive trucks It's hard to find.
  • 4. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4866 Figure 2 Plot of crime clusters with legend for significant attributes for that crime pattern 5. RESULTS AND CRIME PATTERN The proposed system is used in conjunction with globally plot. The crime analyst can choose the time and the one or some kind of crime and kind of geography show the resulting map. From this set, the user may be select the entire set or interest circle. The resulting data set is data source of data mining processing. These are based on records pre-determined attributes are weighed. The as a result, clusters have potential criminal forms. The as a result, clusters are planned in a global-wide conspiracy. We would show results in the picture above. Other clusters or crime shapes are color-coded. Each the group provides the total number of mythological crimes these include events that are included with significant ones attributes to heal characteristics. This information be careful when looking for a deduction experiment predictable crime clusters. We've reviewed our results for the criminalized forms found by holding court demonstrations on these crime cases whether the allegations against suspects were accepted or not rejected. So starting point is crime event data (some of these crimes were already in court abuse / system) measured by significant attributes or features or crime variables such as crime statistics, The suspect is the victim the court ruling was used in the cluster process. Then, we clustered offenses on our basis the weighing technique should come with crime groups (Clusters in the data mining term) possible criminal methods of crime. Geo-Spatial Significantly, the conspiracy of these criminal forms The attributes of measuring these groups are provided detectives with easy task to identify now the crime is more than a list of hundreds of crimes non-contact orders or events in some predetermined categories order. In our case, we have seen criminal forms below is shown in the same colors and saw in court checks to check some of the data mining fluids or there were allegations of similar criminals. 6. CONCLUSIONS AND FUTURE DIRECTION We saw the use of data mining for identification crime system is a crime system techniques. Our contribution here was to blame Finding the model as a machine learning task and through it using data mining in solving police detectives Offenses. We identified remarkable attributes; Using professional based semi-monitoring learning method and developed a considerable amount of planning attributes. Our modeling technique was able to identify crimes will create a large number of crimes criminal detectives work easier. Some of our disadvantages are blame the method analysis can only help detective, not replace they. Further data mining data is sensitive to input quality it may be wrong, the information may have been lost and may be data entry error is incorrect. The actual data will be mapped to data mining properties are not always an easy task effective data mining and crime data inspector is required good field knowledge. They have to work closely a detective in the early stages. We will create the future expansion of this study models for measuring hot spots [3] to assist crime In most of the crimes involving police involvement allows you to be more useful for any particular window using police resources we plan to see developing social networks to connect criminals, investigate suspects, gangs and their relationships. There is more capacity to search for suspicious explanations regional, FBI databases [4], for traffic violation databases helping detecting crime from different states or more specifically facing the terrarium operations add value to this crime detection precedent. 7. References 1) Hsinchun Chen, Wingyan Chung, Yi Qin, Michael Chau, Jennifer Jie Xu, Gang Wang, Rong Zheng, Homa Atabakhsh, “Crime Data Mining: An Overview and Case Studies”, AI Lab, University of Arizona, proceedings National Conference on Digital Government Research, 2003, 2) Hsinchun Chen, Wingyan Chung, Yi Qin, Michael Chau, Jennifer Jie Xu, Gang Wang, Rong Zheng, Homa Atabakhsh, “Crime Data Mining: A General Framework and Some Examples”, IEEE Computer Society April 2004.
  • 5. INTERNATIONAL RESEARCH JOURNAL OF ENGINEERING AND TECHNOLOGY (IRJET) E-ISSN: 2395-0056 VOLUME: 06 ISSUE: 03 | MAR 2019 WWW.IRJET.NET P-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 4867 3) C McCue, “Using Data Mining to Predict and Prevent Violent Crimes”, 4) Whitepaper, “Oracle’s Integration Hub For Justice And Public Safety”, Oracle Corp. 2004, 5) Shyam Varan Nath " Crime Pattern Detection Using Data Mining"