Submit Search
Upload
IRJET- Online Crime Reporting and Management System using Data Mining
•
0 likes
•
132 views
IRJET Journal
Follow
https://www.irjet.net/archives/V7/i1/IRJET-V7I107.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
Online Crime Reporting System
Online Crime Reporting System
Kusum Sankhala
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET Journal
Online Crime Reporting ppt
Online Crime Reporting ppt
ShirinAkhtar5
Online Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHP
Tuhin Ray
Online crime reporting system ppt
Online crime reporting system ppt
YOGESH SHARMA
E-Police Android APP
E-Police Android APP
Mithilesh Rajbhar
Online FIR System
Online FIR System
maneesh katara
Police Management System
Police Management System
Shane Williams
Recommended
Online Crime Reporting System
Online Crime Reporting System
Kusum Sankhala
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET- Public Crime Reporting and Monitoring System Model using SDM
IRJET Journal
Online Crime Reporting ppt
Online Crime Reporting ppt
ShirinAkhtar5
Online Crime Reporting System By Using PHP
Online Crime Reporting System By Using PHP
Tuhin Ray
Online crime reporting system ppt
Online crime reporting system ppt
YOGESH SHARMA
E-Police Android APP
E-Police Android APP
Mithilesh Rajbhar
Online FIR System
Online FIR System
maneesh katara
Police Management System
Police Management System
Shane Williams
Crime Management System final year project
Crime Management System final year project
Beresa Abebe
Crime file system
Crime file system
deva491
Android based crime manage system proposal
Android based crime manage system proposal
Beresa Abebe
Crime report
Crime report
Adarsh Uttarkar
CRMS
CRMS
Muhammad Bilal
Project Report On Online Crime Management Application
Project Report On Online Crime Management Application
satvirsandhu9
ppt on e crime management system
ppt on e crime management system
Krishna Kinkar Jha
Crime filterd(ppt)
Crime filterd(ppt)
Nidhi Singh
Secure crime identification system
Secure crime identification system
Sameer Telikicherla
Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia
fowzi mohamed
Report police - 6 month training project
Report police - 6 month training project
Janella
Crime record
Crime record
Rishitha Reddy
Crime
Crime
Govind Naik
Ppt
Ppt
srisrisrisrisri
Crime investigation system
Crime investigation system
Deepa Rani
Online FIR System in KPK
Online FIR System in KPK
Ashir Iqbal
Criminal Record Management
Criminal Record Management
Khokan Sardar
Project
Project
swapoonam
Online Voting System-using Advanced Java
Online Voting System-using Advanced Java
Sarthak Srivastava
Online voting system presentation slide (1)
Online voting system presentation slide (1)
wasi0013
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
IRJET Journal
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
More Related Content
What's hot
Crime Management System final year project
Crime Management System final year project
Beresa Abebe
Crime file system
Crime file system
deva491
Android based crime manage system proposal
Android based crime manage system proposal
Beresa Abebe
Crime report
Crime report
Adarsh Uttarkar
CRMS
CRMS
Muhammad Bilal
Project Report On Online Crime Management Application
Project Report On Online Crime Management Application
satvirsandhu9
ppt on e crime management system
ppt on e crime management system
Krishna Kinkar Jha
Crime filterd(ppt)
Crime filterd(ppt)
Nidhi Singh
Secure crime identification system
Secure crime identification system
Sameer Telikicherla
Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia
fowzi mohamed
Report police - 6 month training project
Report police - 6 month training project
Janella
Crime record
Crime record
Rishitha Reddy
Crime
Crime
Govind Naik
Ppt
Ppt
srisrisrisrisri
Crime investigation system
Crime investigation system
Deepa Rani
Online FIR System in KPK
Online FIR System in KPK
Ashir Iqbal
Criminal Record Management
Criminal Record Management
Khokan Sardar
Project
Project
swapoonam
Online Voting System-using Advanced Java
Online Voting System-using Advanced Java
Sarthak Srivastava
Online voting system presentation slide (1)
Online voting system presentation slide (1)
wasi0013
What's hot
(20)
Crime Management System final year project
Crime Management System final year project
Crime file system
Crime file system
Android based crime manage system proposal
Android based crime manage system proposal
Crime report
Crime report
CRMS
CRMS
Project Report On Online Crime Management Application
Project Report On Online Crime Management Application
ppt on e crime management system
ppt on e crime management system
Crime filterd(ppt)
Crime filterd(ppt)
Secure crime identification system
Secure crime identification system
Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia
Report police - 6 month training project
Report police - 6 month training project
Crime record
Crime record
Crime
Crime
Ppt
Ppt
Crime investigation system
Crime investigation system
Online FIR System in KPK
Online FIR System in KPK
Criminal Record Management
Criminal Record Management
Project
Project
Online Voting System-using Advanced Java
Online Voting System-using Advanced Java
Online voting system presentation slide (1)
Online voting system presentation slide (1)
Similar to IRJET- Online Crime Reporting and Management System using Data Mining
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
IRJET Journal
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET Journal
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET Journal
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
IRJET Journal
Crime Prediction and Reporting System
Crime Prediction and Reporting System
IRJET Journal
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
IRJET Journal
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET Journal
Crime Prediction and Analysis
Crime Prediction and Analysis
IRJET Journal
Ijarcce 6
Ijarcce 6
Daniel John
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
IRJET Journal
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET Journal
Critical analysis of genetic algorithm based IDS and an approach for detecti...
Critical analysis of genetic algorithm based IDS and an approach for detecti...
IOSR Journals
Log management siem 5651 sayılı yasa
Log management siem 5651 sayılı yasa
Ertugrul Akbas
Enhancing SIEM Correlation Rules Through Baselining
Enhancing SIEM Correlation Rules Through Baselining
Ertugrul Akbas
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
IRJET Journal
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET Journal
IRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET Journal
Fraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
IRJET Journal
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
IRJET Journal
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET Journal
Similar to IRJET- Online Crime Reporting and Management System using Data Mining
(20)
IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
Crime Prediction and Reporting System
Crime Prediction and Reporting System
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
Crime Prediction and Analysis
Crime Prediction and Analysis
Ijarcce 6
Ijarcce 6
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
Critical analysis of genetic algorithm based IDS and an approach for detecti...
Critical analysis of genetic algorithm based IDS and an approach for detecti...
Log management siem 5651 sayılı yasa
Log management siem 5651 sayılı yasa
Enhancing SIEM Correlation Rules Through Baselining
Enhancing SIEM Correlation Rules Through Baselining
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor Network
Fraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute Resolution
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
jennyeacort
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
rehmti665
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
SAURABHKUMAR892774
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
dollysharma2066
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Low Rate Call Girls In Saket, Delhi NCR
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Chandu841456
Effects of rheological properties on mixing
Effects of rheological properties on mixing
viprabot1
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
LewisJB
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
VICTOR MAESTRE RAMIREZ
Recently uploaded
(20)
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Effects of rheological properties on mixing
Effects of rheological properties on mixing
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
IRJET- Online Crime Reporting and Management System using Data Mining
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 34 Online Crime Reporting and Management System using Data Mining Pradnya Ogale1, Mayuri Chormale2, Pinaki Babar3, Shridhar Shinde4 1,2,3,4B.E. Student, Dept. of Computer Engineering, Sinhgad College of Engineering, Vadgaon, Pune- 411041, Maharashtra, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The aim of this project is to develop an online managing crime report system which is accessible to the common public and the police department easily. The system provides users with the information about the crime rates ofa desired area. This is useful for tourists who are entering in an unvisited area. If the user enters in 100 meter radius of a high alert area then he/she will be notified with an alert message. The user gets notified about the different crime rates in the area and can provide the safest path to the desired destination. Also, the system registers the complaintsfromthe people through online web application where they canupload images and videos of the crime and it will be helpful for the police department in catching criminals. The person can give complaint at any time. Key Words: KNN Algorithm, AES Algorithm, K-Means Algorithm. 1. INTRODUCTION Crime is a part of illegal activities in human life. The rise of population and complex society rises the rangeofanti-social conducts that must be restricted by thegovernmentthrough the military and different organizations particularly the Police Force. There are many current crime management systems which faces several difficulties, as thereisnomeans to report crime instantly other than phone calls, messaging or face-to-face compliant filing. Hence, we have proposed an online crime reporting system which allows the user to file complaints or missing reports and keep a track of it. There are 3 categories that a user can file; Complaint,CrimeReport and Missing Report and can see all the status of what action has been taken by the admin. To file any of the above 3 complaints, the user should register in to the system and provide his right credentials to file them. The crime reporting system projectalsoallowsotheruserswhodoesn’t want to register but can check the crimes happening at his/her or any other area, has to just provide the pin code and in return the system displays the list of crimes if any filed. The offline i.e. the unregistered user can also take advantage of checking the missingpersondetails,buthe/she is refrained from getting complaints done by the users. The Front End of the crime reporting system is done using Android Studio and SQL serves as a backend to store books lists and inventory data. The system, has both the user as well the Admin Part, the role of admin is to just check all the 3 modules or categories and update their status likewise. This system helps the users in tracking any report filed to the law and take an advantage of reporting any complaint from anywhere bringing the whole system online. 1.1 Literature Survey 1. Sunil Yadav illustrate that how social development may lead to crime prevention so that toincreasethe predictive accuracy supervised, semi-supervised and unsupervised learning technique are used and also k-means is used to create number of clusters. 2. Rasoul Kiani Siamak Mahdavi, Amin Keshavarzi have analysed, the main objective of this paper is to classify clustered crimes based on occurrence frequency during different years. Data mining is used extensively in terms of analysis, investigation and discovery of patternsfor occurrenceofdifferent crimes. 3. Shyam Varan Nath have used the clustering algorithm for a data mining approach to help detect the crimes patterns and speed up the process of solving crime. We will look at k-means clustering with some enhancements to aid in the process of identification of crime patterns. 2. Project Overview The crime rates accelerate continuously and the crime patterns are constantly changing. According to National CrimeRecordsBureau,crimeagainstwomenhassignificantly increased in recent years. It has becomethe most prior tothe administration to enforce law and order to reduce this increasing rate of the crime against women. We illustrates how social development may lead tocrimeprevention.Sowe are developing the system which can used to detect and predict the crimes for the area where the person or user currently stand. Crime detection and analysis will be to generate the crime hot-spots that will help in deployment of police at mostly likely places of crimeforanywindowoftime, to allow most effective utilization of police resources. The developed model will reduce crimes and will help the crime detection field in many ways that is from arresting the criminals to reducing the crimes by carrying out various necessary measures. We add the woman safety module for security. When women press the power button of android mobile 3 to 4 times then help message send to relatives or police. Due to this we reduce crime in the society and in country. Here we use module of crime capture means user can capture the photo of crime send topolice. There is user or actors which are as follows, 1. User has theaccountandforaccessingthathe/shemust be provide the correct username and password.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 35 2.Alluse-casesforthesoftwarearepresented. Description of all main Use cases use case template is to be provided. 3. A use case diagram in the Unified Modeling Language (UML) is a type of behavioraldiagram definedbyandcreated from a Use-case analysis. Itspurpose is to presentagraphical overview of thefunctionalityprovidedbyasystemintermsof actors, their goals (represented as use cases), and any dependenciesbetweenthoseusecases. Themainpurposeofa use case diagram is to show what system functions are performed for which actor. Roles of the actors in the system can be depicted. [A]AES Encryption Process AES is an iterative rather than Feistel cipher. It is based on substitution permutation network. Itcomprises ofa series of linked operations, some of which involvereplacing inputs by specific outputs (substitutions) and others involve shuffling bitsaround(permutations). Interestingly,AESperformsallits computations on bytes rather than bits. These 16 bytes are arranged in four columns and four rows for processing as a matrix. Unlike DES, the number of rounds in AES is variable and depends on the length of the key. Each of these rounds uses a different 128-bit round key, which is calculated from the original AES key. In present day cryptography, AES is widely adopted and supported in both hardware and software. Till date, no practical cryptanalytic attacks against AES have been discovered. Additionally, AES has built-in flexibility of key length, which allows a degree of future- proofingagainstprogressintheability to perform exhaustive key searches. However, just as for DES, the AES security is assured only if it is correctly implemented and good key management is employed. The encryption process uses a set ofspeciallyderivedkeyscalledroundkeys. Theseareapplied, along with other operations, on an array of data that holds exactlyoneblockofdata? thedatatobeencrypted.Thisarray we call the state array. You take the following AES stepsofencryptionfor128-bit block: • Derive the set of round keys from the cipher key. • Initialize the state array with the block data (plaintext). • Add the initial round key to the starting state array. • Perform nine rounds of state manipulation. Fig-1: AES Algorithm The reason that the rounds have been listed as “nine followed by a final tenth round” is because the tenthround involves a slightly different manipulation from the others. Theblocktobeencryptedisjusta sequence of 128bits.AES works with byte quantities so we first convert the 128 bits into 16 bytes. We say “convert,” but, in reality, it is almost certainly stored this way already. Operations in RSN/AES are performed on a two-dimensional byte array of four rows and four columns. At the start of the encryption, the 16 bytes of data, numbered D0 ? D15, are loaded into the array as shown in following Table A. Each round of the encryption process requires a series of steps to alter the statearray. These stepsinvolve four types of operations called: 1. SubBytes 2. ShiftRows 3. MixColumns [B]Data Mining Data mining is a new technology, which helps organizations to process data through algorithms to uncover meaningful patterns and correlations from large databases that otherwise may not be possible with standard analysis and reporting. Data mining tools can helps to understand the business better and also improve future performance through predictive analysis and make them proactive and allow knowledge driven decisions. Issues related to information extraction fro large databases, data miningfield brings together methods from several domainslikeMachine Learning, Statistics, Pattern Recognition, Databases and Visualizations. Data Mining fields find its application in
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 36 market analysis and, managementlikefor examplecustomer relationship, management, cross selling, market segmentation. It can also be used in risk analysis and management for forecasting, customer retention, improved underwriting, quality control, competitive analysis and credit scoring. [C]System Architecture Fig:2 System Architecture [D]Feasibility Analysis Np-hard Np-Complete: • What is P? P is set of all decision problems which can be solved in polynomial time by a deterministic. Since it can be solved in polynomial time, it can be verified in polynomial time. Therefore P is a subset of NP. P: Crime is a matter of major concern to society, it must be checked. Although crime, being an integral part of civilization, it can definitely be kept within limits. The task of maintaining peace and order is delegated internally to the police. What is NP? “NP” means “we can solve it in polynomial time if we can break the normal rules of step-by-step computing”. What is NP Hard? A problem is NP-hard if an algorithm for solving it can be translated into one for solving any NP-problem (nondeterministic polynomial time) problem. NP-hard therefore means” at least as hard as any NP-problem,” although it might, in fact, be harder. NP-Hard: It would be very difficult to only go through the manual process of crime reporting to police portal. So here in this case the P problem is NP hard. i.e. P=NP-Hard What is NP-Complete? Since this amazing ”N” computer can also do anythinga normal computer can, we know that ”P” problems are also in ”NP”. So, the easy problems are in ”P” (and ”NP”), but the really hard ones are *only* in ”NP”, and they are called ”NP-complete”. It is like saying there are things that People can do (”P”), there are things that Super People
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 37 can do (”SP”), and there are things *only* Super People can do (”SP-complete”). NP-Complete: Crime detection and analysis will be to generate the crime hot-spots that will help in deployment of police at most likely places of crime for anygiven window of time, to allow most effective utilization of police resources. [E]K – Nearest Neighbor NP Analysis K–Nearest Neighbor algorithm is a Machine Learning Classification Technique. Itis usedtoclassifya givenelement into one of the classes which is closest to the element. Consider a data set of ‘n’ samples and ‘d’ dimensions. There is a point of interest whose class we want to determine on a two-dimensional plot. We calculatethedistance betweenthe point of interest to all other points in the data set.. If the data set is small with less number of dimensions, this algorithm runs in a reasonable amount of time. Since the time complexity of K–Nearest Neighbor algorithm using Brute Force Approach is the algorithm runs in polynomial time and hence fall under P class of Problems. 3. CONCLUSION The developed model will help reduce crimes and will help the crime detection field in many ways that is from arresting the criminals to reducing the crimes by carrying out various necessary measures. The project is helpful forgeneral public in getting information about the crime status of the area and get a safe path to a desired destination. REFERENCES [1] J. Agarwal, R. Nagpal, and R. Sehgal, ―Crime analysis using k-means clustering, International Journal ofComputer Applications, Vol. 83 – No4, December 2013. [2] J. Han, and M. Kamber, ―Data mining: concepts and techniques, Jim Gray, Series Editor Morgan Kaufmann Publishers, August 2000. [3] P. Berkhin, ―Survey ofclusteringdata miningtechniques, In: Accrue Software, 2003. [4] W. Li, ―Modified k-means clustering algorithm, IEEE Congress on Image and Signal Processing, pp. 616- 621, 2006. [5] D.T Pham, S. Otri, A. Afifty, M. Mahmuddin, and H. Al- Jabbouli, Data clustering using the Bees algorithm, proceedings of 40th CRIP International Manufacturing Systems Seminar, 2006. [6] J. Han, and M. Kamber, ―Data mining: concepts and techniques, 2nd Edition, Morgan Kaufmann Publisher,2001.
Download now