SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 34
Online Crime Reporting and Management System using Data Mining
Pradnya Ogale1, Mayuri Chormale2, Pinaki Babar3, Shridhar Shinde4
1,2,3,4B.E. Student, Dept. of Computer Engineering, Sinhgad College of Engineering, Vadgaon, Pune- 411041,
Maharashtra, India
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The aim of this project is to develop an online
managing crime report system which is accessible to the
common public and the police department easily. The system
provides users with the information about the crime rates ofa
desired area. This is useful for tourists who are entering in an
unvisited area. If the user enters in 100 meter radius of a high
alert area then he/she will be notified with an alert message.
The user gets notified about the different crime rates in the
area and can provide the safest path to the desired
destination. Also, the system registers the complaintsfromthe
people through online web application where they canupload
images and videos of the crime and it will be helpful for the
police department in catching criminals. The person can give
complaint at any time.
Key Words: KNN Algorithm, AES Algorithm, K-Means
Algorithm.
1. INTRODUCTION
Crime is a part of illegal activities in human life. The rise of
population and complex society rises the rangeofanti-social
conducts that must be restricted by thegovernmentthrough
the military and different organizations particularly the
Police Force. There are many current crime management
systems which faces several difficulties, as thereisnomeans
to report crime instantly other than phone calls, messaging
or face-to-face compliant filing. Hence, we have proposed an
online crime reporting system which allows the user to file
complaints or missing reports and keep a track of it. There
are 3 categories that a user can file; Complaint,CrimeReport
and Missing Report and can see all the status of what action
has been taken by the admin. To file any of the above 3
complaints, the user should register in to the system and
provide his right credentials to file them. The crime
reporting system projectalsoallowsotheruserswhodoesn’t
want to register but can check the crimes happening at
his/her or any other area, has to just provide the pin code
and in return the system displays the list of crimes if any
filed. The offline i.e. the unregistered user can also take
advantage of checking the missingpersondetails,buthe/she
is refrained from getting complaints done by the users. The
Front End of the crime reporting system is done using
Android Studio and SQL serves as a backend to store books
lists and inventory data. The system, has both the user as
well the Admin Part, the role of admin is to just check all the
3 modules or categories and update their status likewise.
This system helps the users in tracking any report filed to
the law and take an advantage of reporting any complaint
from anywhere bringing the whole system online.
1.1 Literature Survey
1. Sunil Yadav illustrate that how social development
may lead to crime prevention so that toincreasethe
predictive accuracy supervised, semi-supervised
and unsupervised learning technique are used and
also k-means is used to create number of clusters.
2. Rasoul Kiani Siamak Mahdavi, Amin Keshavarzi
have analysed, the main objective of this paper is to
classify clustered crimes based on occurrence
frequency during different years. Data mining is
used extensively in terms of analysis, investigation
and discovery of patternsfor occurrenceofdifferent
crimes.
3. Shyam Varan Nath have used the clustering
algorithm for a data mining approach to help detect
the crimes patterns and speed up the process of
solving crime. We will look at k-means clustering
with some enhancements to aid in the process of
identification of crime patterns.
2. Project Overview
The crime rates accelerate continuously and the crime
patterns are constantly changing. According to National
CrimeRecordsBureau,crimeagainstwomenhassignificantly
increased in recent years. It has becomethe most prior tothe
administration to enforce law and order to reduce this
increasing rate of the crime against women. We illustrates
how social development may lead tocrimeprevention.Sowe
are developing the system which can used to detect and
predict the crimes for the area where the person or user
currently stand. Crime detection and analysis will be to
generate the crime hot-spots that will help in deployment of
police at mostly likely places of crimeforanywindowoftime,
to allow most effective utilization of police resources. The
developed model will reduce crimes and will help the crime
detection field in many ways that is from arresting the
criminals to reducing the crimes by carrying out various
necessary measures. We add the woman safety module for
security. When women press the power button of android
mobile 3 to 4 times then help message send to relatives or
police. Due to this we reduce crime in the society and in
country. Here we use module of crime capture means user
can capture the photo of crime send topolice.
There is user or actors which are as follows,
1. User has theaccountandforaccessingthathe/shemust
be provide the correct username and password.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 35
2.Alluse-casesforthesoftwarearepresented. Description
of all main Use cases use case template is to be provided.
3. A use case diagram in the Unified Modeling Language
(UML) is a type of behavioraldiagram definedbyandcreated
from a Use-case analysis. Itspurpose is to presentagraphical
overview of thefunctionalityprovidedbyasystemintermsof
actors, their goals (represented as use cases), and any
dependenciesbetweenthoseusecases. Themainpurposeofa
use case diagram is to show what system functions are
performed for which actor. Roles of the actors in the system
can be depicted.
[A]AES Encryption Process
AES is an iterative rather than Feistel cipher. It is based on
substitution permutation network. Itcomprises ofa series of
linked operations, some of which involvereplacing inputs by
specific outputs (substitutions) and others involve shuffling
bitsaround(permutations). Interestingly,AESperformsallits
computations on bytes rather than bits. These 16 bytes are
arranged in four columns and four rows for processing as a
matrix. Unlike DES, the number of rounds in AES is variable
and depends on the length of the key. Each of these rounds
uses a different 128-bit round key, which is calculated from
the original AES key. In present day cryptography, AES is
widely adopted and supported in both hardware and
software. Till date, no practical cryptanalytic attacks against
AES have been discovered. Additionally, AES has built-in
flexibility of key length, which allows a degree of future-
proofingagainstprogressintheability to perform exhaustive
key searches. However, just as for DES, the AES security is
assured only if it is correctly implemented and good key
management is employed. The encryption process uses a set
ofspeciallyderivedkeyscalledroundkeys. Theseareapplied,
along with other operations, on an array of data that holds
exactlyoneblockofdata? thedatatobeencrypted.Thisarray
we call the state array.
You take the following AES stepsofencryptionfor128-bit
block:
• Derive the set of round keys from the cipher key.
• Initialize the state array with the block data
(plaintext).
• Add the initial round key to the starting state array.
• Perform nine rounds of state manipulation.
Fig-1: AES Algorithm
The reason that the rounds have been listed as “nine
followed by a final tenth round” is because the tenthround
involves a slightly different manipulation from the others.
Theblocktobeencryptedisjusta sequence of 128bits.AES
works with byte quantities so we first convert the 128 bits
into 16 bytes. We say “convert,” but, in reality, it is almost
certainly stored this way already. Operations in RSN/AES
are performed on a two-dimensional byte array of four
rows and four columns. At the start of the encryption, the
16 bytes of data, numbered D0 ? D15, are loaded into the
array as shown in following
Table A. Each round of the encryption process requires
a series of steps to alter the statearray. These stepsinvolve
four types of operations called:
1. SubBytes
2. ShiftRows
3. MixColumns
[B]Data Mining
Data mining is a new technology, which helps organizations
to process data through algorithms to uncover meaningful
patterns and correlations from large databases that
otherwise may not be possible with standard analysis and
reporting. Data mining tools can helps to understand the
business better and also improve future performance
through predictive analysis and make them proactive and
allow knowledge driven decisions. Issues related to
information extraction fro large databases, data miningfield
brings together methods from several domainslikeMachine
Learning, Statistics, Pattern Recognition, Databases and
Visualizations. Data Mining fields find its application in
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 36
market analysis and, managementlikefor examplecustomer
relationship, management, cross selling, market
segmentation. It can also be used in risk analysis and
management for forecasting, customer retention, improved
underwriting, quality control, competitive analysis and
credit scoring.
[C]System Architecture
Fig:2 System Architecture
[D]Feasibility Analysis
Np-hard Np-Complete:
• What is P?
P is set of all decision problems which can be solved in
polynomial time by a deterministic.
Since it can be solved in polynomial time, it can be verified
in polynomial time.
Therefore P is a subset of NP.
P: Crime is a matter of major concern to society, it must be
checked. Although crime, being an integral part of
civilization, it can definitely be kept within limits. The task
of maintaining peace and order is delegated internally to
the police.
What is NP?
“NP” means “we can solve it in polynomial time if we can
break the normal rules of step-by-step computing”.
What is NP Hard?
A problem is NP-hard if an algorithm for solving it can be
translated into one for solving any NP-problem
(nondeterministic polynomial time) problem. NP-hard
therefore means” at least as hard as any NP-problem,”
although it might, in fact, be harder.
NP-Hard: It would be very difficult to only go through the
manual process of crime reporting to police portal.
So here in this case the P problem is NP hard.
i.e. P=NP-Hard
What is NP-Complete?
 Since this amazing ”N” computer can also do anythinga
normal computer can, we know that ”P” problems are
also in ”NP”.
 So, the easy problems are in ”P” (and ”NP”), but the
really hard ones are *only* in ”NP”, and they are called
”NP-complete”.
 It is like saying there are things that People can do
(”P”), there are things that Super People
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 37
can do (”SP”), and there are things *only* Super People can
do (”SP-complete”).
NP-Complete: Crime detection and analysis will be to
generate the crime hot-spots that will help in deployment of
police at most likely places of crime for anygiven window of
time, to allow most effective utilization of police resources.
[E]K – Nearest Neighbor NP Analysis
K–Nearest Neighbor algorithm is a Machine Learning
Classification Technique. Itis usedtoclassifya givenelement
into one of the classes which is closest to the element.
Consider a data set of ‘n’ samples and ‘d’ dimensions. There
is a point of interest whose class we want to determine on a
two-dimensional plot. We calculatethedistance betweenthe
point of interest to all other points in the data set.. If the data
set is small with less number of dimensions, this algorithm
runs in a reasonable amount of time. Since the time
complexity of K–Nearest Neighbor algorithm using Brute
Force Approach is the algorithm runs in polynomial time
and hence fall under P class of Problems.
3. CONCLUSION
The developed model will help reduce crimes and will help
the crime detection field in many ways that is from arresting
the criminals to reducing the crimes by carrying out various
necessary measures. The project is helpful forgeneral public
in getting information about the crime status of the area and
get a safe path to a desired destination.
REFERENCES
[1] J. Agarwal, R. Nagpal, and R. Sehgal, ―Crime analysis
using k-means clustering, International Journal ofComputer
Applications, Vol. 83 – No4, December 2013.
[2] J. Han, and M. Kamber, ―Data mining: concepts and
techniques, Jim Gray, Series Editor Morgan Kaufmann
Publishers, August 2000.
[3] P. Berkhin, ―Survey ofclusteringdata miningtechniques,
In: Accrue Software, 2003.
[4] W. Li, ―Modified k-means clustering algorithm, IEEE
Congress on Image and Signal Processing, pp. 616- 621,
2006.
[5] D.T Pham, S. Otri, A. Afifty, M. Mahmuddin, and H. Al-
Jabbouli, Data clustering using the Bees algorithm,
proceedings of 40th CRIP International Manufacturing
Systems Seminar, 2006.
[6] J. Han, and M. Kamber, ―Data mining: concepts and
techniques, 2nd Edition, Morgan Kaufmann Publisher,2001.

More Related Content

What's hot

Crime Management System final year project
Crime Management System final year projectCrime Management System final year project
Crime Management System final year projectBeresa Abebe
 
Crime file system
Crime file system Crime file system
Crime file system deva491
 
Android based crime manage system proposal
Android based crime manage system proposalAndroid based crime manage system proposal
Android based crime manage system proposalBeresa Abebe
 
Project Report On Online Crime Management Application
Project Report On Online Crime Management ApplicationProject Report On Online Crime Management Application
Project Report On Online Crime Management Applicationsatvirsandhu9
 
ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management systemKrishna Kinkar Jha
 
Crime filterd(ppt)
Crime filterd(ppt)Crime filterd(ppt)
Crime filterd(ppt)Nidhi Singh
 
Secure crime identification system
Secure crime identification systemSecure crime identification system
Secure crime identification systemSameer Telikicherla
 
Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia  Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia fowzi mohamed
 
Report police - 6 month training project
Report police - 6 month training project Report police - 6 month training project
Report police - 6 month training project Janella
 
Crime investigation system
Crime investigation systemCrime investigation system
Crime investigation systemDeepa Rani
 
Online FIR System in KPK
Online FIR System in KPKOnline FIR System in KPK
Online FIR System in KPKAshir Iqbal
 
Criminal Record Management
Criminal Record ManagementCriminal Record Management
Criminal Record ManagementKhokan Sardar
 
Online Voting System-using Advanced Java
Online Voting System-using Advanced JavaOnline Voting System-using Advanced Java
Online Voting System-using Advanced JavaSarthak Srivastava
 
Online voting system presentation slide (1)
Online voting system presentation slide (1)Online voting system presentation slide (1)
Online voting system presentation slide (1)wasi0013
 

What's hot (20)

Crime Management System final year project
Crime Management System final year projectCrime Management System final year project
Crime Management System final year project
 
Crime file system
Crime file system Crime file system
Crime file system
 
Android based crime manage system proposal
Android based crime manage system proposalAndroid based crime manage system proposal
Android based crime manage system proposal
 
Crime report
Crime reportCrime report
Crime report
 
CRMS
CRMSCRMS
CRMS
 
Project Report On Online Crime Management Application
Project Report On Online Crime Management ApplicationProject Report On Online Crime Management Application
Project Report On Online Crime Management Application
 
ppt on e crime management system
ppt on e crime management systemppt on e crime management system
ppt on e crime management system
 
Crime filterd(ppt)
Crime filterd(ppt)Crime filterd(ppt)
Crime filterd(ppt)
 
Secure crime identification system
Secure crime identification systemSecure crime identification system
Secure crime identification system
 
Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia  Criminal Record Management System in the Perspective of Somalia
Criminal Record Management System in the Perspective of Somalia
 
Report police - 6 month training project
Report police - 6 month training project Report police - 6 month training project
Report police - 6 month training project
 
Crime record
Crime recordCrime record
Crime record
 
Crime
CrimeCrime
Crime
 
Ppt
PptPpt
Ppt
 
Crime investigation system
Crime investigation systemCrime investigation system
Crime investigation system
 
Online FIR System in KPK
Online FIR System in KPKOnline FIR System in KPK
Online FIR System in KPK
 
Criminal Record Management
Criminal Record ManagementCriminal Record Management
Criminal Record Management
 
Project
ProjectProject
Project
 
Online Voting System-using Advanced Java
Online Voting System-using Advanced JavaOnline Voting System-using Advanced Java
Online Voting System-using Advanced Java
 
Online voting system presentation slide (1)
Online voting system presentation slide (1)Online voting system presentation slide (1)
Online voting system presentation slide (1)
 

Similar to IRJET- Online Crime Reporting and Management System using Data Mining

IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET Journal
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RateIRJET Journal
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning TechniquesIRJET Journal
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGIRJET Journal
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting SystemIRJET Journal
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...IRJET Journal
 
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori AlgorithmIRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori AlgorithmIRJET Journal
 
Crime Prediction and Analysis
Crime Prediction and AnalysisCrime Prediction and Analysis
Crime Prediction and AnalysisIRJET Journal
 
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCEBITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCEIRJET Journal
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET Journal
 
Critical analysis of genetic algorithm based IDS and an approach for detecti...
Critical analysis of genetic algorithm based IDS and an approach  for detecti...Critical analysis of genetic algorithm based IDS and an approach  for detecti...
Critical analysis of genetic algorithm based IDS and an approach for detecti...IOSR Journals
 
Log management siem 5651 sayılı yasa
Log management siem 5651 sayılı yasaLog management siem 5651 sayılı yasa
Log management siem 5651 sayılı yasaErtugrul Akbas
 
Enhancing SIEM Correlation Rules Through Baselining
Enhancing SIEM Correlation Rules Through BaseliningEnhancing SIEM Correlation Rules Through Baselining
Enhancing SIEM Correlation Rules Through BaseliningErtugrul Akbas
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTIRJET Journal
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET Journal
 
IRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor NetworkIRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor NetworkIRJET Journal
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine LearningIRJET Journal
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...IRJET Journal
 
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET Journal
 

Similar to IRJET- Online Crime Reporting and Management System using Data Mining (20)

IRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online CrimeIRJET - Reporting and Management System for Online Crime
IRJET - Reporting and Management System for Online Crime
 
Predictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime RatePredictive Modeling for Topographical Analysis of Crime Rate
Predictive Modeling for Topographical Analysis of Crime Rate
 
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
IRJET -  	  Fraud Detection in Credit Card using Machine Learning TechniquesIRJET -  	  Fraud Detection in Credit Card using Machine Learning Techniques
IRJET - Fraud Detection in Credit Card using Machine Learning Techniques
 
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNINGCRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
CRIME ANALYSIS AND PREDICTION USING MACHINE LEARNING
 
Crime Prediction and Reporting System
Crime Prediction and Reporting SystemCrime Prediction and Reporting System
Crime Prediction and Reporting System
 
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
A Comparative Study for Credit Card Fraud Detection System using Machine Lear...
 
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori AlgorithmIRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
IRJET- Detection and Analysis of Crime Patterns using Apriori Algorithm
 
Crime Prediction and Analysis
Crime Prediction and AnalysisCrime Prediction and Analysis
Crime Prediction and Analysis
 
Ijarcce 6
Ijarcce 6Ijarcce 6
Ijarcce 6
 
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCEBITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCE
 
IRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural AnalyticsIRJET- Two Factor Authentication using User Behavioural Analytics
IRJET- Two Factor Authentication using User Behavioural Analytics
 
Critical analysis of genetic algorithm based IDS and an approach for detecti...
Critical analysis of genetic algorithm based IDS and an approach  for detecti...Critical analysis of genetic algorithm based IDS and an approach  for detecti...
Critical analysis of genetic algorithm based IDS and an approach for detecti...
 
Log management siem 5651 sayılı yasa
Log management siem 5651 sayılı yasaLog management siem 5651 sayılı yasa
Log management siem 5651 sayılı yasa
 
Enhancing SIEM Correlation Rules Through Baselining
Enhancing SIEM Correlation Rules Through BaseliningEnhancing SIEM Correlation Rules Through Baselining
Enhancing SIEM Correlation Rules Through Baselining
 
CRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECASTCRIME EXPLORATION AND FORECAST
CRIME EXPLORATION AND FORECAST
 
IRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention SystemIRJET - Online Credit Card Fraud Detection and Prevention System
IRJET - Online Credit Card Fraud Detection and Prevention System
 
IRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor NetworkIRJET- Attack Detection Strategies in Wireless Sensor Network
IRJET- Attack Detection Strategies in Wireless Sensor Network
 
Fraud App Detection using Machine Learning
Fraud App Detection using Machine LearningFraud App Detection using Machine Learning
Fraud App Detection using Machine Learning
 
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...Implementation of Secured Network Based Intrusion Detection System Using SVM ...
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
 
IRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute ResolutionIRJET- Accident Information Mining and Insurance Dispute Resolution
IRJET- Accident Information Mining and Insurance Dispute Resolution
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 

IRJET- Online Crime Reporting and Management System using Data Mining

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 34 Online Crime Reporting and Management System using Data Mining Pradnya Ogale1, Mayuri Chormale2, Pinaki Babar3, Shridhar Shinde4 1,2,3,4B.E. Student, Dept. of Computer Engineering, Sinhgad College of Engineering, Vadgaon, Pune- 411041, Maharashtra, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The aim of this project is to develop an online managing crime report system which is accessible to the common public and the police department easily. The system provides users with the information about the crime rates ofa desired area. This is useful for tourists who are entering in an unvisited area. If the user enters in 100 meter radius of a high alert area then he/she will be notified with an alert message. The user gets notified about the different crime rates in the area and can provide the safest path to the desired destination. Also, the system registers the complaintsfromthe people through online web application where they canupload images and videos of the crime and it will be helpful for the police department in catching criminals. The person can give complaint at any time. Key Words: KNN Algorithm, AES Algorithm, K-Means Algorithm. 1. INTRODUCTION Crime is a part of illegal activities in human life. The rise of population and complex society rises the rangeofanti-social conducts that must be restricted by thegovernmentthrough the military and different organizations particularly the Police Force. There are many current crime management systems which faces several difficulties, as thereisnomeans to report crime instantly other than phone calls, messaging or face-to-face compliant filing. Hence, we have proposed an online crime reporting system which allows the user to file complaints or missing reports and keep a track of it. There are 3 categories that a user can file; Complaint,CrimeReport and Missing Report and can see all the status of what action has been taken by the admin. To file any of the above 3 complaints, the user should register in to the system and provide his right credentials to file them. The crime reporting system projectalsoallowsotheruserswhodoesn’t want to register but can check the crimes happening at his/her or any other area, has to just provide the pin code and in return the system displays the list of crimes if any filed. The offline i.e. the unregistered user can also take advantage of checking the missingpersondetails,buthe/she is refrained from getting complaints done by the users. The Front End of the crime reporting system is done using Android Studio and SQL serves as a backend to store books lists and inventory data. The system, has both the user as well the Admin Part, the role of admin is to just check all the 3 modules or categories and update their status likewise. This system helps the users in tracking any report filed to the law and take an advantage of reporting any complaint from anywhere bringing the whole system online. 1.1 Literature Survey 1. Sunil Yadav illustrate that how social development may lead to crime prevention so that toincreasethe predictive accuracy supervised, semi-supervised and unsupervised learning technique are used and also k-means is used to create number of clusters. 2. Rasoul Kiani Siamak Mahdavi, Amin Keshavarzi have analysed, the main objective of this paper is to classify clustered crimes based on occurrence frequency during different years. Data mining is used extensively in terms of analysis, investigation and discovery of patternsfor occurrenceofdifferent crimes. 3. Shyam Varan Nath have used the clustering algorithm for a data mining approach to help detect the crimes patterns and speed up the process of solving crime. We will look at k-means clustering with some enhancements to aid in the process of identification of crime patterns. 2. Project Overview The crime rates accelerate continuously and the crime patterns are constantly changing. According to National CrimeRecordsBureau,crimeagainstwomenhassignificantly increased in recent years. It has becomethe most prior tothe administration to enforce law and order to reduce this increasing rate of the crime against women. We illustrates how social development may lead tocrimeprevention.Sowe are developing the system which can used to detect and predict the crimes for the area where the person or user currently stand. Crime detection and analysis will be to generate the crime hot-spots that will help in deployment of police at mostly likely places of crimeforanywindowoftime, to allow most effective utilization of police resources. The developed model will reduce crimes and will help the crime detection field in many ways that is from arresting the criminals to reducing the crimes by carrying out various necessary measures. We add the woman safety module for security. When women press the power button of android mobile 3 to 4 times then help message send to relatives or police. Due to this we reduce crime in the society and in country. Here we use module of crime capture means user can capture the photo of crime send topolice. There is user or actors which are as follows, 1. User has theaccountandforaccessingthathe/shemust be provide the correct username and password.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 35 2.Alluse-casesforthesoftwarearepresented. Description of all main Use cases use case template is to be provided. 3. A use case diagram in the Unified Modeling Language (UML) is a type of behavioraldiagram definedbyandcreated from a Use-case analysis. Itspurpose is to presentagraphical overview of thefunctionalityprovidedbyasystemintermsof actors, their goals (represented as use cases), and any dependenciesbetweenthoseusecases. Themainpurposeofa use case diagram is to show what system functions are performed for which actor. Roles of the actors in the system can be depicted. [A]AES Encryption Process AES is an iterative rather than Feistel cipher. It is based on substitution permutation network. Itcomprises ofa series of linked operations, some of which involvereplacing inputs by specific outputs (substitutions) and others involve shuffling bitsaround(permutations). Interestingly,AESperformsallits computations on bytes rather than bits. These 16 bytes are arranged in four columns and four rows for processing as a matrix. Unlike DES, the number of rounds in AES is variable and depends on the length of the key. Each of these rounds uses a different 128-bit round key, which is calculated from the original AES key. In present day cryptography, AES is widely adopted and supported in both hardware and software. Till date, no practical cryptanalytic attacks against AES have been discovered. Additionally, AES has built-in flexibility of key length, which allows a degree of future- proofingagainstprogressintheability to perform exhaustive key searches. However, just as for DES, the AES security is assured only if it is correctly implemented and good key management is employed. The encryption process uses a set ofspeciallyderivedkeyscalledroundkeys. Theseareapplied, along with other operations, on an array of data that holds exactlyoneblockofdata? thedatatobeencrypted.Thisarray we call the state array. You take the following AES stepsofencryptionfor128-bit block: • Derive the set of round keys from the cipher key. • Initialize the state array with the block data (plaintext). • Add the initial round key to the starting state array. • Perform nine rounds of state manipulation. Fig-1: AES Algorithm The reason that the rounds have been listed as “nine followed by a final tenth round” is because the tenthround involves a slightly different manipulation from the others. Theblocktobeencryptedisjusta sequence of 128bits.AES works with byte quantities so we first convert the 128 bits into 16 bytes. We say “convert,” but, in reality, it is almost certainly stored this way already. Operations in RSN/AES are performed on a two-dimensional byte array of four rows and four columns. At the start of the encryption, the 16 bytes of data, numbered D0 ? D15, are loaded into the array as shown in following Table A. Each round of the encryption process requires a series of steps to alter the statearray. These stepsinvolve four types of operations called: 1. SubBytes 2. ShiftRows 3. MixColumns [B]Data Mining Data mining is a new technology, which helps organizations to process data through algorithms to uncover meaningful patterns and correlations from large databases that otherwise may not be possible with standard analysis and reporting. Data mining tools can helps to understand the business better and also improve future performance through predictive analysis and make them proactive and allow knowledge driven decisions. Issues related to information extraction fro large databases, data miningfield brings together methods from several domainslikeMachine Learning, Statistics, Pattern Recognition, Databases and Visualizations. Data Mining fields find its application in
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 36 market analysis and, managementlikefor examplecustomer relationship, management, cross selling, market segmentation. It can also be used in risk analysis and management for forecasting, customer retention, improved underwriting, quality control, competitive analysis and credit scoring. [C]System Architecture Fig:2 System Architecture [D]Feasibility Analysis Np-hard Np-Complete: • What is P? P is set of all decision problems which can be solved in polynomial time by a deterministic. Since it can be solved in polynomial time, it can be verified in polynomial time. Therefore P is a subset of NP. P: Crime is a matter of major concern to society, it must be checked. Although crime, being an integral part of civilization, it can definitely be kept within limits. The task of maintaining peace and order is delegated internally to the police. What is NP? “NP” means “we can solve it in polynomial time if we can break the normal rules of step-by-step computing”. What is NP Hard? A problem is NP-hard if an algorithm for solving it can be translated into one for solving any NP-problem (nondeterministic polynomial time) problem. NP-hard therefore means” at least as hard as any NP-problem,” although it might, in fact, be harder. NP-Hard: It would be very difficult to only go through the manual process of crime reporting to police portal. So here in this case the P problem is NP hard. i.e. P=NP-Hard What is NP-Complete?  Since this amazing ”N” computer can also do anythinga normal computer can, we know that ”P” problems are also in ”NP”.  So, the easy problems are in ”P” (and ”NP”), but the really hard ones are *only* in ”NP”, and they are called ”NP-complete”.  It is like saying there are things that People can do (”P”), there are things that Super People
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 01 | Jan 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 37 can do (”SP”), and there are things *only* Super People can do (”SP-complete”). NP-Complete: Crime detection and analysis will be to generate the crime hot-spots that will help in deployment of police at most likely places of crime for anygiven window of time, to allow most effective utilization of police resources. [E]K – Nearest Neighbor NP Analysis K–Nearest Neighbor algorithm is a Machine Learning Classification Technique. Itis usedtoclassifya givenelement into one of the classes which is closest to the element. Consider a data set of ‘n’ samples and ‘d’ dimensions. There is a point of interest whose class we want to determine on a two-dimensional plot. We calculatethedistance betweenthe point of interest to all other points in the data set.. If the data set is small with less number of dimensions, this algorithm runs in a reasonable amount of time. Since the time complexity of K–Nearest Neighbor algorithm using Brute Force Approach is the algorithm runs in polynomial time and hence fall under P class of Problems. 3. CONCLUSION The developed model will help reduce crimes and will help the crime detection field in many ways that is from arresting the criminals to reducing the crimes by carrying out various necessary measures. The project is helpful forgeneral public in getting information about the crime status of the area and get a safe path to a desired destination. REFERENCES [1] J. Agarwal, R. Nagpal, and R. Sehgal, ―Crime analysis using k-means clustering, International Journal ofComputer Applications, Vol. 83 – No4, December 2013. [2] J. Han, and M. Kamber, ―Data mining: concepts and techniques, Jim Gray, Series Editor Morgan Kaufmann Publishers, August 2000. [3] P. Berkhin, ―Survey ofclusteringdata miningtechniques, In: Accrue Software, 2003. [4] W. Li, ―Modified k-means clustering algorithm, IEEE Congress on Image and Signal Processing, pp. 616- 621, 2006. [5] D.T Pham, S. Otri, A. Afifty, M. Mahmuddin, and H. Al- Jabbouli, Data clustering using the Bees algorithm, proceedings of 40th CRIP International Manufacturing Systems Seminar, 2006. [6] J. Han, and M. Kamber, ―Data mining: concepts and techniques, 2nd Edition, Morgan Kaufmann Publisher,2001.